|Advantages||Cloud Virtual Machine||Traditional Server|
High stability and availability
99.95% service availability, and 99.999% data reliability.
Users manually conduct disaster recovery, which relies on hardware robustness.
Flexible configuration and adjustment
Adjust bandwidth and configurations flexibly as required.
Difficulties in Ops
Fixed machine configuration cannot be adjusted according to requirements.
Ease of use
Available upon purchase, fast deployment
Purchase CVMs with one click; rich imaging functions, application software, and Ops tools are provided.
Complicated process and lots efforts
Devices need to be purchased and managed. Users need to expand the hardware by themselves.
Reliable storage, data guarantee
The professional storage technology guarantees data security and multiple real-time copies ensure data reliability.
Data is physically stored in single points and data security is uncontrollable.
Low cost, purchase on demand
Supports annual/monthly package or bill-by-traffic, to adapt to different application scenarios.
7×24 free professional Ops support is provided.
The rental fee is high and the Ops cost is high.
All-around protection, professional support
Multiple types of professional protection including DDoS protection, intrusion detection, and vulnerability scanning are provided.
Need to buy extra security protection services.
Wide-spread data centers
Tencent Cloud data centers are spread around the world, covering Southern China, Eastern China, Northern China, Hong Kong and North America. These data centers can meet any global service requirements that users
A variety of model configurations
The following CVM models are available:
|Disk||Local disk/Cloud disk||SSD disk||Local disk/Cloud disk|
|Application scenario||Applicable to medium- and small-sized Web applications and databases.||Applicable to I/O intensive applications with low delay.||Applicable to applications that need considerable memory operations, search, and computing.|
A variety of image sources
Tencent Cloud provides three types of images:
Public image: This image is provided by Tencent Cloud and is composed of a basic operating system and initialization components, complements of Tencent. It is available to all users.
Service market image: This image is provided by a third-party service provider and is released to the service market after being reviewed by Tencent Cloud. It is available to all users.
Custom image: This image is made by users by using the image making tool. An image created by a user can be only be used by the user themselves.
Server running environment backup
A custom image can be used to back up the system disk of the server, to restore data in the case of data loss.
Cross-region image duplication
A custom image can be duplicated to other Tencent Cloud regions so as to fully utilize the advantages of different Tencent Cloud locations.
Batch deployment of software environment
Images can be made for a CVM with environment deployed, to create CVMs in batches, so as to fast deploy software environment in batches.
Various disk categories
Tencent Cloud provides flexible and convenient data storage modes. Disks are differentiated by different dimensions.
By storage media, disks are classified into common hard disks (mechanical hard disks) and SSDs.
By architecture, disks are classified into local disks and Cloud disks.
By content, disks are classified into system disks and data disks.
|Type||SSD Local Disk||Cloud disk|
|Specifications||250G / 500GB / 1TB / 1.5TB / 3TB||10GB – 4TB|
|Throughput||Max 300 MB/s||About 70 MB/s|
|IOPS||Max random performance: 40,000 IOPS||Random performance: 3500 IOPS|
|Price||Annual/monthly packages: 0.8 CNY/GB/month|
Pay-by-traffic: RMB 0.33/hour/100GB
|Annual/monthly packages: 0.3 CNY/GB/month|
Pay-by-traffic: RMB 0.042/hour/100GB
|Scenario||Low delay: Access delay is as low as several milliseconds.|
Distributed application: It is applicable to I/O intensive applications such as NoSQL, MPP data warehouse and distributed file systems.
Such applications support distributed data redundancy.
Logs of large online applications: Large online applications will generate considerable logs. A high-performance storage device is required
and logs have low requirements for storage device reliability.
Single-point risks: The risk of single point of failures (SPOFs) may exist. It is recommended that data redundancy be conducted at
the application layer to ensure data availability.
|High data reliability: Common Cloud Block Storages use mechanical disks as the storage medium and adopt the distributed three-copy mechanism.|
Applicable to low-load services: It is especially
applicable to scenarios in which data is not frequently accessed or the I/O load is low.
Independent mounting: Cloud Block Storages can be mounted to any virtual machine in the same availability
Free public IP and private IP
Free public IP resources will be allocated to you if you purchase a public network bandwidth larger than 0 bit/s.
A private IP is allocated to each CVM instance. The private IP is mandatory and cannot be changed. The private IP can be used for private network access between CVM instances.
The BGP network supports access of all mainstream carriers in China. CVMs can provide top-speed public networks that encompass all of China. When a public network influx fault occurs, CVMs can implement inter-domain scheduling within seconds.
Custom network architecture
The Virtual Private Cloud (VPC) provides independent network space built using CVM instances to users, and allows customizing network segment classification, IP addresses and routing policies. It provides port-level access control to implement overall logical isolation of networks.
Custom network architecture
Elastic pubic IP can rapidly remap IP addresses to CVM instances, and quickly mask instance faults when a CVM fault occurs.
Remote CVM login in multiple modes
VNC login: This mode is an efficient remote control tool featuring powerful control capabilities. It authenticates and gives control permissions of CVMs over to users.
SSH key: The SSH key login mode is more secure than the common login mode using user names and passwords. It completely eradicates brute force cracking threats.
Perfect permission settings
A sound collaborator mechanism is provided to implement authority-based resource management.
CVMs store all CVM-relevant important operation records for locating and querying operation records in the future.
CVM recycle bin
The recycle bin is a resource recovery mechanism established for prepaid CVMs.
Abundant security services safeguard your CVMs.
CVMs support various security services including DDoS protection, DNS hijacking detection, intrusion detection, vulnerability scanning, Webpage Trojan detection, and login protection to safeguard your CVMs.
A free protection system – Dayu system – is provided for HTTP and mobile acceleration services. Its protection capability is 100G and is several times better than the universal DDoS protection solution provided by Tencent Cloud.
Dedicated high protection areas are provided for non-HTTP services (such as game service).
Professional website Trojan detection and other security functions are provided, and a professional analysis model is used to periodically detect websites, in an effort to discover Trojans in a timely manner and notify you of the discovered Trojans, thereby safeguarding secure running of your websites.
CVMs use a distributed scanning system, which notifies users of identified website vulnerabilities in a timely manner by using messages or short messages. The professional vulnerability fixing guide can help you fix a website vulnerability within three minutes.
A security group is a virtual firewall with packet filtering functions. It sets network access control of one or more CVMs. It is an important means of network security isolation.
CVMs provide cloud monitor and supports multiple real-time forewarning modes.
CVMs provide multiple cloud service load and performance indicators, including CPU utilization, memory utilization, disk utilization, cloud database, and NoSQL high-speed storage.
Custom alarm thresholds
Alert triggering thresholds of multiple indicators can be configured. Policies can be associated with different cloud products. Alert recipients and transmission channels can be customized.
Alert channel service
CVMs provide custom alert channel services.
CVMs comprehensively analyze key indicators of cloud resources, and rate resources by indicator importance to calculate the health score of the entire system.