diff --git a/docs/ecs/umn/ALL_META.TXT.json b/docs/ecs/umn/ALL_META.TXT.json index 9148f494..140eee0c 100644 --- a/docs/ecs/umn/ALL_META.TXT.json +++ b/docs/ecs/umn/ALL_META.TXT.json @@ -838,11 +838,68 @@ "title":"Initializing a Linux Data Disk (parted)", "githuburl":"" }, + { + "uri":"en-us_topic_0170265910.html", + "node_id":"en-us_topic_0170265910.xml", + "product_code":"ecs", + "code":"45", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Using IAM to Grant Access to ECS", + "search_title":"", + "metedata":[ + { + "prodname":"ecs", + "documenttype":"usermanual", + "opensource":"false;true" + } + ], + "title":"Using IAM to Grant Access to ECS", + "githuburl":"" + }, + { + "uri":"en-us_topic_0170265913.html", + "node_id":"en-us_topic_0170265913.xml", + "product_code":"ecs", + "code":"46", + "des":"Use IAM to implement fine-grained permissions control over your ECSs. With IAM, you can:Create IAM users for personnel based on your enterprise's organizational structure", + "doc_type":"usermanual", + "kw":"Creating a User and Granting ECS Permissions,Using IAM to Grant Access to ECS,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"ecs", + "documenttype":"usermanual", + "opensource":"false;true" + } + ], + "title":"Creating a User and Granting ECS Permissions", + "githuburl":"" + }, + { + "uri":"en-us_topic_0170265914.html", + "node_id":"en-us_topic_0170265914.xml", + "product_code":"ecs", + "code":"47", + "des":"Custom policies can be created to supplement the system-defined policies of ECS. For the actions that can be added to custom policies, see \"Permissions and Supported Acti", + "doc_type":"usermanual", + "kw":"ECS Custom Policies,Using IAM to Grant Access to ECS,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"ecs", + "documenttype":"usermanual", + "opensource":"false;true" + } + ], + "title":"ECS Custom Policies", + "githuburl":"" + }, { "uri":"en-us_topic_0013771097.html", "node_id":"en-us_topic_0013771097.xml", "product_code":"ecs", - "code":"45", + "code":"48", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Instances", @@ -861,7 +918,7 @@ "uri":"en-us_topic_0030888079.html", "node_id":"en-us_topic_0030888079.xml", "product_code":"ecs", - "code":"46", + "code":"49", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Logging In to a Windows ECS", @@ -880,7 +937,7 @@ "uri":"en-us_topic_0092494943.html", "node_id":"en-us_topic_0092494943.xml", "product_code":"ecs", - "code":"47", + "code":"50", "des":"Only a running ECS can be logged in.Login usernames, passwords, and constraints vary depending on OSs running on the ECSs created using a public image. For details, see P", "doc_type":"usermanual", "kw":"Login Overview (Windows),Logging In to a Windows ECS,User Guide", @@ -899,7 +956,7 @@ "uri":"en-us_topic_0027268511.html", "node_id":"en-us_topic_0027268511.xml", "product_code":"ecs", - "code":"48", + "code":"51", "des":"This section describes how to use VNC provided on the management console to log in to an ECS. This function applies to emergency O&M. In other scenarios, you are advised ", "doc_type":"usermanual", "kw":"Logging In to a Windows ECS Using VNC,Logging In to a Windows ECS,User Guide", @@ -918,7 +975,7 @@ "uri":"en-us_topic_0017955381.html", "node_id":"en-us_topic_0017955381.xml", "product_code":"ecs", - "code":"49", + "code":"52", "des":"This section describes how to use the remote login tool MSTSC to log in to a Windows ECS from a local computer.The target ECS is running.You have obtained the password fo", "doc_type":"usermanual", "kw":"Logging In to a Windows ECS Using MSTSC,Logging In to a Windows ECS,User Guide", @@ -937,7 +994,7 @@ "uri":"en-us_topic_0275383051.html", "node_id":"en-us_topic_0275383051.xml", "product_code":"ecs", - "code":"50", + "code":"53", "des":"This section describes how to log in to a Windows ECS from a Linux computer.The target ECS is running.The ECS must have an EIP bound.Access to port 3389 is allowed in the", "doc_type":"usermanual", "kw":"Logging In to a Windows ECS from a Linux Computer,Logging In to a Windows ECS,User Guide", @@ -956,7 +1013,7 @@ "uri":"en-us_topic_0030831990.html", "node_id":"en-us_topic_0030831990.xml", "product_code":"ecs", - "code":"51", + "code":"54", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Logging In to a Linux ECS", @@ -975,7 +1032,7 @@ "uri":"en-us_topic_0013771089.html", "node_id":"en-us_topic_0013771089.xml", "product_code":"ecs", - "code":"52", + "code":"55", "des":"Only a running ECS can be logged in.For ECSs created using public images, login usernames, passwords, and constraints vary depending on OSs running on the ECSs. For detai", "doc_type":"usermanual", "kw":"Login Overview (Linux),Logging In to a Linux ECS,User Guide", @@ -994,7 +1051,7 @@ "uri":"en-us_topic_0093263550.html", "node_id":"en-us_topic_0093263550.xml", "product_code":"ecs", - "code":"53", + "code":"56", "des":"This section describes how to use VNC provided on the management console to log in to an ECS. This function applies to emergency O&M. In other scenarios, you are advised ", "doc_type":"usermanual", "kw":"Logging In to a Linux ECS Using VNC,Logging In to a Linux ECS,User Guide", @@ -1013,7 +1070,7 @@ "uri":"en-us_topic_0017955380.html", "node_id":"en-us_topic_0017955380.xml", "product_code":"ecs", - "code":"54", + "code":"57", "des":"This section describes how to use an SSH key pair to remotely log in to a Linux ECS from a Windows and a Linux server, respectively.You have obtained the private key file", "doc_type":"usermanual", "kw":"Logging In to a Linux ECS Using an SSH Key Pair,Logging In to a Linux ECS,User Guide", @@ -1032,7 +1089,7 @@ "uri":"en-us_topic_0017955633.html", "node_id":"en-us_topic_0017955633.xml", "product_code":"ecs", - "code":"55", + "code":"58", "des":"This section describes how to remotely log in to a Linux ECS using an SSH password from a Windows and a Linux server, respectively.Logging in to a Linux ECS using SSH pas", "doc_type":"usermanual", "kw":"Logging In to a Linux ECS Using an SSH Password,Logging In to a Linux ECS,User Guide", @@ -1051,7 +1108,7 @@ "uri":"en-us_topic_0133513874.html", "node_id":"en-us_topic_0133513874.xml", "product_code":"ecs", - "code":"56", + "code":"59", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Managing GPU Drivers of GPU-accelerated ECSs", @@ -1070,7 +1127,7 @@ "uri":"en-us_topic_0234802636.html", "node_id":"en-us_topic_0234802636.xml", "product_code":"ecs", - "code":"57", + "code":"60", "des":"Before using a GPU-accelerated ECS, make sure that a GPU driver has been installed on the ECS for GPU acceleration.GPU-accelerated ECSs support GRID and Tesla drivers.To ", "doc_type":"usermanual", "kw":"GPU Driver,Managing GPU Drivers of GPU-accelerated ECSs,User Guide", @@ -1089,7 +1146,7 @@ "uri":"en-us_topic_0213874991.html", "node_id":"en-us_topic_0213874991.xml", "product_code":"ecs", - "code":"58", + "code":"61", "des":"Before using a GPU-accelerated ECS, make sure that the desired Tesla driver and CUDA toolkit have been installed on the ECS. Otherwise, computing acceleration will not ta", "doc_type":"usermanual", "kw":"Obtaining a Tesla Driver and CUDA Toolkit,Managing GPU Drivers of GPU-accelerated ECSs,User Guide", @@ -1108,7 +1165,7 @@ "uri":"en-us_topic_0149610914.html", "node_id":"en-us_topic_0149610914.xml", "product_code":"ecs", - "code":"59", + "code":"62", "des":"To use graphics acceleration, such as OpenGL, DirectX, or Vulkan, install a GRID driver and separately purchase and configure a GRID license. The GRID driver with a vDWS ", "doc_type":"usermanual", "kw":"Manually Installing a GRID Driver on a GPU-accelerated ECS,Managing GPU Drivers of GPU-accelerated E", @@ -1127,7 +1184,7 @@ "uri":"en-us_topic_0149470468.html", "node_id":"en-us_topic_0149470468.xml", "product_code":"ecs", - "code":"60", + "code":"63", "des":"Before using a GPU-accelerated ECS, make sure that the desired Tesla driver and CUDA toolkit have been installed on the ECS for computing acceleration.A computing-acceler", "doc_type":"usermanual", "kw":"Manually Installing a Tesla Driver on a GPU-accelerated ECS,Managing GPU Drivers of GPU-accelerated ", @@ -1146,7 +1203,7 @@ "uri":"en-us_topic_0176502615.html", "node_id":"en-us_topic_0176502615.xml", "product_code":"ecs", - "code":"61", + "code":"64", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Managing ECS Configurations", @@ -1165,7 +1222,7 @@ "uri":"en-us_topic_0040630518.html", "node_id":"en-us_topic_0040630518.xml", "product_code":"ecs", - "code":"62", + "code":"65", "des":"The default time zone for an ECS is the one you selected when creating the image that was used to create the ECS. This section describes how to change the time zone for a", "doc_type":"usermanual", "kw":"Changing the Time Zone for an ECS,Managing ECS Configurations,User Guide", @@ -1184,7 +1241,7 @@ "uri":"en-us_topic_0140313879.html", "node_id":"en-us_topic_0140313879.xml", "product_code":"ecs", - "code":"63", + "code":"66", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Obtaining Metadata and Passing User Data", @@ -1203,7 +1260,7 @@ "uri":"en-us_topic_0042400609.html", "node_id":"en-us_topic_0042400609.xml", "product_code":"ecs", - "code":"64", + "code":"67", "des":"ECS metadata includes basic information of an ECS on the cloud platform, such as the ECS ID, hostname, and network information. ECS metadata can be obtained using either ", "doc_type":"usermanual", "kw":"Obtaining Metadata,Obtaining Metadata and Passing User Data,User Guide", @@ -1222,7 +1279,7 @@ "uri":"en-us_topic_0032380449.html", "node_id":"en-us_topic_0032380449.xml", "product_code":"ecs", - "code":"65", + "code":"68", "des":"Specify User Data to pass user data to ECSs to:Simplify ECS configuration.Initialize the ECS OS configuration.Upload your scripts to ECSs during ECS creation.Perform othe", "doc_type":"usermanual", "kw":"Passing User Data,Obtaining Metadata and Passing User Data,User Guide", @@ -1241,7 +1298,7 @@ "uri":"en-us_topic_0142266317.html", "node_id":"en-us_topic_0142266317.xml", "product_code":"ecs", - "code":"66", + "code":"69", "des":"After an ECS is created, you can change its name as needed.Multiple ECS names can be