Alibaba Cloud ECS 7-day training camp-newcomer line-day2 notes

ECS 7-day practical training camp on the second day

Preface: Alibaba Cloud ECS will study the next day. Today's content is the purchase and preparation of ECS servers.

ECS server purchase and preparation

  1. Purchase cloud server ECS
  2. connect to the server

Log in to Alibaba Cloud official website

Log in to Alibaba Cloud official website

This is the official website of Alibaba Cloud, where you can buy all kinds of cloud products and cloud services you need.

Click to buy

Choose the cloud server ECS in the product

ECS page

After opening, click to buy now

Insert picture description here

Payment method: Alibaba Cloud supports three payment methods, namely, monthly subscription, pay-as-you-go, and preemptive instances (seems to be unique to Alibaba Cloud). In addition to the payment models for these purchase pages, Alibaba Cloud has other payment methods after activation Payment models, such as saving plans.
Regions and availability zones: Alibaba Cloud has opened 63 availability zones in 21 regions around the world, providing reliable computing support for billions of users worldwide.
Example: Choose server configuration. Alibaba Cloud has a variety of specifications, types, and scenarios for customers to choose from.
Selecting mirroring: Alibaba Cloud has four modes: public mirroring, custom mirroring, mirroring market, and shared mirroring. There are more choices of mirroring to support rapid business deployment.
Storage: Alibaba Cloud has three kinds of cloud disks: high-efficiency cloud disk, ESSD, and SSD. Different cloud disks have different performance. In addition to the system disk, there are also data disks, as well as
snapshots such as oss and nas mounting. The service can regularly back up cloud disks. It can deal with the risks of virus infection and data deletion.
I chose the preemptive instance for the example (relatively cheaper, wow). After
choosing the above, we click Next Network and Security Group.

Insert picture description here

Next is the network and security group. This step determines the open ports of your server.
The first is to choose a network, which is usually a private network.
Then, distribute the public network ip, if you choose not to distribute, you can also hang the elastic ip in the load balance. If you choose to allocate, there are two payment modes for bandwidth, one is to pay according to the outgoing traffic, and the other is to pay according to the fixed bandwidth.
Then there is the security group. You can create a security group yourself, or you can choose the previous security group yourself.
Then there are flexible network cards and IPv6, which are generally not used by individuals. The author was useless, so I didn't choose it. You can see the document center

Insert picture description here

The next step is that the system is configured.
There are three options for login credentials, one is a custom password, the other is a key pair, and the other is set after creation. We choose a custom password, set the login password, and then we can actually click the next step. The following can be set without paying attention to the
Insert picture description here
grouping. If this is the same as the grouping of QQ friends, just change the person to the server

Insert picture description here

You can see it here and you can also set up templates. If you are interested, you can try it yourself.
Check the agreement, click Create instance, go to the management console to see your server!

connect to the server

1. Windows users:

  1. You can use WIN + R and enter cmd.

  2. ssh root@你的服务器的公网ip地址, Press Enter, (enter yes)
    Insert picture description here

  3. Enter your login password (if you forget it, you can go to the ECS console of the cloud server to change the password)

  4. After the login is successful, the welcome interface will be displayed.

2. User console:

  1. Click on the remote login behind the instance server in the user console
  2. Select the login instance, network connection method, connection protocol, user and password
  3. login successful.

3. Xshell login, putty login

They are all foolish operations.

Guess you like

Origin blog.csdn.net/sadadx/article/details/112997049