检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Operation Process Table 1 Operation process of creating a disk backup Step Description Making preparations Register with Huawei Cloud, complete real-name authentication, top up your account, and create an IAM user.
checkpoints/replicate Table 1 Path Parameters Parameter Mandatory Type Description project_id Yes String Project ID Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token The token can be obtained by calling the IAM
Parameters Parameter Mandatory Type Description checkpoint_id Yes String Restore point ID project_id Yes String Project ID Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token No String User token The token can be obtained by calling the IAM
The AK/SK must be the AK/SK of your account, not of an IAM user. The system time of eBackup is greatly different from the actual time. As a result, the response fails. For detailed handling measures, see The System Time of eBackup Is Greatly Different from the Actual Time.
Path Parameters Parameter Mandatory Type Description agent_id Yes String Client ID project_id Yes String Project ID Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token The token can be obtained by calling the IAM
{project_id}/agents Table 1 Path Parameters Parameter Mandatory Type Description project_id Yes String Project ID Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token The token can be obtained by calling the IAM
Path Parameters Parameter Mandatory Type Description agent_id Yes String Client ID project_id Yes String Project ID Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token The token can be obtained by calling the IAM
records displayed on each page offset No Integer Query offset, which is a positive integer status No String Status Request Parameters Table 3 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token The token can be obtained by calling the IAM
project_id}/checkpoints Table 1 Path Parameters Parameter Mandatory Type Description project_id Yes String Project ID Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token The token can be obtained by calling the IAM
Mandatory Type Description organization_policy_id Yes String Organizational policy ID. project_id Yes String Project ID Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token The token can be obtained by calling the IAM
Parameters Parameter Mandatory Type Description operation_type No String Policy type vault_id No String Vault ID Request Parameters Table 3 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token The token can be obtained by calling the IAM
Path Parameters Parameter Mandatory Type Description policy_id Yes String Policy ID project_id Yes String Project ID Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token The token can be obtained by calling the IAM
Parameters Parameter Mandatory Type Description operation_log_id Yes String Task ID project_id Yes String Project ID Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token The token can be obtained by calling the IAM
Path Parameters Parameter Mandatory Type Description backup_id Yes String Backup ID project_id Yes String Project ID Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token The token can be obtained by calling the IAM
Request Parameters Table 3 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token The token can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token.
NOTE: If the CBR FullAccess permissions are only assigned to an IAM user, enterprise projects will not be displayed during vault creation. Go to the Enterprise Project Management console and assign the CBR FullAccess permissions to the target user group.
Multiple resources are separated with commas (,). status No String Status Request Parameters Table 3 Request header parameters Parameter Mandatory Type Description X-Auth-Token No String User token The token can be obtained by calling the IAM API used to obtain a user token.
After the file is uploaded, release the temporary ECS, IAM user, user group, and bucket. (Optional) Performing Periodic Drills According to the data security law, data recovery tests must be performed periodically for the backup and DR data.
Path Parameters Parameter Mandatory Type Description project_id Yes String Project ID vault_id Yes String Vault ID Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token The token can be obtained by calling the IAM
project_id}/vaults/order Table 1 Path Parameters Parameter Mandatory Type Description project_id Yes String Project ID Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token The token can be obtained by calling the IAM