changed in a batch. After the change, the ECS names are the same.Log in to the manage", "doc_type":"usermanual", "kw":"Changing ECS Names,Managing ECS Configurations,User Guide", @@ -1260,7 +1317,7 @@ "uri":"en-us_topic_0133365988.html", "node_id":"en-us_topic_0133365988.xml", "product_code":"ecs", - "code":"67", + "code":"70", "des":"ECSs can be migrated:Between Dedicated Hosts (DeHs)From a DeH to a public resource poolFrom a public resource pool to a DeHThis section describes how to migrate an ECS fr", "doc_type":"usermanual", "kw":"Migrating an ECS to a DeH,Managing ECS Configurations,User Guide", @@ -1279,7 +1336,7 @@ "uri":"en-us_topic_0032980085.html", "node_id":"en-us_topic_0032980085.xml", "product_code":"ecs", - "code":"68", + "code":"71", "des":"An ECS group logically groups ECSs. ECSs in an ECS group comply with the same policy associated with the ECS group.Currently, only the anti-affinity policy is supported.Y", "doc_type":"usermanual", "kw":"Managing ECS Groups,Managing ECS Configurations,User Guide", @@ -1298,7 +1355,7 @@ "uri":"en-us_topic_0057711189.html", "node_id":"en-us_topic_0057711189.xml", "product_code":"ecs", - "code":"69", + "code":"72", "des":"When an ECS cannot start or run properly, you can download and view ECS console logs for troubleshooting, for example, checking whether the kernel and service configurati", "doc_type":"usermanual", "kw":"Obtaining ECS Console Logs,Managing ECS Configurations,User Guide", @@ -1317,7 +1374,7 @@ "uri":"en-us_topic_0074752335.html", "node_id":"en-us_topic_0074752335.xml", "product_code":"ecs", - "code":"70", + "code":"73", "des":"ECSs in the same VPC can communicate with each other using hostnames. In such a case, you are required to configure the mapping between hostnames and IP addresses. The co", "doc_type":"usermanual", "kw":"Configuring Mapping Between Hostnames and IP Addresses in the Same VPC,Managing ECS Configurations,U", @@ -1336,7 +1393,7 @@ "uri":"en-us_topic_0013771110.html", "node_id":"en-us_topic_0013771110.xml", "product_code":"ecs", - "code":"71", + "code":"74", "des":"You can start, stop, restart, or delete the ECS.To prevent a sudden load increase, you are advised to start or stop a small number of ECSs at a time.If an ECS remains in", "doc_type":"usermanual", "kw":"Starting and Stopping ECSs,Managing ECS Configurations,User Guide", @@ -1355,7 +1412,7 @@ "uri":"en-us_topic_0030828258.html", "node_id":"en-us_topic_0030828258.xml", "product_code":"ecs", - "code":"72", + "code":"75", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Modifying ECS Specifications (vCPUs and Memory)", @@ -1374,7 +1431,7 @@ "uri":"en-us_topic_0013771092.html", "node_id":"en-us_topic_0013771092.xml", "product_code":"ecs", - "code":"73", + "code":"76", "des":"If ECS specifications do not meet service requirements, you can modify the ECS specifications, including vCPUs and memory. Certain ECSs allow you to change their types wh", "doc_type":"usermanual", "kw":"Modifying Individual ECS Specifications,Modifying ECS Specifications (vCPUs and Memory),User Guide", @@ -1393,7 +1450,7 @@ "uri":"en-us_topic_0000001983533061.html", "node_id":"en-us_topic_0000001983533061.xml", "product_code":"ecs", - "code":"74", + "code":"77", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Reinstalling or Changing the OS", @@ -1412,7 +1469,7 @@ "uri":"en-us_topic_0024911405.html", "node_id":"en-us_topic_0024911405.xml", "product_code":"ecs", - "code":"75", + "code":"78", "des":"If the OS of an ECS fails to start or requires optimization, reinstall the OS.After the OS is reinstalled, the IP and MAC addresses of the ECS remain unchanged.Reinstalli", "doc_type":"usermanual", "kw":"Reinstalling the OS,Reinstalling or Changing the OS,User Guide", @@ -1431,7 +1488,7 @@ "uri":"en-us_topic_0031523135.html", "node_id":"en-us_topic_0031523135.xml", "product_code":"ecs", - "code":"76", + "code":"79", "des":"Changing an ECS OS will change the system disk attached to the ECS. After the change, the system disk ID of the ECS will be changed, and the original system disk will be ", "doc_type":"usermanual", "kw":"Changing the OS,Reinstalling or Changing the OS,User Guide", @@ -1450,7 +1507,7 @@ "uri":"en-us_topic_0030893661.html", "node_id":"en-us_topic_0030893661.xml", "product_code":"ecs", - "code":"77", + "code":"80", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Viewing ECS Information", @@ -1469,7 +1526,7 @@ "uri":"en-us_topic_0039588795.html", "node_id":"en-us_topic_0039588795.xml", "product_code":"ecs", - "code":"78", + "code":"81", "des":"After submitting the request for creating an ECS, you can view the creation status. This section describes how to view the creation status of an ECS.Log in to the managem", "doc_type":"usermanual", "kw":"Viewing ECS Creation Statuses,Viewing ECS Information,User Guide", @@ -1488,7 +1545,7 @@ "uri":"en-us_topic_0108255889.html", "node_id":"en-us_topic_0108255889.xml", "product_code":"ecs", - "code":"79", + "code":"82", "des":"You can view the details of failed task (if any) in the Failures area, including the task names and statuses. This section describes how to view failures.Table 1 lists th", "doc_type":"usermanual", "kw":"Viewing Failed Tasks,Viewing ECS Information,User Guide", @@ -1507,7 +1564,7 @@ "uri":"en-us_topic_0017130261.html", "node_id":"en-us_topic_0017130261.xml", "product_code":"ecs", - "code":"80", + "code":"83", "des":"After obtaining ECSs, you can view and manage them on the management console. This section describes how to view ECS configuration details, including its name, image, sys", "doc_type":"usermanual", "kw":"Viewing ECS Details (List View),Viewing ECS Information,User Guide", @@ -1526,7 +1583,7 @@ "uri":"en-us_topic_0060610074.html", "node_id":"en-us_topic_0060610074.xml", "product_code":"ecs", - "code":"81", + "code":"84", "des":"The information of all ECSs under your account can be exported in a CSV file to a local directory. The file includes the IDs, private IP addresses, and EIPs of your ECSs.", "doc_type":"usermanual", "kw":"Exporting ECS Information,Viewing ECS Information,User Guide", @@ -1545,7 +1602,7 @@ "uri":"en-us_topic_0000001630328828.html", "node_id":"en-us_topic_0000001630328828.xml", "product_code":"ecs", - "code":"82", + "code":"85", "des":"After purchasing an ECS, you can use the search function on the management console to search for ECSs in the current region. You can search for ECSs by name, ID, AZ, stat", "doc_type":"usermanual", "kw":"Searching for ECSs,Viewing ECS Information,User Guide", @@ -1564,7 +1621,7 @@ "uri":"en-us_topic_0177457774.html", "node_id":"en-us_topic_0177457774.xml", "product_code":"ecs", - "code":"83", + "code":"86", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Images", @@ -1583,7 +1640,7 @@ "uri":"en-us_topic_0177457773.html", "node_id":"en-us_topic_0177457773.xml", "product_code":"ecs", - "code":"84", + "code":"87", "des":"An image is an ECS or BMS template that contains an OS or service data. It may also contain proprietary software and application software, such as database software. Imag", "doc_type":"usermanual", "kw":"Overview,Images,User Guide", @@ -1602,7 +1659,7 @@ "uri":"en-us_topic_0101604508.html", "node_id":"en-us_topic_0101604508.xml", "product_code":"ecs", - "code":"85", + "code":"88", "des":"You can use an existing ECS to create a system disk image, data disk image, and full-ECS image.System disk image: contains an OS and application software for running serv", "doc_type":"usermanual", "kw":"Data disk image,Full-ECS image,Creating an Image,Images,User Guide", @@ -1621,7 +1678,7 @@ "uri":"en-us_topic_0092499770.html", "node_id":"en-us_topic_0092499770.xml", "product_code":"ecs", - "code":"86", + "code":"89", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Disks", @@ -1640,7 +1697,7 @@ "uri":"en-us_topic_0140313880.html", "node_id":"en-us_topic_0140313880.xml", "product_code":"ecs", - "code":"87", + "code":"90", "des":"Elastic Volume Service (EVS) offers scalable block storage for ECSs. With high reliability, high performance, and rich specifications, EVS disks can be used for distribut", "doc_type":"usermanual", "kw":"Overview,Disks,User Guide", @@ -1659,7 +1716,7 @@ "uri":"en-us_topic_0096293655.html", "node_id":"en-us_topic_0096293655.xml", "product_code":"ecs", - "code":"88", + "code":"91", "des":"If the existing disks of an ECS fail to meet service requirements, for example, due to insufficient disk space or poor disk performance, you can attach more available EVS", "doc_type":"usermanual", "kw":"Attaching a Disk to an ECS,Disks,User Guide", @@ -1678,7 +1735,7 @@ "uri":"en-us_topic_0036046828.html", "node_id":"en-us_topic_0036046828.xml", "product_code":"ecs", - "code":"89", + "code":"92", "des":"You can detach EVS disks from an ECS.System disks (mounted to /dev/sda or /dev/vda) can only be detached offline. They must be stopped before being detached.Data disks (m", "doc_type":"usermanual", "kw":"Detaching an EVS Disk from a Running ECS,Disks,User Guide", @@ -1697,7 +1754,7 @@ "uri":"en-us_topic_0093492522.html", "node_id":"en-us_topic_0093492522.xml", "product_code":"ecs", - "code":"90", + "code":"93", "des":"You can expand the disk capacity if the disk space is insufficient. The capacities of both system disks and data disks can be expanded.The capacity of an EVS disk can be ", "doc_type":"usermanual", "kw":"Expanding the Capacity of an EVS Disk,Disks,User Guide", @@ -1716,7 +1773,7 @@ "uri":"en-us_topic_0037470901.html", "node_id":"en-us_topic_0037470901.xml", "product_code":"ecs", - "code":"91", + "code":"94", "des":"Disk-intensive ECSs can use both local disks and EVS disks to store data. Local disks are generally used to store service data and feature higher throughput than EVS disk", "doc_type":"usermanual", "kw":"Expanding the Local Disks of a Disk-intensive ECS,Disks,User Guide", @@ -1735,7 +1792,7 @@ "uri":"en-us_topic_0092497777.html", "node_id":"en-us_topic_0092497777.xml", "product_code":"ecs", - "code":"92", + "code":"95", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"NICs", @@ -1754,7 +1811,7 @@ "uri":"en-us_topic_0093492518.html", "node_id":"en-us_topic_0093492518.xml", "product_code":"ecs", - "code":"93", + "code":"96", "des":"If