home / skills / partme-ai / full-stack-skills / cloud-huawei-ecs
This skill provides comprehensive guidance for Huawei Cloud ECS including instance creation, configuration, security groups, and ECS management.
npx playbooks add skill partme-ai/full-stack-skills --skill cloud-huawei-ecsReview the files below or copy the command above to add this skill to your agents.
---
name: cloud-huawei-ecs
description: Provides comprehensive guidance for Huawei Cloud ECS including instance creation, configuration, security groups, and ECS management. Use when the user asks about Huawei Cloud ECS, needs to create ECS instances, configure ECS, or manage Huawei Cloud compute resources.
license: Complete terms in LICENSE.txt
---
## When to use this skill
Use this skill whenever the user wants to:
- [待完善:根据具体工具添加使用场景]
## How to use this skill
[待完善:根据具体工具添加使用指南]
## Best Practices
[待完善:根据具体工具添加最佳实践]
## Keywords
[待完善:根据具体工具添加关键词]
This skill provides practical, hands-on guidance for Huawei Cloud Elastic Cloud Server (ECS). It covers instance creation, configuration, security groups, networking, storage, and lifecycle management to help you deploy and operate compute resources reliably. The content focuses on concrete steps, common pitfalls, and recommended configurations for production and development workloads.
The skill inspects typical ECS workflows and translates them into actionable instructions: selecting images and flavors, configuring root and data volumes, assigning VPCs and subnets, and creating security group rules. It explains how to use the Huawei Cloud console, CLI, and API for automation, plus procedures for snapshots, backups, and scaling. It highlights security and cost controls such as IAM roles, key pairs, and reserved instance strategies.
Which image should I choose for ECS?
Choose a supported OS image that matches your application stack; use minimal images for containers and standard images for general apps. Use Huaweicloud-provided images for compatibility and security updates.
How do I secure SSH access to ECS?
Use key pairs or centrally managed SSH certificates, restrict SSH in security groups to trusted IPs or VPNs, and disable password authentication.