2. Choose a package or make your own configuration (parameter configuration and operating system configuration) and then pay for it;
3. After the selected configuration is automatically installed on the platform, remote login control can be performed;
4. Configure the server security group policy according to the security policy;
5. The remote login operation is basically the same as the physical machine;