your ECS requires multiple network interfaces, you can add them to your ECS.Log in to the management console.Click in the upper left corner and select your region and", "doc_type":"usermanual", "kw":"Adding a NIC,NICs,User Guide", @@ -1773,7 +1830,7 @@ "uri":"en-us_topic_0093492519.html", "node_id":"en-us_topic_0093492519.xml", "product_code":"ecs", - "code":"94", + "code":"97", "des":"An ECS can have up to 12 NICs, including one primary NIC that cannot be deleted. This section describes how to delete an extension NIC.Log in to the management console.Cl", "doc_type":"usermanual", "kw":"Deleting a NIC,NICs,User Guide", @@ -1792,7 +1849,7 @@ "uri":"en-us_topic_0133339807.html", "node_id":"en-us_topic_0133339807.xml", "product_code":"ecs", - "code":"95", + "code":"98", "des":"You can modify the private IP address of the NIC. If you want to modify the private IP address of an extension NIC, delete the NIC and attach a new NIC.The ECS must be st", "doc_type":"usermanual", "kw":"Modifying a Private IP Address,NICs,User Guide", @@ -1811,7 +1868,7 @@ "uri":"en-us_topic_0093492520.html", "node_id":"en-us_topic_0093492520.xml", "product_code":"ecs", - "code":"96", + "code":"99", "des":"A virtual IP address provides the second IP address for one or more ECS NICs, improving high availability between the ECSs.One NIC can be bound with up to 10 virtual IP a", "doc_type":"usermanual", "kw":"Managing Virtual IP Addresses,NICs,User Guide", @@ -1830,7 +1887,7 @@ "uri":"en-us_topic_0058758453.html", "node_id":"en-us_topic_0058758453.xml", "product_code":"ecs", - "code":"97", + "code":"100", "des":"With the increase of network I/O bandwidth, single-core CPUs face bottlenecks in handling network interrupts. NIC multi-queue assigns interrupts to different CPUs for hig", "doc_type":"usermanual", "kw":"Enabling NIC Multi-Queue,NICs,User Guide", @@ -1849,7 +1906,7 @@ "uri":"en-us_topic_0140963099.html", "node_id":"en-us_topic_0140963099.xml", "product_code":"ecs", - "code":"98", + "code":"101", "des":"IPv6 addresses are used to deal with IPv4 address exhaustion. If an ECS uses an IPv4 address, the ECS can run in dual-stack mode after IPv6 is enabled for it. Then, the E", "doc_type":"usermanual", "kw":"Dynamically Assigning IPv6 Addresses,NICs,User Guide", @@ -1868,7 +1925,7 @@ "uri":"en-us_topic_0140313883.html", "node_id":"en-us_topic_0140313883.xml", "product_code":"ecs", - "code":"99", + "code":"102", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"EIPs", @@ -1887,7 +1944,7 @@ "uri":"en-us_topic_0144542149.html", "node_id":"en-us_topic_0144542149.xml", "product_code":"ecs", - "code":"100", + "code":"103", "des":"The Elastic IP (EIP) service enables your cloud resources to communicate with the Internet using static public IP addresses and scalable bandwidths. EIPs can be bound to ", "doc_type":"usermanual", "kw":"Overview,EIPs,User Guide", @@ -1906,7 +1963,7 @@ "uri":"en-us_topic_0174917535.html", "node_id":"en-us_topic_0174917535.xml", "product_code":"ecs", - "code":"101", + "code":"104", "des":"You can assign an EIP and bind it to an ECS to enable the ECS to access the Internet.Log in to the management console.Click in the upper left corner and select your regi", "doc_type":"usermanual", "kw":"Binding an EIP,EIPs,User Guide", @@ -1925,7 +1982,7 @@ "uri":"en-us_topic_0240543420.html", "node_id":"en-us_topic_0240543420.xml", "product_code":"ecs", - "code":"102", + "code":"105", "des":"This section describes how to unbind an EIP from an ECS.Log in to the management console.Click in the upper left corner and select your region and project.Under Computin", "doc_type":"usermanual", "kw":"Unbinding an EIP,EIPs,User Guide", @@ -1944,7 +2001,7 @@ "uri":"en-us_topic_0093492521.html", "node_id":"en-us_topic_0093492521.xml", "product_code":"ecs", - "code":"103", + "code":"106", "des":"If an EIP has been bound to the ECS, the ECS can access the Internet using the bandwidth associated with the EIP. This section describes how to adjust the bandwidth of an", "doc_type":"usermanual", "kw":"Modifying an EIP Bandwidth,EIPs,User Guide", @@ -1963,7 +2020,7 @@ "uri":"en-us_topic_0027157850.html", "node_id":"en-us_topic_0027157850.xml", "product_code":"ecs", - "code":"104", + "code":"107", "des":"To ensure platform security and conserve EIPs, EIPs are assigned only to specified ECSs. ECSs without EIPs cannot access the Internet directly. If these ECSs need to acce", "doc_type":"usermanual", "kw":"Enabling Internet Connectivity for an ECS Without an EIP,EIPs,User Guide", @@ -1982,7 +2039,7 @@ "uri":"en-us_topic_0092499769.html", "node_id":"en-us_topic_0092499769.xml", "product_code":"ecs", - "code":"105", + "code":"108", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Security", @@ -2001,7 +2058,7 @@ "uri":"en-us_topic_0000001194242043.html", "node_id":"en-us_topic_0000001194242043.xml", "product_code":"ecs", - "code":"106", + "code":"109", "des":"If ECSs are not protected, they may be attacked by viruses, resulting in data leakage or data loss.You can use the methods introduced below to protect your ECSs from viru", "doc_type":"usermanual", "kw":"Methods for Improving ECS Security,Security,User Guide", @@ -2020,7 +2077,7 @@ "uri":"en-us_topic_0140323151.html", "node_id":"en-us_topic_0140323151.xml", "product_code":"ecs", - "code":"107", + "code":"110", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Security Groups", @@ -2039,7 +2096,7 @@ "uri":"en-us_topic_0140323157.html", "node_id":"en-us_topic_0140323157.xml", "product_code":"ecs", - "code":"108", + "code":"111", "des":"A security group is a collection of access control rules for ECSs that have the same security protection requirements and that are mutually trusted. After a security grou", "doc_type":"usermanual", "kw":"Overview,Security Groups,User Guide", @@ -2058,7 +2115,7 @@ "uri":"en-us_topic_0140323154.html", "node_id":"en-us_topic_0140323154.xml", "product_code":"ecs", - "code":"109", + "code":"112", "des":"Note the following when using default security group rules:Inbound rules control incoming traffic to instances in the default security group. The instances can only commu", "doc_type":"usermanual", "kw":"Default Security Groups and Rules,Security Groups,User Guide", @@ -2077,7 +2134,7 @@ "uri":"en-us_topic_0140323152.html", "node_id":"en-us_topic_0140323152.xml", "product_code":"ecs", - "code":"110", + "code":"113", "des":"When you create instances, such as cloud servers, containers, and databases, in a VPC subnet, you can use the default security group or create a security group. You can a", "doc_type":"usermanual", "kw":"Security Group Configuration Examples,Security Groups,User Guide", @@ -2096,7 +2153,7 @@ "uri":"en-us_topic_0030878383.html", "node_id":"en-us_topic_0030878383.xml", "product_code":"ecs", - "code":"111", + "code":"114", "des":"Similar to firewall, a security group is a logical group used to control network access. You can define access rules for a security group to protect the ECSs that are add", "doc_type":"usermanual", "kw":"Configuring Security Group Rules,Security Groups,User Guide", @@ -2115,7 +2172,7 @@ "uri":"en-us_topic_0093492517.html", "node_id":"en-us_topic_0093492517.xml", "product_code":"ecs", - "code":"112", + "code":"115", "des":"To change the security group associated with an ECS network interface, perform the operations described in this section.Changing the security group will overwrite the ori", "doc_type":"usermanual", "kw":"Changing a Security Group,Security Groups,User Guide", @@ -2134,7 +2191,7 @@ "uri":"en-us_topic_0206596990.html", "node_id":"en-us_topic_0206596990.xml", "product_code":"ecs", - "code":"113", + "code":"116", "des":"Host Security Service (HSS) helps you identify and manage the assets on your servers, eliminate risks, and defend against intrusions and web page tampering. There are als", "doc_type":"usermanual", "kw":"HSS,Security,User Guide", @@ -2153,7 +2210,7 @@ "uri":"en-us_topic_0096304614.html", "node_id":"en-us_topic_0096304614.xml", "product_code":"ecs", - "code":"114", + "code":"117", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Backup Using CBR", @@ -2172,7 +2229,7 @@ "uri":"en-us_topic_0000001128445638.html", "node_id":"en-us_topic_0000001128445638.xml", "product_code":"ecs", - "code":"115", + "code":"118", "des":"Cloud Backup and Recovery (CBR) enables you to back up cloud servers and disks with ease. In case of a virus attack, accidental deletion, or software or hardware fault, y", "doc_type":"usermanual", "kw":"Overview,Backup Using CBR,User Guide", @@ -2191,7 +2248,7 @@ "uri":"en-us_topic_0000001128604648.html", "node_id":"en-us_topic_0000001128604648.xml", "product_code":"ecs", - "code":"116", + "code":"119", "des":"Cloud Backup and Recovery (CBR) enhances data integrity and service continuity. For example, if an ECS or EVS disk is faulty or a misoperation causes data loss, you can u", "doc_type":"usermanual", "kw":"Backing Up an ECS,Backup Using CBR,User Guide", @@ -2210,7 +2267,7 @@ "uri":"en-us_topic_0140313881.html", "node_id":"en-us_topic_0140313881.xml", "product_code":"ecs", - "code":"117", + "code":"120", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Passwords and Key Pairs", @@ -2229,7 +2286,7 @@ "uri":"en-us_topic_0031073513.html", "node_id":"en-us_topic_0031073513.xml", "product_code":"ecs", - "code":"118", + "code":"121", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Password Reset", @@ -2248,7 +2305,7 @@ "uri":"en-us_topic_0035643949.html", "node_id":"en-us_topic_0035643949.xml", "product_code":"ecs", - "code":"119", + "code":"122", "des":"The password for logging in to your ECS is important and please keep it secure. You can reset the password if it is forgotten or expires.Table 1 provides guidance on how ", "doc_type":"usermanual", "kw":"Application Scenarios for Using Passwords,Password Reset,User Guide", @@ -2267,7 +2324,7 @@ "uri":"en-us_topic_0122627689.html", "node_id":"en-us_topic_0122627689.xml", "product_code":"ecs", - "code":"120", + "code":"123", "des":"This section describes how to reset the password for logging in to an ECS in the OS when the