E2E’s MyAccount FAQs¶
What is the uptime provided by E2E Networks?¶
E2E Networks makes every reasonable effort to make the Included Products and Services each available with at least 99.99%up-time.
Is it possible to customize cloud servers?¶
No, we don’t offer customized cloud servers.
What are the Web Hosting and Cloud Computing Control Panels that E2E Networks provide?¶
We provide cPanel in Linux and Plesk in windows which are more secure control panels currently in the market after carefully sorting and testing all available control panels. While there may be a slight learning curve in switching to these panels but they can do everything that any other panel does.
How do you manage the failovers?¶
We will help you in making redundant architecture so that upgrade or scaling can be done without or very little downtime. In case of a catastrophic failure, we can replace the hardware in 4 hours.
Do you have DDoS protection on the network?¶
Yes, we do have DDoS protection on our network.
What are external security measures taken at the DataCentre?¶
Following are the security measures taken at the DataCentre for the safety of data and servers:
Camera: CCTV surveillance cameras
Security Guards: 24×7 on-site security presence
Building Access: Photo ID required
Room Access: Access card and biometric authentication
How many regions do you support?¶
Currently, we offer our services at Delhi-NCR and Mumbai region (selective services).
Do I get a bill if my nodes and other services are in a powered OFF state?¶
Yes, you will be charged for the powered-off instances because the disk space, CPU, RAM and IP addresses are all dedicatedly reserved for your nodes and services.
Can I add additional IP’s to the nodes?¶
Yes, you can reserve the IP’s from the myaccount portal.
How can I resize a Virtual Compute Node?¶
Open a support ticket with email@example.com by emailing us. We’ll schedule an upgrade at your convenience.
Would the IPv4 addresses assigned to my cloud instances change after rebooting the server?¶
Public and Private IPv4 addresses assigned to you will not change after rebooting a cloud instance
Do I get root access to my node?¶
We enable you as a root user and will email share the root access credentials on your email.
I did not receive a welcome email / I forgot my password. Can you resend it?¶
Please use the support section inside your MyAccount to generate a support ticket for the Cloud Platform team and we’ll reach out to you.
Can I reinstall the node with another OS?¶
You won’t be able to reinstall the node with a different OS. If you perform a reinstall operation it will boot up with the same OS. If you need another server you can launch a new node from the myaccount portal.
Why didn’t I receive a root password via Email (I didn’t use ssh-keys)?¶
Please use the help buttons inside the MyAccount to generate a support ticket for the Cloud Platform team and we’ll reach out to you.
I no longer require an account, can I deactivate & archive my account?¶
Send us an email to firstname.lastname@example.org via your account’s primary email to deactivate your account. However, you’ll continue to have access to your E2E Cloud Invoice Portal even after the account is de-activated since you may need access to invoices/account balance statements for tax purposes.
Do the servers have by default mirrored RAID setup?¶
Yes, mirrored RAID-10 or RAID-1 setups are present on all servers to protect against failure of 1 disk at a time.
Can I make a replica of my existing node?¶
Yes, you can take a snapshot by saving an image of an existing server and launch a new node in a new series plan.
Do you charge for Zabbix monitoring?¶
We don’t charge for the monitoring tool, it comes with the preinstalled image on your nodes.
Which operating system do you support?¶
E2E Networks GPUs support CentOS & Ubuntu OS and Windows 2016.
Do I need a driver for GPUs?¶
E2E GPU Nodes are designed to jump-start your GPU Computing with an optimized and Integrated software stack, including TensorFlow, GPU drivers, and NVIDIA CUDA for various workloads.
What is needed to get Tensorflow working for Machine Learning?¶
You can easily get components to speed up your machine setup. To quickly start with Tensorflow you can visit Pre-Configured Resources.
What to do when GPUs stop working intermittently?¶
Try rebooting the server once. You can contact us if the issue persists.
