Usage Notice

<p>To ensure the ECS instances are normally operated, read the following instructions before usage.</p> <p>&bull;&nbsp;&nbsp;&nbsp;&nbsp; It is forbidden to use the ECS to conduct illegal online acts that endanger national security and acts of pornography, gambling, drug abuse, and fraud.</p> <p>&bull;&nbsp;&nbsp;&nbsp;&nbsp; It is forbidden to use the ECS for traffic penetration service. Violators will be punished with the highest penalty of shutting down and locking instances and being cleared up.</p> <p>&bull;&nbsp;&nbsp;&nbsp;&nbsp; To ensure normal usage of instances, do not uninstall any pre-installed driver of relevant hardware.</p> <p>&bull;&nbsp;&nbsp;&nbsp;&nbsp; Do not modify network IP and MAC address willfully.</p> <p>&bull;&nbsp;&nbsp;&nbsp;&nbsp; Ping An Cloud does not provide 32-bit operating system because its 4 GB memory-addressing capability is limited. If the custom image you upload is 32-bit, pay attention to identify the memory capacity.</p> <p>&bull;&nbsp;&nbsp;&nbsp;&nbsp; The maximum CPU core supported by Windows 32-bit operating system is 4C.</p> <p>&bull;&nbsp;&nbsp;&nbsp;&nbsp; Purchase ECS instances of appropriate specifications when building large-scale applications. Otherwise the applications may not be started due to lack of resources.</p> <p>&bull;&nbsp;&nbsp;&nbsp;&nbsp; We recommend that you set the applications to run at startup to ensure continuous service and avoid unavailable service due to downtime migration. If application service is connected to database, you need to set automatic reconnection mechanism in the application.</p> <p>&bull;&nbsp;&nbsp;&nbsp;&nbsp; If system kernel needs to be upgraded, use Ping An hotfix. We recommend that you do not upgrade ECS kernel or versions of operating system. Self-upgrade by users may lead the Linux instance fails to be started.</p> <p>&bull;&nbsp;&nbsp;&nbsp;&nbsp; Do not rename, delete, or disable administrator account of the Windows so as not to affect the server.</p> <p>&bull;&nbsp;&nbsp;&nbsp;&nbsp; Be cautious to expand capacity, delete disk, revise registry, and update system in operating system to avoid data damage due to false operation.</p> <p>Be cautious to use administrator account such as root to do operations of rm-rf, fdisk and mkfs to avoid data damage due to false operation.</p>
Did the above content solve your problem? Yes No
Please complete information!

Call us

400-151-8800

Email us

cloud@pingan.com

Online customer service

Instant reply

Technical Support

cloud products