password is about to expire, the password is forgotten, or you are logging in", "doc_type":"usermanual", "kw":"Resetting the Password for Logging In to an ECS in the OS,Password Reset,User Guide", @@ -2286,7 +2343,7 @@ "uri":"en-us_topic_0021426802.html", "node_id":"en-us_topic_0021426802.xml", "product_code":"ecs", - "code":"121", + "code":"124", "des":"You can reset your ECS password if:The password is forgotten.The password has expired.The method described in this section can only be used to change the password of a lo", "doc_type":"usermanual", "kw":"Resetting the Password for Logging In to a Windows ECS,Password Reset,User Guide", @@ -2305,7 +2362,7 @@ "uri":"en-us_topic_0021427650.html", "node_id":"en-us_topic_0021427650.xml", "product_code":"ecs", - "code":"122", + "code":"125", "des":"Keep your password secure. Reset the password if:The password is forgotten.The password has expired.This section describes how to reset the password of user root. After r", "doc_type":"usermanual", "kw":"Resetting the Password for Logging In to a Linux ECS,Password Reset,User Guide", @@ -2324,7 +2381,7 @@ "uri":"en-us_topic_0000001234175322.html", "node_id":"en-us_topic_0000001234175322.xml", "product_code":"ecs", - "code":"123", + "code":"126", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Key Pairs", @@ -2343,7 +2400,7 @@ "uri":"en-us_topic_0000001278335673.html", "node_id":"en-us_topic_0000001278335673.xml", "product_code":"ecs", - "code":"124", + "code":"127", "des":"Key pairs are a set of security credentials for identity authentication when you remotely log in to ECSs.A key pair consists of a public key and a private key. Key Pair S", "doc_type":"usermanual", "kw":"Application Scenarios for Using Key Pairs,Key Pairs,User Guide", @@ -2362,7 +2419,7 @@ "uri":"en-us_topic_0000001278350057.html", "node_id":"en-us_topic_0000001278350057.xml", "product_code":"ecs", - "code":"125", + "code":"128", "des":"You can use the management console to create a key pair. ECS stores the public key and you store the private key.Log in to the management console.Click in the upper left", "doc_type":"usermanual", "kw":"(Recommended) Creating a Key Pair on the Management Console,Key Pairs,User Guide", @@ -2381,7 +2438,7 @@ "uri":"en-us_topic_0000001234335274.html", "node_id":"en-us_topic_0000001234335274.xml", "product_code":"ecs", - "code":"126", + "code":"129", "des":"You can use puttygen.exe to create a key pair and store both the public key and private key locally.Key pairs created using puttygen.exe must be imported by referring to ", "doc_type":"usermanual", "kw":"Creating a Key Pair Using PuTTY Key Generator,Key Pairs,User Guide", @@ -2400,7 +2457,7 @@ "uri":"en-us_topic_0000001278734873.html", "node_id":"en-us_topic_0000001278734873.xml", "product_code":"ecs", - "code":"127", + "code":"130", "des":"You need to import a key pair in either of the following scenarios:Create a key pair using PuTTYgen and import the public key to the ECS.Import the public key of an exist", "doc_type":"usermanual", "kw":"Importing a Key Pair,Key Pairs,User Guide", @@ -2419,7 +2476,7 @@ "uri":"en-us_topic_0000001234183498.html", "node_id":"en-us_topic_0000001234183498.xml", "product_code":"ecs", - "code":"128", + "code":"131", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Obtaining and Deleting the Password of a Windows ECS", @@ -2438,7 +2495,7 @@ "uri":"en-us_topic_0031107266.html", "node_id":"en-us_topic_0031107266.xml", "product_code":"ecs", - "code":"129", + "code":"132", "des":"Password authentication is required to log in to a Windows ECS. You must use the key file used when you created the ECS to obtain the administrator password generated dur", "doc_type":"usermanual", "kw":"Obtaining the Password for Logging In to a Windows ECS,Obtaining and Deleting the Password of a Wind", @@ -2457,7 +2514,7 @@ "uri":"en-us_topic_0031107267.html", "node_id":"en-us_topic_0031107267.xml", "product_code":"ecs", - "code":"130", + "code":"133", "des":"After you obtain the initial password, it is a good practice to delete it to ensure system security.Deleting the initial password does not affect ECS operation or login. ", "doc_type":"usermanual", "kw":"Deleting the Initial Password for Logging In to a Windows ECS,Obtaining and Deleting the Password of", @@ -2472,63 +2529,6 @@ "title":"Deleting the Initial Password for Logging In to a Windows ECS", "githuburl":"" }, - { - "uri":"en-us_topic_0170265910.html", - "node_id":"en-us_topic_0170265910.xml", - "product_code":"ecs", - "code":"131", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"Permissions Management", - "search_title":"", - "metedata":[ - { - "prodname":"ecs", - "documenttype":"usermanual", - "opensource":"false;true" - } - ], - "title":"Permissions Management", - "githuburl":"" - }, - { - "uri":"en-us_topic_0170265913.html", - "node_id":"en-us_topic_0170265913.xml", - "product_code":"ecs", - "code":"132", - "des":"Use IAM to implement fine-grained permissions control over your ECSs. With IAM, you can:Create IAM users for personnel based on your enterprise's organizational structure", - "doc_type":"usermanual", - "kw":"Creating a User and Granting ECS Permissions,Permissions Management,User Guide", - "search_title":"", - "metedata":[ - { - "prodname":"ecs", - "documenttype":"usermanual", - "opensource":"false;true" - } - ], - "title":"Creating a User and Granting ECS Permissions", - "githuburl":"" - }, - { - "uri":"en-us_topic_0170265914.html", - "node_id":"en-us_topic_0170265914.xml", - "product_code":"ecs", - "code":"133", - "des":"Custom policies can be created to supplement the system-defined policies of ECS. For the actions that can be added to custom policies, see \"Permissions and Supported Acti", - "doc_type":"usermanual", - "kw":"ECS Custom Policies,Permissions Management,User Guide", - "search_title":"", - "metedata":[ - { - "prodname":"ecs", - "documenttype":"usermanual", - "opensource":"false;true" - } - ], - "title":"ECS Custom Policies", - "githuburl":"" - }, { "uri":"en-us_topic_0183016706.html", "node_id":"en-us_topic_0183016706.xml", @@ -2781,9 +2781,9 @@ "node_id":"en-us_topic_0116262067.xml", "product_code":"ecs", "code":"147", - "des":"Cloud Trace Service (CTS) records user operations performed on ECSs and related resources for further query, auditing, and backtracking.CTS has been provisioned.", + "des":"Cloud Trace Service (CTS) records user operations performed on ECSs and related resources for further query, auditing, and backtracking.CTS has been enabled.", "doc_type":"usermanual", - "kw":"Key Operations Supported by CTS,Audit Using CTS,User Guide", + "kw":"ECS Operations Supported by CTS,Audit Using CTS,User Guide", "search_title":"", "metedata":[ { @@ -2792,7 +2792,7 @@ "opensource":"false;true" } ], - "title":"Key Operations Supported by CTS", + "title":"ECS Operations Supported by CTS", "githuburl":"" }, { @@ -2868,7 +2868,7 @@ "opensource":"false;true" } ], - "title":"What Should I Do If Error \"command ´gcc´ failed with exit status 1\" Occurs During PIP-based Software Installation", + "title":"What Should I Do If Error \"command ´gcc´ failed with exit status 1\" Occurs During PIP-based Software Installation?", "githuburl":"" }, { diff --git a/docs/ecs/umn/CLASS.TXT.json b/docs/ecs/umn/CLASS.TXT.json index 281d03ea..5a1a0675 100644 --- a/docs/ecs/umn/CLASS.TXT.json +++ b/docs/ecs/umn/CLASS.TXT.json @@ -395,6 +395,33 @@ "p_code":"39", "code":"44" }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"ecs", + "title":"Using IAM to Grant Access to ECS", + "uri":"en-us_topic_0170265910.html", + "doc_type":"usermanual", + "p_code":"", + "code":"45" + }, + { + "desc":"Use IAM to implement fine-grained permissions control over your ECSs. With IAM, you can:Create IAM users for personnel based on your enterprise's organizational structure", + "product_code":"ecs", + "title":"Creating a User and Granting ECS Permissions", + "uri":"en-us_topic_0170265913.html", + "doc_type":"usermanual", + "p_code":"45", + "code":"46" + }, + { + "desc":"Custom policies can be created to supplement the system-defined policies of ECS. For the actions that can be added to custom policies, see \"Permissions and Supported Acti", + "product_code":"ecs", + "title":"ECS Custom Policies", + "uri":"en-us_topic_0170265914.html", + "doc_type":"usermanual", + "p_code":"45", + "code":"47" + }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"ecs", @@ -402,7 +429,7 @@ "uri":"en-us_topic_0013771097.html", "doc_type":"usermanual", "p_code":"", - "code":"45" + "code":"48" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -410,8 +437,8 @@ "title":"Logging In to a Windows ECS", "uri":"en-us_topic_0030888079.html", "doc_type":"usermanual", - "p_code":"45", - "code":"46" + "p_code":"48", + "code":"49" }, { "desc":"Only a running ECS can be logged in.Login usernames, passwords, and constraints vary depending on OSs running on the ECSs created using a public image. For details, see P", @@ -419,8 +446,8 @@ "title":"Login Overview (Windows)", "uri":"en-us_topic_0092494943.html", "doc_type":"usermanual", - "p_code":"46", - "code":"47" + "p_code":"49", + "code":"50" }, { "desc":"This section describes how to use VNC provided on the management console to log in to an ECS. This function applies to emergency O&M. In other scenarios, you are advised ", @@ -428,8 +455,8 @@ "title":"Logging In to a Windows ECS Using VNC", "uri":"en-us_topic_0027268511.html", "doc_type":"usermanual", - "p_code":"46", - "code":"48" + "p_code":"49", + "code":"51" }, { "desc":"This section describes how to use the remote login tool MSTSC to log in to a Windows ECS from a local computer.The target ECS is running.You have obtained the password fo", @@ -437,8 +464,8 @@ "title":"Logging In to a Windows ECS Using MSTSC", "uri":"en-us_topic_0017955381.html", "doc_type":"usermanual", - "p_code":"46", - "code":"49" + "p_code":"49", + "code":"52" }, { "desc":"This section describes how to log in to a Windows ECS from a Linux computer.The target ECS is running.The ECS must have an EIP bound.Access to port 3389 is allowed in the", @@ -446,8 +473,8 @@ "title":"Logging In to a Windows ECS from a Linux