What E2E’s GPU instances can do?¶
E2E Networks GPUs offer high performance and cost-effective means for compute and graphics-intensive processing power. E2E Networks Cloud GPUs can boost Artificial Intelligence, Deep learning, HPC & other massively parallel workloads.
How many applications can I run at the same time?¶
E2E GPUs do not enforce any limit on the number of applications you can run at the same time.
What factors can affect the performance of GPUs?¶
Many factors may affect the performance of GPU instances such as bandwidth, the complexity of workload, size of the operations, and other factors. Always ensure that your workload & infrastructure requirements match properly. Under-provisioning or Over-provisioning will not help.
What protocols are supported by Load Balancer Appliance?¶
Currently, the Load Balancer supports HTTP and HTTPS protocols. TCP protocol support will be added in the future.
Which backend operating systems do a Load Balancer support?¶
Any backend server with operating systems currently supported by the E2E Networks Myaccount Cloud Platform can be added behind the Load Balancer Appliance.
Do Load Balancer support SSL termination?¶
Yes. You will get a section to define your SSL certificate details on selecting HTTPS protocol.
Can I upgrade or downgrade my Load Balancer plan?¶
Yes, you can upgrade or downgrade your Load Balancer plan by sending a request to email@example.com with the details of the new plan required and our support team will assist you with the process.
Does Load Balancer SupportsHTTP/2?¶
Currently, the HTTP/2 support part is in the testing phase and expected to be available in our next release.
Is there any limit on the number of backend Servers?¶
No, there is no limit on the number of backend servers and you can add as many backend servers as you like behind your Load Balancer Appliance.
Is IPv6 supported on Load Balancer Appliance?¶
No, currently IPv6 is not supported on Load Balancer Appliance. However, it’s already in our roadmap and will be available in a future release.
Why do I need a saved image to set up Application Scaling?¶
Application Scaling handles automatic launch and termination of compute nodes in response to a configured scaling policy. These nodes are typically responsible for serving your application workload. Working with a saved image ensures that there is no manual intervention required when scaling or de-scaling.
This is also about separation concerns. The scaling scheduler (we call it a scaler) is responsible for booting up a node and the application developers will need to take care of the launch activities of the target application.
Will I be charged for using the Application Scaling feature?¶
Application scaling is free to use. However, the compute nodes (launched by scaler) will be charged based on usage. You can choose a compute plan for the group nodes while creating a scale group.
Why does the load balancer show backend connection failure?¶
The load balancer is capable of polling the backend nodes for a health check. If you are seeing the error backend connection failure for a load balancer that is tied to a scale group, then check if your application is being launched automatically when the node comes up.
We recommend using SystemD script or tools like a supervisor for launching applications automatically at node startup. To debug, you may just launch a node from your saved image and check if your application is listening on the target port.
Is the CPU Utilization a node-level metric?¶
Yes. CPU Utilization metric that you see in the scaling policy rule is a node level utilization metric and not measured at scale group level. Use of load balancer (LB) with scale groups ensures that this metric doesn’t get skewed, hence we recommend LB for all use cases. We are adding more metrics in near future. If you have a request, please write to us at firstname.lastname@example.org
What is the cooldown period in the scale group?¶
A cooldown period is a time period that your application node needs to become productive after launch. It could be anywhere between 120-300 seconds. A simple mechanism to calculate this would be:
Your application launch time
Time is taken by LB to start redirecting requests to your node
How does the backup at E2E Networks work?¶
We offer you CDP (Continuous Data Protection) backup plans which backup your entire server minus excluded directories as per a backup schedule.
Using CDP, we take a snapshot of the entire filesystem onto the backup server in highly compressed CDP disk safe format. When the CDP agent is run for the first time, it does complete sync of the system.
Each new backup is incremental for the changes made to your server between the current backup and last backup thus speeding up the process and decreasing the load which occurs due to the backup process running on the server.
