ECC FAQs

1. Can ECC instances interconnect with each other over the intranets?

ECC instances under the same account in the same non-VPC data center are interconnected. Different accounts are isolated from each other and cannot be connected.

Access between ECC instances under the same account in the same VPC can be controlled using ACLs, and access between instances under the same account in different VPCs can be controlled using Peering.

2. Why does freezing and packet loss happen to the ECC instance?

All bandwidth is occupied. It is recommended that you upgrade the bandwidth plan.

3. Why does the reset operation fails when I reset the password of a ECC instance in the console?

Please check the password you entered. Currently, uppercase and lowercase letters, numbers and special characters are supported. Special characters include: @#${}%*()=+_!?,

4. Why does the remote connection to a ECC instance in a VPC fail?

A ECC instance in a VPC cannot be accessed directly. If remote access is required, you need to add the ECC instance to a security group, and then set protocols in inbound and outbound security group rules to control the access.

5. What do I do if the message “The referenced account is locked currently and the login may fail” appears when I log in to a Windows ECC instance?

Security setting determines the number of failed login attempts that cause your account to be locked. The locked account cannot be used until the administrator resets it or the account locking period expires. You can set the number of failed login attempts to a value between 0 and 999. If the value is set to 0, the account will never be locked. This issue can be solved by shutting down the ECC instance and reinstalling the system. If it is not convenient to reinstall the system on your computer, you can contact the background personnel to help you unlock your account.

6. What do I do if the system displays “The password is incorrect” when I log in to a Windows ECC instance for the first time?

The default user name of a Windows ECC instance is administrator. If you forget the password, you can shut down the ECC instance first through the console, and then choose “More > Reset Password” to reset the instance password.

7. What internal network services does YiSu Cloud provide at present?

At present, YiSu Cloud provides the following internal network services:

  • DNS:
    Resolves internal service domain names of YiSuCloud. For example, domain names of the following internal services can be resolved using DNS.
  • YUM software source image:
    Provides software sources such as CentOS, EPEL, and RepoForge, which can save external network traffic and accelerate software package download.
  • Time synchronization:
    Calibrates the server time faster to keep the time consistent among several servers.

8. Will the VNC service be installed by default in CentOS?

The CentOS image provided by YiSu Cloud is a standard image, and the VNC service is not installed by default. For detailed installation and configuration, visit http://wiki.centos.org/zh/HowTos/VNC-Server.

9. How can I log in to a ECC instance that does not have a public IP address?

For a ECC instance without public network bandwidth purchased, the system will not assign a public IP address. In this case, you need another ECC instance with a public IP address to access the ECC instance over the internal network.

10. Why can’t I access services on my ECC instance?

Please check your firewall settings first. To enhance the ECC instance security, each firewall does not contain any rule in initial state, and all ports are closed. You need to create rules to open corresponding ports.

11. Does ECC provide Ubuntu image sources for download?

Yes. Different image sources for different Ubuntu versions can be downloaded (DNS must be added first).

12. Is the unusual process such as b26h a YiSuCloud-deployed system process?

YiSu Cloud provides standard system images, and the system processes are regular standard processes. If there is an unusual process, your ECC instance may experience security risks. It is recommended that you install Server Security Products to troubleshoot security issues such as Trojans, viruses, and zombie computers. If necessary, you can reinstall the system, change the password, or use a key instead of a password for login.

13. Does ECC support the deployment of VPN?

YiSu Cloud provides ECC instances only. You can deploy application layer services as needed. You can try to deploy a VPN by using OpenVPN.

14. How large is the system disk of a ECC instance?

The free system disk capacity is 50G for windows, and 20G for Linux.

15. How much DDoS attack traffic can a single ECC instance prevent against?

At present, a single ECC instance provides a basic bandwidth of up to 5 Gbit/s to prevent against DDoS attacks. When it is attacked, the equipment of YiSuCloud can clean the attack traffic, discard malicious traffic, and ensure normal business communication.

  • a. When the peak bandwidth of mixed traffic reaches 500M, an alarm will be triggered.
  • b. When the peak traffic bandwidth reaches 2G and lasts for 15 minutes, the traffic will be automatically transferred to the black hole for cleaning.
  • c. When the peak traffic bandwidth reaches 5G, the traffic directly enters the black hole for cleaning.

If you experience DDoS over 5G attacks frequently, it is recommended that you purchase the YiSuCloud Anti-Attack Service(Anti-DDoS IP).

16. After a website is deployed on a ECC instance, where can I find the logs?

Generally, different web servers (such as Apache and NGINX) may be stored in different places. You can check whether there is a file containing “log” in the background through FTP, and this file is the log file.

Common footprints in logs include: GoogleBot for Google web bots, BaiDuSpider for Baidu web bots, and InktomiSlurp for Yahoo web bots.

17. What is the relationship between CPU load and utilization of a ECC instance?

CPU load is the statistical information of the number of processes that are being processed by CPU and waiting for CPU to process over a period of time, while utilization refers to usage of processing resources. If a process keeps using CPU, the CPU utilization may reach 100%. CPU load and utilization are not correlated necessarily, but both of them can be used as a reference for specific usage of CPU.