Computer", "uri":"en-us_topic_0275383051.html", "doc_type":"usermanual", - "p_code":"46", - "code":"50" + "p_code":"49", + "code":"53" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -455,8 +482,8 @@ "title":"Logging In to a Linux ECS", "uri":"en-us_topic_0030831990.html", "doc_type":"usermanual", - "p_code":"45", - "code":"51" + "p_code":"48", + "code":"54" }, { "desc":"Only a running ECS can be logged in.For ECSs created using public images, login usernames, passwords, and constraints vary depending on OSs running on the ECSs. For detai", @@ -464,8 +491,8 @@ "title":"Login Overview (Linux)", "uri":"en-us_topic_0013771089.html", "doc_type":"usermanual", - "p_code":"51", - "code":"52" + "p_code":"54", + "code":"55" }, { "desc":"This section describes how to use VNC provided on the management console to log in to an ECS. This function applies to emergency O&M. In other scenarios, you are advised ", @@ -473,8 +500,8 @@ "title":"Logging In to a Linux ECS Using VNC", "uri":"en-us_topic_0093263550.html", "doc_type":"usermanual", - "p_code":"51", - "code":"53" + "p_code":"54", + "code":"56" }, { "desc":"This section describes how to use an SSH key pair to remotely log in to a Linux ECS from a Windows and a Linux server, respectively.You have obtained the private key file", @@ -482,8 +509,8 @@ "title":"Logging In to a Linux ECS Using an SSH Key Pair", "uri":"en-us_topic_0017955380.html", "doc_type":"usermanual", - "p_code":"51", - "code":"54" + "p_code":"54", + "code":"57" }, { "desc":"This section describes how to remotely log in to a Linux ECS using an SSH password from a Windows and a Linux server, respectively.Logging in to a Linux ECS using SSH pas", @@ -491,8 +518,8 @@ "title":"Logging In to a Linux ECS Using an SSH Password", "uri":"en-us_topic_0017955633.html", "doc_type":"usermanual", - "p_code":"51", - "code":"55" + "p_code":"54", + "code":"58" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -500,8 +527,8 @@ "title":"Managing GPU Drivers of GPU-accelerated ECSs", "uri":"en-us_topic_0133513874.html", "doc_type":"usermanual", - "p_code":"45", - "code":"56" + "p_code":"48", + "code":"59" }, { "desc":"Before using a GPU-accelerated ECS, make sure that a GPU driver has been installed on the ECS for GPU acceleration.GPU-accelerated ECSs support GRID and Tesla drivers.To ", @@ -509,8 +536,8 @@ "title":"GPU Driver", "uri":"en-us_topic_0234802636.html", "doc_type":"usermanual", - "p_code":"56", - "code":"57" + "p_code":"59", + "code":"60" }, { "desc":"Before using a GPU-accelerated ECS, make sure that the desired Tesla driver and CUDA toolkit have been installed on the ECS. Otherwise, computing acceleration will not ta", @@ -518,8 +545,8 @@ "title":"Obtaining a Tesla Driver and CUDA Toolkit", "uri":"en-us_topic_0213874991.html", "doc_type":"usermanual", - "p_code":"56", - "code":"58" + "p_code":"59", + "code":"61" }, { "desc":"To use graphics acceleration, such as OpenGL, DirectX, or Vulkan, install a GRID driver and separately purchase and configure a GRID license. The GRID driver with a vDWS ", @@ -527,8 +554,8 @@ "title":"Manually Installing a GRID Driver on a GPU-accelerated ECS", "uri":"en-us_topic_0149610914.html", "doc_type":"usermanual", - "p_code":"56", - "code":"59" + "p_code":"59", + "code":"62" }, { "desc":"Before using a GPU-accelerated ECS, make sure that the desired Tesla driver and CUDA toolkit have been installed on the ECS for computing acceleration.A computing-acceler", @@ -536,8 +563,8 @@ "title":"Manually Installing a Tesla Driver on a GPU-accelerated ECS", "uri":"en-us_topic_0149470468.html", "doc_type":"usermanual", - "p_code":"56", - "code":"60" + "p_code":"59", + "code":"63" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -545,8 +572,8 @@ "title":"Managing ECS Configurations", "uri":"en-us_topic_0176502615.html", "doc_type":"usermanual", - "p_code":"45", - "code":"61" + "p_code":"48", + "code":"64" }, { "desc":"The default time zone for an ECS is the one you selected when creating the image that was used to create the ECS. This section describes how to change the time zone for a", @@ -554,8 +581,8 @@ "title":"Changing the Time Zone for an ECS", "uri":"en-us_topic_0040630518.html", "doc_type":"usermanual", - "p_code":"61", - "code":"62" + "p_code":"64", + "code":"65" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -563,8 +590,8 @@ "title":"Obtaining Metadata and Passing User Data", "uri":"en-us_topic_0140313879.html", "doc_type":"usermanual", - "p_code":"61", - "code":"63" + "p_code":"64", + "code":"66" }, { "desc":"ECS metadata includes basic information of an ECS on the cloud platform, such as the ECS ID, hostname, and network information. ECS metadata can be obtained using either ", @@ -572,8 +599,8 @@ "title":"Obtaining Metadata", "uri":"en-us_topic_0042400609.html", "doc_type":"usermanual", - "p_code":"63", - "code":"64" + "p_code":"66", + "code":"67" }, { "desc":"Specify User Data to pass user data to ECSs to:Simplify ECS configuration.Initialize the ECS OS configuration.Upload your scripts to ECSs during ECS creation.Perform othe", @@ -581,8 +608,8 @@ "title":"Passing User Data", "uri":"en-us_topic_0032380449.html", "doc_type":"usermanual", - "p_code":"63", - "code":"65" + "p_code":"66", + "code":"68" }, { "desc":"After an ECS is created, you can change its name as needed.Multiple ECS names can be changed in a batch. After the change, the ECS names are the same.Log in to the manage", @@ -590,8 +617,8 @@ "title":"Changing ECS Names", "uri":"en-us_topic_0142266317.html", "doc_type":"usermanual", - "p_code":"61", - "code":"66" + "p_code":"64", + "code":"69" }, { "desc":"ECSs can be migrated:Between Dedicated Hosts (DeHs)From a DeH to a public resource poolFrom a public resource pool to a DeHThis section describes how to migrate an ECS fr", @@ -599,8 +626,8 @@ "title":"Migrating an ECS to a DeH", "uri":"en-us_topic_0133365988.html", "doc_type":"usermanual", - "p_code":"61", - "code":"67" + "p_code":"64", + "code":"70" }, { "desc":"An ECS group logically groups ECSs. ECSs in an ECS group comply with the same policy associated with the ECS group.Currently, only the anti-affinity policy is supported.Y", @@ -608,8 +635,8 @@ "title":"Managing ECS Groups", "uri":"en-us_topic_0032980085.html", "doc_type":"usermanual", - "p_code":"61", - "code":"68" + "p_code":"64", + "code":"71" }, { "desc":"When an ECS cannot start or run properly, you can download and view ECS console logs for troubleshooting, for example, checking whether the kernel and service configurati", @@ -617,8 +644,8 @@ "title":"Obtaining ECS Console Logs", "uri":"en-us_topic_0057711189.html", "doc_type":"usermanual", - "p_code":"61", - "code":"69" + "p_code":"64", + "code":"72" }, { "desc":"ECSs in the same VPC can communicate with each other using hostnames. In such a case, you are required to configure the mapping between hostnames and IP addresses. The co", @@ -626,8 +653,8 @@ "title":"Configuring Mapping Between Hostnames and IP Addresses in the Same VPC", "uri":"en-us_topic_0074752335.html", "doc_type":"usermanual", - "p_code":"61", - "code":"70" + "p_code":"64", + "code":"73" }, { "desc":"You can start, stop, restart, or delete the ECS.To prevent a sudden load increase, you are advised to start or stop a small number of ECSs at a time.If an ECS remains in", @@ -635,8 +662,8 @@ "title":"Starting and Stopping ECSs", "uri":"en-us_topic_0013771110.html", "doc_type":"usermanual", - "p_code":"61", - "code":"71" + "p_code":"64", + "code":"74" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -644,8 +671,8 @@ "title":"Modifying ECS Specifications (vCPUs and Memory)", "uri":"en-us_topic_0030828258.html", "doc_type":"usermanual", - "p_code":"45", - "code":"72" + "p_code":"48", + "code":"75" }, { "desc":"If ECS specifications do not meet service requirements, you can modify the ECS specifications, including vCPUs and memory. Certain ECSs allow you to change their types wh", @@ -653,8 +680,8 @@ "title":"Modifying Individual ECS Specifications", "uri":"en-us_topic_0013771092.html", "doc_type":"usermanual", - "p_code":"72", - "code":"73" + "p_code":"75", + "code":"76" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -662,8 +689,8 @@ "title":"Reinstalling or Changing the OS", "uri":"en-us_topic_0000001983533061.html", "doc_type":"usermanual", - "p_code":"45", - "code":"74" + "p_code":"48", + "code":"77" }, { "desc":"If the OS of an ECS fails to start or requires optimization, reinstall the OS.After the OS is reinstalled, the IP and MAC addresses of the ECS remain unchanged.Reinstalli", @@ -671,8 +698,8 @@ "title":"Reinstalling the OS", "uri":"en-us_topic_0024911405.html", "doc_type":"usermanual", - "p_code":"74", - "code":"75" + "p_code":"77", + "code":"78" }, { "desc":"Changing an ECS OS will change the system disk attached to the ECS. After the change, the system disk ID of the ECS will be changed, and the original system disk will be ", @@ -680,8 +707,8 @@ "title":"Changing the OS", "uri":"en-us_topic_0031523135.html", "doc_type":"usermanual", - "p_code":"74", - "code":"76" + "p_code":"77", + "code":"79" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -689,8 +716,8 @@ "title":"Viewing ECS Information", "uri":"en-us_topic_0030893661.html", "doc_type":"usermanual", - "p_code":"45", - "code":"77" + "p_code":"48", + "code":"80" }, { "desc":"After submitting the request for creating an ECS, you can view the creation status. This section describes how to view the creation status of an ECS.Log in to the managem", @@ -698,8 +725,8 @@ "title":"Viewing ECS Creation Statuses", "uri":"en-us_topic_0039588795.html", "doc_type":"usermanual", - "p_code":"77", - "code":"78" + "p_code":"80", + "code":"81" }, { "desc":"You can view the details of failed task (if any) in the Failures area, including the task names and statuses. This section describes how to view failures.Table 1 lists th", @@ -707,8 +734,8 @@ "title":"Viewing Failed Tasks", "uri":"en-us_topic_0108255889.html", "doc_type":"usermanual", - "p_code":"77", - "code":"79" + "p_code":"80", + "code":"82" }, { "desc":"After obtaining ECSs, you can view and manage them on the management console. This section describes how to view ECS