search
HomeOperation and MaintenanceLinux Operation and MaintenanceHow to use the wizard to create an instance while using Linux

This article describes how to use the console wizard to create an instance. If you want to use your own system disk snapshot to create a custom image and use this custom image to create an instance, see Creating an instance using a custom image.

Prerequisites

Before creating an ECS instance, you have completed the preparation work.

If you need to bind an SSH key pair when creating a Linux instance, you need to create an SSH key pair in the target region.

If you want to set custom data, you need to prepare instance custom data.

If you want an instance to play a certain role, you need to create an instance RAM role and grant the role corresponding permissions.

Operation steps

Log in to the cloud server ECS management console.

In the left navigation bar, click Instances.

On the Instance List page, click Create Instance.

Complete basic configuration:

Select the payment method: annual or monthly subscription, pay-as-you-go or preemptible instance.

Description

If you want to create an instance that is paid on a weekly basis, you must select Yearly and Monthly Subscription, and set the Purchase Duration at the bottom of the page to 1 week. For the differences between different payment methods, please see Billing Comparison.

For how to create a preemptible instance, see Creating a Preemptible Instance.

Select a region and availability zone. The system randomly allocates availability zones by default, and you can select applicable availability zones. For how to select a region and availability zone, see Region and Availability Zone.

Note

After the instance is created, the region and availability zone cannot be changed.

Some instance specification families are not available in all regions. For details, see Creating a GPU Computing Instance, Creating an F1 Instance, Creating an F2 Instance, Creating a Super Computing Cluster SCC Instance, and Creating an Elastic Bare Metal Server.

Select the instance type and set the number of instances: The available instance types are determined by the region you select. For application scenarios applicable to different instance types, see Instance Type Family.

Description

Each account has a limited pay-as-you-go instance or preemptible instance quota. The information displayed on the page shall prevail.

If you want to create a preemptible instance, you must set the price limit for a single instance specification in this step.

If you use elastic network cards, the enterprise-level instance type family must select an instance type with no less than 2 vCPU cores, and the entry-level instance type family must select an instance type with no less than 4 vCPU cores. For the number of elastic network cards supported by various instance types, see Instance Type Family.

If you want to use an SSD cloud disk as a storage device, please select an I/O optimized instance.

Select the image. You can choose a system image, a custom image, a shared image, or an image from the image market.

Description

If you want to use an SSH key pair, you must select the Linux system.

If you want to set instance custom data, you can only select a specific image. For details, see Instance Custom Data.

Select storage:

System disk: required, used to install the operating system. Specify the cloud disk type and capacity of the system disk:

Cloud disk type: Different regions will affect the available cloud disk types.

Capacity: The default capacity of the system disk is 40 GiB, and the maximum is 500 GiB. If the selected image file is larger than 40 GiB, the default is the image file size. The capacity range of the system disk is determined by the mirror, as shown in the following table.

How to use the wizard to create an instance while using Linux

Data disk: optional. If you create a cloud disk as a data disk at this time, you must select the cloud disk type, capacity, quantity, and set whether to encrypt it. You can create an empty cloud disk or use a snapshot to create a cloud disk. You can add up to 16 cloud disks as data disks.

Description

The cloud disk created at this time has the following characteristics:

The billing method is the same as that of the instance.

Annual and monthly data disks can only be released together with the instance. Pay-as-you-go data disks can be set to be released together with the instance.

If you select an instance type family with a local disk (such as i1, d1, d1ne, etc.), the local disk information corresponding to the instance type will be displayed here and cannot be configured. For local disk information corresponding to various local disk instance specifications, see Instance Specification Family.

Click Next: Network and Security Group to complete the network and security group settings:

Select the network type:

Private network: You must select a private network and switch . If you did not create a VPC and switch, you can select Default VPC and Default Switch.

Classic network: If you purchase an ECS instance for the first time after 17:00 on June 14, 2017 (UTC 8), you can no longer select the classic network.

Set the public network bandwidth:

If you need to assign a public IP address to the instance, you must select Assign a public IP address and choose to bill the public network bandwidth by traffic or fixed bandwidth. and specify the bandwidth. The public IP address assigned in this way cannot be unbound from the instance. For information on how to choose the public network bandwidth billing method, see Public Network Bandwidth Billing .

If your instance does not need to access the public network or your VPC type ECS instance uses an elastic public IP (EIP) address to access the public network, you do not need to assign a public IP address. The EIP address can be unbound from the instance at any time.

Select a security group. If you do not create a security group yourself, you can use the default security group. For the rules of the default security group, see Security Group Default Rules.

Add elastic network card. If the selected instance type supports elastic network cards, you can add elastic network cards and select a switch for the network card.

Description

The elastic network card added here will be released together with the instance by default. You can separate the instance and network card in the ECS console or use the DetachNetworkInterface interface.

(Optional) Click Next: System Configuration to complete the system configuration items:

Select and set login credentials. You can choose to set it after creation, or you can set it directly now. Choose different login credentials according to the image:

Linux system: You can choose to use a key pair or password as the login credentials.

Windows system: Only password can be used as login credentials.

Set the instance name and the computer name displayed inside the operating system.

