检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
The key used for encrypting an image cannot be changed. How Do I Check the Encryption Status of a Disk in an Encrypted Full-ECS Image? Access the IMS console. On the Private Images tab page, click an image name to go to its details page. Click the Backups tab.
The key used for encrypting the image is the same as that used for encrypting the system disk. For details, see Creating a System Disk Image from an ECS. Parent topic: Managing Private Images
Common Operations Modifying Image Information Sharing Images Exporting Images Encrypting Images Replicating Images Within a Region Replicating Images Across Regions Tagging Images Exporting Image Information Deleting Images 05 Practices You can create private images using the open-source
The key used for encrypting the image is the same as that used for encrypting the system disk.
Keys for encrypting the images cannot be changed. If you want to change the key of an encrypted image, you can replicate this image to a new one and encrypt the new image using an encryption key. Replicate an unencrypted image to an encrypted one.
The key used for encrypting an image cannot be changed. Deleting images Private image status A published private image cannot be deleted.
Exporting an Image Encrypting images You can create encrypted images to improve data security. KMS envelope encryption is used. Encrypted images can be created from external image files or encrypted ECSs.
Function Overview Function Overview ALL Creating a Private Image Importing a Private Image Creating an ECS from an Image Modifying an Image Sharing Images Exporting Images Encrypting Images Replicating Images Tagging an Image Exporting Image Information Converting the Image Format
The keys used for encrypting images are stored in DEW. Encrypting Images Elastic Volume Service (EVS) You can create a data disk image using a data disk of an ECS. The created data disk image can be used to create other EVS disks.
For details about automatic configuration, see Registering an Image File as a Private Image. cmk_id No String Specifies a custom key used for encrypting an image. For its value, see the Key Management Service User Guide. tags No Array of strings Lists the image tags.
Scenarios To share an encrypted image, you need to authorize the key used for encrypting the image. This section describes how to authorize a key. The key can only be a custom key. The default key cannot be authorized. Prerequisites You have confirmed the key to be authorized.
The key used for encrypting the cloud server is the same as that used for encrypting the image. An image created from an encrypted cloud server is also encrypted. The key used for encrypting the image is the same as that used for encrypting the cloud server.
Managing Private Images Creating an ECS from an Image Modifying an Image Exporting an Image Exporting Image List Checking the Disk Capacity of an Image Deleting Images Sharing Images Encrypting Images Replicating Images Within a Region Replicating Images Across Regions
Value range: 40 GB to 2048 GB cmk_id No String Specifies a custom key used for encrypting an image. For its value, see the Key Management Service User Guide. tags No Array of strings Lists the image tags. This parameter is left blank by default.