configuration details, including its name, image, sys", @@ -716,8 +743,8 @@ "title":"Viewing ECS Details (List View)", "uri":"en-us_topic_0017130261.html", "doc_type":"usermanual", - "p_code":"77", - "code":"80" + "p_code":"80", + "code":"83" }, { "desc":"The information of all ECSs under your account can be exported in a CSV file to a local directory. The file includes the IDs, private IP addresses, and EIPs of your ECSs.", @@ -725,8 +752,8 @@ "title":"Exporting ECS Information", "uri":"en-us_topic_0060610074.html", "doc_type":"usermanual", - "p_code":"77", - "code":"81" + "p_code":"80", + "code":"84" }, { "desc":"After purchasing an ECS, you can use the search function on the management console to search for ECSs in the current region. You can search for ECSs by name, ID, AZ, stat", @@ -734,8 +761,8 @@ "title":"Searching for ECSs", "uri":"en-us_topic_0000001630328828.html", "doc_type":"usermanual", - "p_code":"77", - "code":"82" + "p_code":"80", + "code":"85" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -744,7 +771,7 @@ "uri":"en-us_topic_0177457774.html", "doc_type":"usermanual", "p_code":"", - "code":"83" + "code":"86" }, { "desc":"An image is an ECS or BMS template that contains an OS or service data. It may also contain proprietary software and application software, such as database software. Imag", @@ -752,8 +779,8 @@ "title":"Overview", "uri":"en-us_topic_0177457773.html", "doc_type":"usermanual", - "p_code":"83", - "code":"84" + "p_code":"86", + "code":"87" }, { "desc":"You can use an existing ECS to create a system disk image, data disk image, and full-ECS image.System disk image: contains an OS and application software for running serv", @@ -761,8 +788,8 @@ "title":"Creating an Image", "uri":"en-us_topic_0101604508.html", "doc_type":"usermanual", - "p_code":"83", - "code":"85" + "p_code":"86", + "code":"88" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -771,7 +798,7 @@ "uri":"en-us_topic_0092499770.html", "doc_type":"usermanual", "p_code":"", - "code":"86" + "code":"89" }, { "desc":"Elastic Volume Service (EVS) offers scalable block storage for ECSs. With high reliability, high performance, and rich specifications, EVS disks can be used for distribut", @@ -779,8 +806,8 @@ "title":"Overview", "uri":"en-us_topic_0140313880.html", "doc_type":"usermanual", - "p_code":"86", - "code":"87" + "p_code":"89", + "code":"90" }, { "desc":"If the existing disks of an ECS fail to meet service requirements, for example, due to insufficient disk space or poor disk performance, you can attach more available EVS", @@ -788,8 +815,8 @@ "title":"Attaching a Disk to an ECS", "uri":"en-us_topic_0096293655.html", "doc_type":"usermanual", - "p_code":"86", - "code":"88" + "p_code":"89", + "code":"91" }, { "desc":"You can detach EVS disks from an ECS.System disks (mounted to /dev/sda or /dev/vda) can only be detached offline. They must be stopped before being detached.Data disks (m", @@ -797,8 +824,8 @@ "title":"Detaching an EVS Disk from a Running ECS", "uri":"en-us_topic_0036046828.html", "doc_type":"usermanual", - "p_code":"86", - "code":"89" + "p_code":"89", + "code":"92" }, { "desc":"You can expand the disk capacity if the disk space is insufficient. The capacities of both system disks and data disks can be expanded.The capacity of an EVS disk can be ", @@ -806,8 +833,8 @@ "title":"Expanding the Capacity of an EVS Disk", "uri":"en-us_topic_0093492522.html", "doc_type":"usermanual", - "p_code":"86", - "code":"90" + "p_code":"89", + "code":"93" }, { "desc":"Disk-intensive ECSs can use both local disks and EVS disks to store data. Local disks are generally used to store service data and feature higher throughput than EVS disk", @@ -815,8 +842,8 @@ "title":"Expanding the Local Disks of a Disk-intensive ECS", "uri":"en-us_topic_0037470901.html", "doc_type":"usermanual", - "p_code":"86", - "code":"91" + "p_code":"89", + "code":"94" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -825,7 +852,7 @@ "uri":"en-us_topic_0092497777.html", "doc_type":"usermanual", "p_code":"", - "code":"92" + "code":"95" }, { "desc":"If your ECS requires multiple network interfaces, you can add them to your ECS.Log in to the management console.Click in the upper left corner and select your region and", @@ -833,8 +860,8 @@ "title":"Adding a NIC", "uri":"en-us_topic_0093492518.html", "doc_type":"usermanual", - "p_code":"92", - "code":"93" + "p_code":"95", + "code":"96" }, { "desc":"An ECS can have up to 12 NICs, including one primary NIC that cannot be deleted. This section describes how to delete an extension NIC.Log in to the management console.Cl", @@ -842,8 +869,8 @@ "title":"Deleting a NIC", "uri":"en-us_topic_0093492519.html", "doc_type":"usermanual", - "p_code":"92", - "code":"94" + "p_code":"95", + "code":"97" }, { "desc":"You can modify the private IP address of the NIC. If you want to modify the private IP address of an extension NIC, delete the NIC and attach a new NIC.The ECS must be st", @@ -851,8 +878,8 @@ "title":"Modifying a Private IP Address", "uri":"en-us_topic_0133339807.html", "doc_type":"usermanual", - "p_code":"92", - "code":"95" + "p_code":"95", + "code":"98" }, { "desc":"A virtual IP address provides the second IP address for one or more ECS NICs, improving high availability between the ECSs.One NIC can be bound with up to 10 virtual IP a", @@ -860,8 +887,8 @@ "title":"Managing Virtual IP Addresses", "uri":"en-us_topic_0093492520.html", "doc_type":"usermanual", - "p_code":"92", - "code":"96" + "p_code":"95", + "code":"99" }, { "desc":"With the increase of network I/O bandwidth, single-core CPUs face bottlenecks in handling network interrupts. NIC multi-queue assigns interrupts to different CPUs for hig", @@ -869,8 +896,8 @@ "title":"Enabling NIC Multi-Queue", "uri":"en-us_topic_0058758453.html", "doc_type":"usermanual", - "p_code":"92", - "code":"97" + "p_code":"95", + "code":"100" }, { "desc":"IPv6 addresses are used to deal with IPv4 address exhaustion. If an ECS uses an IPv4 address, the ECS can run in dual-stack mode after IPv6 is enabled for it. Then, the E", @@ -878,8 +905,8 @@ "title":"Dynamically Assigning IPv6 Addresses", "uri":"en-us_topic_0140963099.html", "doc_type":"usermanual", - "p_code":"92", - "code":"98" + "p_code":"95", + "code":"101" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -888,7 +915,7 @@ "uri":"en-us_topic_0140313883.html", "doc_type":"usermanual", "p_code":"", - "code":"99" + "code":"102" }, { "desc":"The Elastic IP (EIP) service enables your cloud resources to communicate with the Internet using static public IP addresses and scalable bandwidths. EIPs can be bound to ", @@ -896,8 +923,8 @@ "title":"Overview", "uri":"en-us_topic_0144542149.html", "doc_type":"usermanual", - "p_code":"99", - "code":"100" + "p_code":"102", + "code":"103" }, { "desc":"You can assign an EIP and bind it to an ECS to enable the ECS to access the Internet.Log in to the management console.Click in the upper left corner and select your regi", @@ -905,8 +932,8 @@ "title":"Binding an EIP", "uri":"en-us_topic_0174917535.html", "doc_type":"usermanual", - "p_code":"99", - "code":"101" + "p_code":"102", + "code":"104" }, { "desc":"This section describes how to unbind an EIP from an ECS.Log in to the management console.Click in the upper left corner and select your region and project.Under Computin", @@ -914,8 +941,8 @@ "title":"Unbinding an EIP", "uri":"en-us_topic_0240543420.html", "doc_type":"usermanual", - "p_code":"99", - "code":"102" + "p_code":"102", + "code":"105" }, { "desc":"If an EIP has been bound to the ECS, the ECS can access the Internet using the bandwidth associated with the EIP. This section describes how to adjust the bandwidth of an", @@ -923,8 +950,8 @@ "title":"Modifying an EIP Bandwidth", "uri":"en-us_topic_0093492521.html", "doc_type":"usermanual", - "p_code":"99", - "code":"103" + "p_code":"102", + "code":"106" }, { "desc":"To ensure platform security and conserve EIPs, EIPs are assigned only to specified ECSs. ECSs without EIPs cannot access the Internet directly. If these ECSs need to acce", @@ -932,8 +959,8 @@ "title":"Enabling Internet Connectivity for an ECS Without an EIP", "uri":"en-us_topic_0027157850.html", "doc_type":"usermanual", - "p_code":"99", - "code":"104" + "p_code":"102", + "code":"107" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -942,7 +969,7 @@ "uri":"en-us_topic_0092499769.html", "doc_type":"usermanual", "p_code":"", - "code":"105" + "code":"108" }, { "desc":"If ECSs are not protected, they may be attacked by viruses, resulting in data leakage or data loss.You can use the methods introduced below to protect your ECSs from viru", @@ -950,8 +977,8 @@ "title":"Methods for Improving ECS Security", "uri":"en-us_topic_0000001194242043.html", "doc_type":"usermanual", - "p_code":"105", - "code":"106" + "p_code":"108", + "code":"109" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -959,8 +986,8 @@ "title":"Security Groups", "uri":"en-us_topic_0140323151.html", "doc_type":"usermanual", - "p_code":"105", - "code":"107" + "p_code":"108", + "code":"110" }, { "desc":"A security group is a collection of access control rules for ECSs that have the same security protection requirements and that are mutually trusted. After a security grou", @@ -968,8 +995,8 @@ "title":"Overview", "uri":"en-us_topic_0140323157.html", "doc_type":"usermanual", - "p_code":"107", - "code":"108" + "p_code":"110", + "code":"111" }, { "desc":"Note the following when using default security group rules:Inbound rules control incoming traffic to instances in the default security group. The instances can only commu", @@ -977,8 +1004,8 @@ "title":"Default Security Groups and Rules", "uri":"en-us_topic_0140323154.html", "doc_type":"usermanual", - "p_code":"107", - "code":"109" + "p_code":"110", + "code":"112" }, { "desc":"When you create instances, such as cloud servers, containers, and databases, in a VPC subnet, you can use the default security group or create a security group. You can a", @@ -986,8 +1013,8 @@ "title":"Security Group Configuration Examples", "uri":"en-us_topic_0140323152.html", "doc_type":"usermanual", - "p_code":"107", - "code":"110" + "p_code":"110", + "code":"113" }, { "desc":"Similar