检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Expanding the Local Disks of a Disk-intensive ECS Scenarios Disk-intensive ECSs can use both local disks and EVS disks to store data. Local disks are generally used to store service data and feature higher throughput than EVS disks. Disk-intensive ECSs do not support specifications
Using IAM to Grant Access to ECS Creating a User and Granting ECS Permissions ECS Custom Policies
Creating a User and Granting ECS Permissions Use IAM to implement fine-grained permissions control over your ECSs. With IAM, you can: Create IAM users for personnel based on your enterprise's organizational structure. Each IAM user has their own identity credentials for accessing
Recovering an ECS from the Recycle Bin Scenarios You can recover ECSs from the recycle bin as needed within the kept duration. Constraints If your account is frozen or restricted, the recycle bin is unavailable. ECSs in the recycle bin cannot be recovered. Procedure Log in to the
One-Click ECS Password Reset Plug-in Obtaining the ECS One-Click Password Reset Plug-in Installing the One-Click Password Reset Plug-in on an ECS Updating the One-Click Password Reset Plug-in for an ECS Using Scripts to Batch Update the One-Click Password Reset Plug-ins for Linux
Obtaining and Deleting the Password of a Windows ECS Obtaining the Password for Logging In to a Windows ECS Deleting the Initial Password for Logging In to a Windows ECS Parent Topic: Password Reset
Does DCS Support Sentinels? Redis 4.0 and later: Single-node, master/standby, and Redis Cluster instances do not support Sentinels. Read/Write splitting instances support Sentinels and clusters. For Proxy Cluster instances, clusters are supported by default, Sentinels are supported
Logging In to a Linux ECS Using VNC Scenarios This section describes how to use VNC provided on the management console to log in to an ECS. If you cannot use other remote login tools to log in to an ECS, you can use the VNC login mode. This login mode is mainly used in emergency O
Logging In to a Linux ECS Using CloudShell Scenarios This section describes how to use CloudShell provided on the management console to log in to an ECS. For instructions about how to copy and paste data on CloudShell pages after the ECS login, see Common CloudShell Operations. Constraints
Purchasing an ECS in Quick Config Mode Scenarios Elastic Cloud Server (ECS) is a cloud server that provides scalable, on-demand resources, including vCPUs, memory, OS, and Elastic Volume Service (EVS) disks. After purchasing an ECS, you can use it like using your local computer or
Purchasing an ECS Using a Private Image Scenarios A private image is a personal image created or imported by a user and is visible only to the user who created or imported it. It contains an OS, preinstalled public applications, and the user's personal applications, saving the time
Logging In to a Windows ECS Using VNC Scenarios This section describes how to use VNC provided on the management console to log in to an ECS. If you cannot use the MSTSC or other remote login tools to log in to an ECS, you can use the VNC login mode. This login mode is mainly used
Obtaining the Password for Logging In to a Windows ECS Scenarios Password authentication is required to log in to a Windows ECS. You must use the private key bound to the ECS when the ECS was created to obtain the administrator password generated during the ECS creation. The administrator
Purchasing an ECS in Custom Config Mode Scenarios Elastic Cloud Server (ECS) is a cloud server that provides scalable, on-demand resources, including vCPUs, memory, OS, and Elastic Volume Service (EVS) disks. After purchasing an ECS, you can use it like using your local computer or
Logging In to a Windows ECS Using MSTSC Scenarios This section describes how to use the remote login tool MSTSC to log in to a Windows ECS from a local computer. Prerequisites The target ECS is running. If your ECS uses key pair authentication, you have obtained the password for logging
Modifying Configuration Parameters of a DCS Instance On the DCS console, you can configure parameters for an instance to achieve optimal DCS performance. After the instance configuration parameters are modified, the modification takes effect immediately without the need to manually
Creating a User and Granting DCS Permissions This section describes how to use Identity and Access Management (IAM) to implement fine-grained permissions control for your DCS resources. With IAM, you can: Create IAM users for employees based on your enterprise's organizational structure
Configuring DCS Instance Parameter Templates Viewing a Parameter Template of a DCS Instance Creating a Custom Parameter Template for a DCS Instance Parent Topic: Managing Instances
Network Conditions for Accessing DCS Redis You can access a DCS instance through any Redis client. For details about Redis clients, see the Redis official website. There are different constraints when a client connects to Redis in certain ways: Accessing a Redis instance on a client
Renaming Critical Commands for DCS Instances Certain high-risk commands can be modified for DCS Redis instances. Once a command is modified, it is only known to the modifier. Running the original command by other users is blocked. Notes and Constraints Only DCS Redis 4.0 and later