This course introduces you to Alibaba’s Elastic Compute Service, or ECS, one of the most common services within the Alibaba platform. It is a high-performance, stable, reliable, and scalable compute service that allows you to deploy virtual servers within your Alibaba Cloud environment. Most people will require some form of ECS Instance running within their environment as a part of at least one of their solutions.
This course covers the following components:
- ECS Concepts
- ECS Instances
- ECS Images
- ECS Storage
- ECS Snapshots
- ECS Security Groups and
- ECS Networks
For feedback, queries, or suggestions on this course, please contact us at firstname.lastname@example.org.
This course is designed for IT professionals who are just starting out in the world of Alibaba Cloud and want to know more about the ECS service it offers.
To get the most from this course, you should already have some basic knowledge of cloud computing. If you would like to brush up on your knowledge before taking this course, please consider taking our What is Cloud Computing? course.
The next section we will cover is ECS Snapshots. Snapshots are complete, read-only copies of disk data at certain points in time. You can use snapshots for the following scenarios:
Disaster recovery and backup: You can create a snapshot for a disk, and then use the snapshot to create another disk to implement zone- or geo-disaster recovery.
Environment clone: You can use a system disk snapshot to create a custom image, and then use the custom image to create an ECS instance to clone the environment.
Data development: Snapshots can provide near-real-time production data for applications such as data mining, report queries, and development and tests.
Enhanced fault tolerance: You can roll a disk back to a previous point in time by using a snapshot to reduce the risk of data loss caused by an unexpected occurrence. You can create snapshots on a regular basis to prevent losses caused by unexpected occurrences. These unexpected occurrences can include, for example, writing incorrect data to disks, accidentally deleting data from a disk, accidentally releasing ECS instances, data errors caused by application errors, and data loss due to hacking attempts.
Also, you could create a snapshot before you perform high-risk operations, such as changing operating systems, upgrading applications, and migrating business data.
In any of these scenarios, data can be retrieved from a snapshot.
Snapshots can be created manually or automatically by creating a snapshot policy. Up to 64 snapshots can be created per disk and each snapshot is an incremental copy of the previous snapshot. When the maximum number of snapshots has been reached the oldest snapshot is deleted as a new one is created.
Snapshots are not free, however, and are charged based on the storage space used and the amount of time they are kept.
David has been a trainer with QA for over 12 years and has been training cloud technologies since 2017. Currently certified in Microsoft and Alibaba cloud technologies David has previously been a system and Network administrator amongst other roles.
Currently, he is a Principle Technology Learning Specialist (Cloud) at QA. He loves nothing more than teaching cloud-based courses and also has a passion for teaching PowerShell scripting.
Outside of work, his main love is flying Radio control airplanes, and teaching people to fly them.