to firewall, a security group is a logical group used to control network access. You can define access rules for a security group to protect the ECSs that are add", @@ -995,8 +1022,8 @@ "title":"Configuring Security Group Rules", "uri":"en-us_topic_0030878383.html", "doc_type":"usermanual", - "p_code":"107", - "code":"111" + "p_code":"110", + "code":"114" }, { "desc":"To change the security group associated with an ECS network interface, perform the operations described in this section.Changing the security group will overwrite the ori", @@ -1004,8 +1031,8 @@ "title":"Changing a Security Group", "uri":"en-us_topic_0093492517.html", "doc_type":"usermanual", - "p_code":"107", - "code":"112" + "p_code":"110", + "code":"115" }, { "desc":"Host Security Service (HSS) helps you identify and manage the assets on your servers, eliminate risks, and defend against intrusions and web page tampering. There are als", @@ -1013,8 +1040,8 @@ "title":"HSS", "uri":"en-us_topic_0206596990.html", "doc_type":"usermanual", - "p_code":"105", - "code":"113" + "p_code":"108", + "code":"116" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -1023,7 +1050,7 @@ "uri":"en-us_topic_0096304614.html", "doc_type":"usermanual", "p_code":"", - "code":"114" + "code":"117" }, { "desc":"Cloud Backup and Recovery (CBR) enables you to back up cloud servers and disks with ease. In case of a virus attack, accidental deletion, or software or hardware fault, y", @@ -1031,8 +1058,8 @@ "title":"Overview", "uri":"en-us_topic_0000001128445638.html", "doc_type":"usermanual", - "p_code":"114", - "code":"115" + "p_code":"117", + "code":"118" }, { "desc":"Cloud Backup and Recovery (CBR) enhances data integrity and service continuity. For example, if an ECS or EVS disk is faulty or a misoperation causes data loss, you can u", @@ -1040,8 +1067,8 @@ "title":"Backing Up an ECS", "uri":"en-us_topic_0000001128604648.html", "doc_type":"usermanual", - "p_code":"114", - "code":"116" + "p_code":"117", + "code":"119" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -1050,7 +1077,7 @@ "uri":"en-us_topic_0140313881.html", "doc_type":"usermanual", "p_code":"", - "code":"117" + "code":"120" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -1058,8 +1085,8 @@ "title":"Password Reset", "uri":"en-us_topic_0031073513.html", "doc_type":"usermanual", - "p_code":"117", - "code":"118" + "p_code":"120", + "code":"121" }, { "desc":"The password for logging in to your ECS is important and please keep it secure. You can reset the password if it is forgotten or expires.Table 1 provides guidance on how ", @@ -1067,8 +1094,8 @@ "title":"Application Scenarios for Using Passwords", "uri":"en-us_topic_0035643949.html", "doc_type":"usermanual", - "p_code":"118", - "code":"119" + "p_code":"121", + "code":"122" }, { "desc":"This section describes how to reset the password for logging in to an ECS in the OS when the password is about to expire, the password is forgotten, or you are logging in", @@ -1076,8 +1103,8 @@ "title":"Resetting the Password for Logging In to an ECS in the OS", "uri":"en-us_topic_0122627689.html", "doc_type":"usermanual", - "p_code":"118", - "code":"120" + "p_code":"121", + "code":"123" }, { "desc":"You can reset your ECS password if:The password is forgotten.The password has expired.The method described in this section can only be used to change the password of a lo", @@ -1085,8 +1112,8 @@ "title":"Resetting the Password for Logging In to a Windows ECS", "uri":"en-us_topic_0021426802.html", "doc_type":"usermanual", - "p_code":"118", - "code":"121" + "p_code":"121", + "code":"124" }, { "desc":"Keep your password secure. Reset the password if:The password is forgotten.The password has expired.This section describes how to reset the password of user root. After r", @@ -1094,8 +1121,8 @@ "title":"Resetting the Password for Logging In to a Linux ECS", "uri":"en-us_topic_0021427650.html", "doc_type":"usermanual", - "p_code":"118", - "code":"122" + "p_code":"121", + "code":"125" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -1103,8 +1130,8 @@ "title":"Key Pairs", "uri":"en-us_topic_0000001234175322.html", "doc_type":"usermanual", - "p_code":"117", - "code":"123" + "p_code":"120", + "code":"126" }, { "desc":"Key pairs are a set of security credentials for identity authentication when you remotely log in to ECSs.A key pair consists of a public key and a private key. Key Pair S", @@ -1112,8 +1139,8 @@ "title":"Application Scenarios for Using Key Pairs", "uri":"en-us_topic_0000001278335673.html", "doc_type":"usermanual", - "p_code":"123", - "code":"124" + "p_code":"126", + "code":"127" }, { "desc":"You can use the management console to create a key pair. ECS stores the public key and you store the private key.Log in to the management console.Click in the upper left", @@ -1121,8 +1148,8 @@ "title":"(Recommended) Creating a Key Pair on the Management Console", "uri":"en-us_topic_0000001278350057.html", "doc_type":"usermanual", - "p_code":"123", - "code":"125" + "p_code":"126", + "code":"128" }, { "desc":"You can use puttygen.exe to create a key pair and store both the public key and private key locally.Key pairs created using puttygen.exe must be imported by referring to ", @@ -1130,8 +1157,8 @@ "title":"Creating a Key Pair Using PuTTY Key Generator", "uri":"en-us_topic_0000001234335274.html", "doc_type":"usermanual", - "p_code":"123", - "code":"126" + "p_code":"126", + "code":"129" }, { "desc":"You need to import a key pair in either of the following scenarios:Create a key pair using PuTTYgen and import the public key to the ECS.Import the public key of an exist", @@ -1139,8 +1166,8 @@ "title":"Importing a Key Pair", "uri":"en-us_topic_0000001278734873.html", "doc_type":"usermanual", - "p_code":"123", - "code":"127" + "p_code":"126", + "code":"130" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -1148,8 +1175,8 @@ "title":"Obtaining and Deleting the Password of a Windows ECS", "uri":"en-us_topic_0000001234183498.html", "doc_type":"usermanual", - "p_code":"123", - "code":"128" + "p_code":"126", + "code":"131" }, { "desc":"Password authentication is required to log in to a Windows ECS. You must use the key file used when you created the ECS to obtain the administrator password generated dur", @@ -1157,8 +1184,8 @@ "title":"Obtaining the Password for Logging In to a Windows ECS", "uri":"en-us_topic_0031107266.html", "doc_type":"usermanual", - "p_code":"128", - "code":"129" + "p_code":"131", + "code":"132" }, { "desc":"After you obtain the initial password, it is a good practice to delete it to ensure system security.Deleting the initial password does not affect ECS operation or login. ", @@ -1166,33 +1193,6 @@ "title":"Deleting the Initial Password for Logging In to a Windows ECS", "uri":"en-us_topic_0031107267.html", "doc_type":"usermanual", - "p_code":"128", - "code":"130" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"ecs", - "title":"Permissions Management", - "uri":"en-us_topic_0170265910.html", - "doc_type":"usermanual", - "p_code":"", - "code":"131" - }, - { - "desc":"Use IAM to implement fine-grained permissions control over your ECSs. With IAM, you can:Create IAM users for personnel based on your enterprise's organizational structure", - "product_code":"ecs", - "title":"Creating a User and Granting ECS Permissions", - "uri":"en-us_topic_0170265913.html", - "doc_type":"usermanual", - "p_code":"131", - "code":"132" - }, - { - "desc":"Custom policies can be created to supplement the system-defined policies of ECS. For the actions that can be added to custom policies, see \"Permissions and Supported Acti", - "product_code":"ecs", - "title":"ECS Custom Policies", - "uri":"en-us_topic_0170265914.html", - "doc_type":"usermanual", "p_code":"131", "code":"133" }, @@ -1314,9 +1314,9 @@ "code":"146" }, { - "desc":"Cloud Trace Service (CTS) records user operations performed on ECSs and related resources for further query, auditing, and backtracking.CTS has been provisioned.", + "desc":"Cloud Trace Service (CTS) records user operations performed on ECSs and related resources for further query, auditing, and backtracking.CTS has been enabled.", "product_code":"ecs", - "title":"Key Operations Supported by CTS", + "title":"ECS Operations Supported by CTS", "uri":"en-us_topic_0116262067.html", "doc_type":"usermanual", "p_code":"146", @@ -1352,7 +1352,7 @@ { "desc":"When installing the Python library software, you need to configure the PIP source. Take the official image source as an example:[root@test home]# cat /root/.pip/pip.conf ", "product_code":"ecs", - "title":"What Should I Do If Error \"command ´gcc´ failed with exit status 1\" Occurs During PIP-based Software Installation", + "title":"What Should I Do If Error \"command ´gcc´ failed with exit status 1\" Occurs During PIP-based Software Installation?", "uri":"en-us_topic_0107412162.html", "doc_type":"usermanual", "p_code":"149", diff --git a/docs/ecs/umn/en-us_image_0000002065205609.png b/docs/ecs/umn/en-us_image_0000002065205609.png deleted file mode 100644 index 64ad10b4..00000000 Binary files a/docs/ecs/umn/en-us_image_0000002065205609.png and /dev/null differ diff --git a/docs/ecs/umn/en-us_image_0000002065206257.png b/docs/ecs/umn/en-us_image_0000002065206257.png deleted file mode 100644 index 20d580e3..00000000 Binary files a/docs/ecs/umn/en-us_image_0000002065206257.png and /dev/null differ diff --git a/docs/ecs/umn/en-us_image_0000002076320880.png b/docs/ecs/umn/en-us_image_0000002076320880.png new file mode 100644 index 00000000..a62207ee Binary files /dev/null and b/docs/ecs/umn/en-us_image_0000002076320880.png differ diff --git a/docs/ecs/umn/en-us_image_0000002076474708.png b/docs/ecs/umn/en-us_image_0000002076474708.png new file mode 100644 index 00000000..f6cc2dec Binary files /dev/null and b/docs/ecs/umn/en-us_image_0000002076474708.png differ diff --git a/docs/ecs/umn/en-us_topic_0000001630328828.html b/docs/ecs/umn/en-us_topic_0000001630328828.html index 1c8efc1e..0beebee3 100644 --- a/docs/ecs/umn/en-us_topic_0000001630328828.html +++ b/docs/ecs/umn/en-us_topic_0000001630328828.html @@ -109,8 +109,8 @@

