ALL HELP
- Network
- Virtual Private Cloud
- Elastic Load Balance
- Domain Name Service
- NAT Gateway
- Virtual Private Network
- Security
- Anti-DDoS
- Management and Deployment
- Identity and Access Management
- Cloud Eye
- Cloud Trace Service
- Tag Management Service
- Application
- Simple Message Notification
- Glossary
- FAQ
- Purchase Guide
-
User Guide
- Overview
- Configurations
-
Getting Started
- Purchasing an ECS
- Creating a HANA ECS
-
Logging In to an ECS
- Login Mode Overview
- Logging In to an ECS Using VNC
- Logging In to a Linux ECS Using a Key Pair (SSH)
- Logging In to a Linux ECS Using a Password (SSH)
- Logging In to a Windows ECS Using a Password (MSTSC)
- Configuring Security Group Rules
- Obtaining the Password for Logging In to a Windows ECS
- Deleting the Initial Password for Logging In to a Windows ECS
- (Optional) Initializing EVS Data Disks
- (Optional) Installing One-Click Password Reset Plugins
- (Optional) Configuring Mapping Between Host Names and IP Addresses
- ECS Features
-
Management
- Viewing ECS Creation Status
- Exporting ECSs
- Managing the LifeCycle of an ECS
- Modifying Basic ECS Configurations
- Resetting the Password for Logging In to an ECS
- Changing the Time Zone for an ECS
- Monitoring ECSs
- Managing ECS OSs
- Expanding the Local Disks of a Disk-intensive ECS
- Having an ECS Without a Public IP Address Access the Internet
- Detaching an EVS Disk from a Running ECS
- Managing ECS Metadata
- Enabling Multiple NIC Queuing
- API Reference
- Document Download
Cloud-Init
Cloud-Init is an open-source cloud initialization program, which initializes specified customized configurations, such as the host name, key pair, and user data, of a newly created ECS.
Using Cloud-Init to initialize your ECSs will affect your ECS, IMS, and AS services.
Impact on IMS
To ensure that ECSs created using private images support customized configurations, you must install Cloud-Init or Cloudbase-Init before creating private images.
- For Windows OSs, download and install Cloudbase-Init.
- For Linux OSs, download and install Cloud-Init.
After Cloud-Init or Cloudbase-Init is installed in an image, Cloud-Init or Cloudbase-Init automatically configures initial ECS attributes when the ECS is created. For instructions about how to install Cloud-Init or Cloudbase-Init, see Image Management Service User Guide.
Impact on ECS
- When creating an ECS, if the selected image supports Cloud-Init, you can use user data injection to inject customized configuration, such as ECS login password, for initializing. For details, see section (Optional) Injecting User Data into ECSs.
- After Cloud-Init is supported, ECS login modes will be affected. For details, see the following sections:
- After Cloud-Init is supported, you can view and use metadata to configure and manage running ECSs. For more information, see section Managing ECS Metadata.
Impact on AS
- When creating an AS configuration, you can use user data injection to specify ECS configurations for initialization. If the AS configuration has taken effect in an AS group, the ECSs newly created in the AS group will automatically initialize their configurations.
- For an existing AS configuration, if its private image has Cloud-Init or Cloudbase-Init not installed, the login mode of the ECSs created in the AS group where the AS configuration takes effect will be influenced. To resolve this issue, see section "How Does Cloud-Init Influence the AS Service?" in Auto Scaling User Guide.
For more information about AS, see Auto Scaling User Guide.
Notes
- When using Cloud-Init, enable DHCP in the VPC to which the ECS belongs.
- When using Cloud-Init, ensure that security group rules in the outbound direction meet the following requirements:
- Protocol: TCP
- Port Range: 80
- Remote End: 169.254.0.0/16
NOTE:
If you use the default security group rules in the outbound direction, the preceding requirements are met, and the metadata can be accessed. Default security group rules in the outbound direction are as follows:
- Protocol: ANY
- Port Range: ANY
- Remote End: 0.0.0.0/16
Last Article: User Encryption
Next Article: ECS Types and Specifications
Did this article solve your problem?
Thank you for your score!Your feedback would help us improve the website.