检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Obtaining Metadata and Passing User Data Obtaining ECS Details Using Metadata Injecting User Data Configuring Instance Metadata Options Metadata Security Best Practices Parent Topic: Managing ECS Configurations
Log in to the ECS again. If you still cannot log in to the ECS, check your local network. Change the network (for example, use your phone's mobile data) and check whether you can log in to the ECS remotely.
Log in to the ECS again. If you still cannot log in to the ECS, check your local network. Change the network (for example, use your phone's mobile data) and check whether you can log in to the ECS remotely.
For details about how to obtain the ID, see Obtaining a Project ID. server_id Yes Specifies the ECS ID. Request None Response None Example Request Delete all tags from a specified ECS.
If automatic NVMe SSD disk attachment upon ECS startup is enabled in /etc/fstab on the faulty ECS, the system disk recovers after the ECS is created.
For details about how to obtain the ID, see Obtaining a Project ID. server_id Yes Specifies the ECS ID. Request None Response Table 2 describes the response parameters. Table 2 Response parameters Parameter Type Description tags Array of strings Specifies ECS tags.
Example 3: Assigning a Virtual IP Address to an ECS for HA Scenarios Virtual IP addresses are used for high availability as they make active/standby ECS switchover possible.
For details about how to obtain the ID, see Obtaining a Project ID. server_id Yes Specifies the ECS ID. Request None Response Response parameters Table 2 describes the response parameters.
Do I Need to Stop the ECS Before Backing It Up? No. CSBS allows you to back up ECSs that are in use. When an ECS is running, data is written onto EVS disks on the ECS, and some newly generated data is stored in the ECS memory as cached data.
Do I Need to Stop the ECS Before Backing It Up? No. CSBS allows you to back up ECSs that are in use. When an ECS is running, data is written onto EVS disks on the ECS, and some newly generated data is stored in the ECS memory as cached data.
Accessing OBS from an ECS over the Intranet Overview of the Solution to Accessing OBS from an ECS over the Intranet Using OBS Browser+ on a Windows ECS to Access OBS over the Intranet Using obsutil on a Linux ECS to Access OBS over the Intranet Parent Topic: Accessing Data Stored
Set the parameters as follows: Agency Name: DataProviderAccess Agency Type: Cloud service Cloud Service: Elastic Cloud Server (ECS) and Bare Metal Server (BMS) Validity Period: Retain the default setting.
You can also associate an ECS with a custom security group. If the custom security group cannot meet your requirements, you can change the custom security group. Changing the Security Group of an Individual ECS Go to the ECS list page.
What Should I Do If the One-Click Password Reset Plug-ins Installed on a Linux ECS Fail to Be Started? Scenarios The one-click password reset plug-ins installed on a Linux ECS fail to be started.
Log in to the ECS as user root.
Set the parameters as follows: Agency Name: DataProviderAccess Agency Type: Cloud service Cloud Service: Elastic Cloud Server (ECS) and Bare Metal Server (BMS) Validity Period: Retain the default setting.
Unbinding an EIP from an ECS Scenarios This section describes how to unbind an EIP from an ECS by calling APIs. Prerequisites You have created an ECS. For details, see Purchasing an ECS.
Ingesting ECS Logs to LTS Choose Log Ingestion > Ingestion Center in the navigation pane and click ECS (Elastic Cloud Server). The page for selecting a log stream is displayed. Select a log group from the drop-down list of Log Group, for example, lts-group-ECS.
How Can I Obtain the Mapping Between Disk Partitions and Disk Devices on a Linux ECS? For a Xen ECS running Linux, its disk partitions correspond to disk devices.
Obtaining the Key File of an ECS After a key pair is created for an ECS, the browser prompts you to download or automatically downloads the private key file. Keep the private key file secure. When logging in to the ECS using SSH, you need to provide the private key.