Go to computer terminal for registration
The Virtual Machines provided by JD Cloud is a cloud computing service unit that is easily managed, secure and reliable. Multiple Virtual Machines can be created and released at any time without input into the purchase and maintenance of hardware, enabling fast deployment and application. It can expand computing capacity based on service requirements by paying-as-demand, which saves cost and facilitates more efficient and stable implementation of business.Buy Now
JD Cloud’s Second-generation Virtual Machines applies the new-generation of Intel ®Xeon® scalable CPU, which is featured by remarkably improved comprehensive performance compared with the previous generation, and the floating-point calculation performance per clock cycle is doubled, thus significantly accelerated the workload speed. With higher vCPU and memory specification and configuration of the latest Virtual Machines, JD Cloud has made in-depth optimization in virtualization, network and scheduling and others, which greatly improved its service performance and better supported the computationally intensive scenarios, such as scientific modeling, gene computing, data mining and analysis, high performance computing, etc.
JD Cloud provides four VM instance types: general-purpose, compute-optimized, memory-optimized and high-frequency computing, which can be selected based on different application levels to allocate CPU, memory, storage and EIP as needed. It supports flexible adjustment of CPU and memory, capacity expansion storage and adjustment of network bandwidth without shutting down, so as to ensure continuous application of service.
JD Cloud provides the largest memory Virtual Machines in China that carry the Intel ®Xeon® E5-2698 v4 CPU with an exclusive memory of 1464GB DDR4, suitable for large-scale service deployment requiring extremely high data exchange speed and memory capacity.
The Cloud Disk Service is a block-level storage with low delay and high reliability provided by JD Cloud to users. The Cloud Disk Services, including the Premium Hdd Cloud Disk and the SSD Cloud Disk, are provided to customers for selection. It supports to set capacity of Cloud Disk Service as required and the capacity can be expanded at any time to satisfy the rapid increase of business. In addition, the Cloud Disk Service provides function of making snapshot. By making snapshot to data of the Cloud Disk Service, requirements of demand scenarios as deployment in batch and rapid recovery can be further satisfied.
The Virtual Private Cloud allocates an isolated and secure private space for users. With independently isolated Virtual Private Clouds, the Virtual Machines can be deployed under different Virtual Private Clouds to enable network isolation. The users can have full control of network management, with independent sub-netting and EIP configuration supported. Moreover, the user’s local server can be connected to the JD Virtual Machines through a VPN or direct connection service to expand the existing network deployment.
The Elastic IP is associated with the JD Cloud account, and any Virtual Machine in the same region can be associated to enable external network access of the Virtual Machines. At the same time, the users can adjust the bandwidth and change the bound Virtual Machines based on the actual network usage. JD Cloud provides up to 2Gbps of free DDoS protection for EIP, which can defend against cyber-attacks without interruption.
JD Cloud allows the use of secret key encryption to decrypt the Virtual Machines login information based on the Linux system, providing a more secure key login method than password login, so as to simplify the Virtual Machines authority management with a higher level of security.
Security Group is a distributed and stateful virtual firewall featured by detecting and filtering the data packets coming in and out of the Virtual Machines. Safety Group can be used for IAM of single or multiple Virtual Machines, including east-west flow between Virtual Machines and north-south flow between Virtual Machines and EIP’s communications. Network security isolation between Virtual Machines can be achieved by employing Security Group.
Monitoring Virtual Machines based on multi-dimensionality can facilitate keeping users informed of the Virtual Machines resource usage, performance and running status in real time. Customized alarm rules for different monitoring indicators are supported and alarm notices are sent via SMS, email, etc.,to meet the needs of different user scenarios and ensure the continuous and stable operation of the application.
The Public Base Image provided by JD Cloud include multiple distribution editions of Linux and Windows. The Public Image is comprised of the initial system environment or basic software, which can be configured independently according to the actual application demands.
Based on custom image created by own Virtual Machines, it can be used to rapidly deploy the Virtual Machines with consistent environment in batch. Moreover, users can also share their Private Images with other JD Cloud users.
The image provided by the service providers (including the JD Cloud team) in JD Cloud-Marketplace integrates the running environments or software for different service scenarios, which facilitate fast deployment of services.
For the initial scenario of such applications, a lightweight deployment solution is often adopted, and a configuration with small-sized and low-bandwidth servers can meet the business demands, enabling the operation of such services as applications and databases. As the websites/application access increase and the services become more diversified, the cloud server instance types and scale can be adjusted rapidly to elastically adjust the resource allocation based on the service cycle, thus elastically improving the computing capability with low costs.
In the actual massive picture/video applications, such as large e-commerce website, user cost can be saved while user access waiting time can be reduced by the combination of VMs with LBs, OSS cloud storage and CDN.