Is my server at E2E Networks automatically backed up?¶
You can easily provision a backup plan for your node from the MyAccount portal as we don’t back up anything unless it’s subscribed from your end.
Can I maintain my backups on the machine itself?¶
We do not recommend you keep a backup on your node. If your machine gets corrupted or destroyed due to any reason then these backups are lost. This is worse than having no backups at all as it gives you a false sense of security and when there is a catastrophe from which data is recoverable it takes far more time to recover data than from a machine that is not used as a version control system.
But you have RAID-10 or RAID-1 on all your servers which means a mirrored copy of data is always present. Then why do I still need a backup plan?¶
While mirrored RAID setups are present on all the servers and it can protect against failure of 1 disk at a time but it won’t protect against the following scenarios:-
Corruption of data due to a security compromise on the machine
Accidental deletion or corruption of data by someone in your team with access to your primary data stores and database ( say via phpmyadmin )
A catastrophic hardware failure due to which two or more disks get damaged at the same time can make even a RAID-10 unrecoverable.
It is the best possible practice to keep a CDP backup for data protection against any uncertainties.
How to configure the frequency of backups?¶
You can configure the schedule and frequency of backup via the MyAccount panel.
How to restore the backup?¶
You can initiate the restore process via the MyAccount panel.
Are there any particular do’s and don’t while running CDP Backups?¶
The CDP agent runs on each server you need to be backup, if a scheduled backup doesn’t run for any reason the backups fail and the support team at E2E is intimated about the same. The database backup agent which is a part of the CDP agent requires full Administrative access to the database servers ( e.g. MS SQL, MySQL ) and if you change the database administrative access without sharing it with E2E Networks via support ticket mentioning that this needs to be fixed on the backup process the database won’t be backed up via CDP Backup plans.
In case we find that the CDP backup agent has been turned off by a customer repeatedly then we de-provision the backup plan.
What are the usage limitations of EOS?¶
EOS is highly optimised for the most common scenarios. Below are the limits that you may need to account for while designing your solution with EOS.
What is the web browser (My Account) upload size limit?¶
The upload size limit is 30 MB.
I have successfully changed my DNS records but the changes aren’t reflecting?¶
When you make changes to your DNS records, it takes some time to propagate the changes.
How long does it take to refresh my DNS cache?¶
The DNS cache takes a certain amount of time to fully refresh. We suggest you wait for 24 hours for the DNS to be refreshed according to the Time To Live(TTL). Time to live (TTL) is used for DNS servers to reflect the changes after a certain period of time or number of iterations or time taken by the data before it should be discarded.
I have set up the TXT records in my DNS settings but my emails are landing in SPAM?¶
The 3-email security standards SPF, DKIM, and DMARC hold a lot of importance & implementing them correctly can help to reduce your emails landing in SPAM & avoid sender fraud.
What are SPF Records?¶
Adding an SPF record to your zone file will eliminate spammers and bounce back to your domain. Sender Policy Framework (SPF) records are public records on your website that authorize servers to send a mail with your domain details (like @mydomain.com). SPF protocol will check the sending server’s domain and help to make sure your emails are landing in the inbox from a legitimate source thus preventing the sender address forgery.
Domain Keys Identified Mail (DKIM)¶
DomainKeys Identified Mail is a TXT record published in your Domain Name System (DNS). In DKIM there are public keys (Known to everyone) and private keys(secret) which are mathematically linked to ensure a secured public communication channel. With DKIM authentication each outgoing Simple Mail Transfer Protocol (SMTP) server needs the correct private key and prefix to verify and match a receiving server public DNS record.
Domain-based Message Authentication, Reporting, and Conformance (DMARC)¶
DMARC was developed to limit email-based abuse. It works by enabling the sender to validate that their messages are protected with SPF and/or DKIM. If an email does not pass SPF/DKIM authentication, then DMARC policy applies instructions to reject or junk it with a report of PASS and/or FAIL DMARC evaluation.