Set advanced options:

Instance RAM role: Grant a RAM role to the instance.

Instance custom data: Customize the instance startup behavior or pass data to the instance.

(Optional) Click Next: Group Settings to complete instance group management: If you have multiple instances, in order to facilitate management, it is recommended that you add tags to the instances; if you are an enterprise user, you have already activated Resource management service, and resource groups have been created, and instances can be managed by resource groups.

Confirm order:

In the Selected Configuration section, confirm the configuration information. You can click the edit icon to re-edit the configuration.

(Optional) If the billing method is pay-as-you-go, you can set the automatic release service time.

(Optional) If the billing method is annual or monthly, you can set the purchase duration and choose whether to turn on automatic renewal.

Confirm the configuration fee. The billing method of the instance and public network bandwidth determines the cost information displayed, as shown in the following table.

How to use the wizard to create an instance while using Linux

Execution Result

After the instance is activated, click Management Console to return to the ECS Management Console to view the newly created ECS instance. In the instance list of the corresponding region, you can view information such as the instance name, public IP address, intranet IP address, or private IP of the newly created instance.

The above is the detailed content of How to use the wizard to create an instance while using Linux. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
What is Maintenance Mode in Linux? ExplainedWhat is Maintenance Mode in Linux? ExplainedApr 22, 2025 am 12:06 AM

MaintenanceModeinLinuxisaspecialbootenvironmentforcriticalsystemmaintenancetasks.Itallowsadministratorstoperformtaskslikeresettingpasswords,repairingfilesystems,andrecoveringfrombootfailuresinaminimalenvironment.ToenterMaintenanceMode,interrupttheboo

Linux: A Deep Dive into Its Fundamental PartsLinux: A Deep Dive into Its Fundamental PartsApr 21, 2025 am 12:03 AM

The core components of Linux include kernel, file system, shell, user and kernel space, device drivers, and performance optimization and best practices. 1) The kernel is the core of the system, managing hardware, memory and processes. 2) The file system organizes data and supports multiple types such as ext4, Btrfs and XFS. 3) Shell is the command center for users to interact with the system and supports scripting. 4) Separate user space from kernel space to ensure system stability. 5) The device driver connects the hardware to the operating system. 6) Performance optimization includes tuning system configuration and following best practices.

Linux Architecture: Unveiling the 5 Basic ComponentsLinux Architecture: Unveiling the 5 Basic ComponentsApr 20, 2025 am 12:04 AM

The five basic components of the Linux system are: 1. Kernel, 2. System library, 3. System utilities, 4. Graphical user interface, 5. Applications. The kernel manages hardware resources, the system library provides precompiled functions, system utilities are used for system management, the GUI provides visual interaction, and applications use these components to implement functions.

Linux Operations: Utilizing the Maintenance ModeLinux Operations: Utilizing the Maintenance ModeApr 19, 2025 am 12:08 AM

Linux maintenance mode can be entered through the GRUB menu. The specific steps are: 1) Select the kernel in the GRUB menu and press 'e' to edit, 2) Add 'single' or '1' at the end of the 'linux' line, 3) Press Ctrl X to start. Maintenance mode provides a secure environment for tasks such as system repair, password reset and system upgrade.

Linux: How to Enter Recovery Mode (and Maintenance)Linux: How to Enter Recovery Mode (and Maintenance)Apr 18, 2025 am 12:05 AM

The steps to enter Linux recovery mode are: 1. Restart the system and press the specific key to enter the GRUB menu; 2. Select the option with (recoverymode); 3. Select the operation in the recovery mode menu, such as fsck or root. Recovery mode allows you to start the system in single-user mode, perform file system checks and repairs, edit configuration files, and other operations to help solve system problems.

Linux's Essential Components: Explained for BeginnersLinux's Essential Components: Explained for BeginnersApr 17, 2025 am 12:08 AM

The core components of Linux include the kernel, file system, shell and common tools. 1. The kernel manages hardware resources and provides basic services. 2. The file system organizes and stores data. 3. Shell is the interface for users to interact with the system. 4. Common tools help complete daily tasks.

Linux: A Look at Its Fundamental StructureLinux: A Look at Its Fundamental StructureApr 16, 2025 am 12:01 AM

The basic structure of Linux includes the kernel, file system, and shell. 1) Kernel management hardware resources and use uname-r to view the version. 2) The EXT4 file system supports large files and logs and is created using mkfs.ext4. 3) Shell provides command line interaction such as Bash, and lists files using ls-l.

Linux Operations: System Administration and MaintenanceLinux Operations: System Administration and MaintenanceApr 15, 2025 am 12:10 AM

The key steps in Linux system management and maintenance include: 1) Master the basic knowledge, such as file system structure and user management; 2) Carry out system monitoring and resource management, use top, htop and other tools; 3) Use system logs to troubleshoot, use journalctl and other tools; 4) Write automated scripts and task scheduling, use cron tools; 5) implement security management and protection, configure firewalls through iptables; 6) Carry out performance optimization and best practices, adjust kernel parameters and develop good habits.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

Dreamweaver Mac version

Dreamweaver Mac version

Visual web development tools

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software