Example 4: Searching by Tags

You can search by tag key-value pair.

You can add one or more tags. If keys are different, the tags are automatically joined with AND.

If the keys are the same but the values are different, the tags are also automatically joined with AND.

-
diff --git a/docs/ecs/umn/en-us_topic_0024911405.html b/docs/ecs/umn/en-us_topic_0024911405.html index 88a608b4..06270444 100644 --- a/docs/ecs/umn/en-us_topic_0024911405.html +++ b/docs/ecs/umn/en-us_topic_0024911405.html @@ -10,8 +10,8 @@

Prerequisites

-

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select your region and project.
  3. Under Computing, choose Elastic Cloud Server.
  4. Locate the row containing the target ECS and choose More > Manage Image/Backup > Reinstall OS in the Operation column.

    Only stopped ECSs support OS reinstallation. If the ECS is not stopped, stop it before proceeding with reinstallation.

    -
  5. (Optional) Select the Encrypted option to encrypt the system disk during OS reinstallation.

    To enable encryption, click Create Xrole to assign KMS access permissions to EVS. If you have rights granting permission, assign the KMS access permissions to EVS. If you do not have the permission, contact the user having the security administrator rights to assign the KMS access permissions. For details, see Can All Users Use the Encryption Feature?

    +

    Procedure

    1. Log in to the management console.
    2. Click in the upper left corner and select your region and project.
    3. Under Computing, choose Elastic Cloud Server.
    4. Locate the row containing the target ECS and choose More > Manage Image/Backup > Reinstall OS in the Operation column.

      Only stopped ECSs support OS reinstallation. If the ECS is not stopped, stop it before proceeding with reinstallation.

      +
    5. (Optional) Select the Encrypted option to encrypt the system disk during OS reinstallation.

      To enable encryption, click Create Xrole to assign KMS access permissions to EVS. If you have rights granting permissions, assign the KMS access permissions to EVS. If you do not have the required permissions, contact the user who has the Security Administrator permissions to assign the KMS access permissions. For details, see Can All Users Use the Encryption Feature?

      Encryption parameters are as follows:

      • Encryption: indicates that the EVS disk has been encrypted.
      • Create Xrole: assigns KMS access permissions to EVS to obtain KMS keys. After the permissions are assigned, follow-up operations do not require assigning permissions again.
      • Xrole Name: set to EVSAccessKMS, which means that permissions have been assigned to EVS to obtain KMS keys for encrypting or decrypting EVS disks.
      • KMS Key Name: specifies the name of the key used by the encrypted EVS disk. You can select an existing key, or click Create KMS Key and create a new one on the KMS console. The default value is evs/default.
      • KMS Key ID: specifies the ID of the key used by the encrypted data disk.
    6. (Optional) Select a License Type (Use license from the system or Bring your own license (BYOL)) if the reinstalled OS running on your ECS is billed. For more details, see License Types.

      The following OSs are billed:

      diff --git a/docs/ecs/umn/en-us_topic_0027157850.html b/docs/ecs/umn/en-us_topic_0027157850.html index a678e78e..9e66e3e6 100644 --- a/docs/ecs/umn/en-us_topic_0027157850.html +++ b/docs/ecs/umn/en-us_topic_0027157850.html @@ -45,7 +45,7 @@
    7. Check whether SNAT has been configured.

      iptables -t nat --list

      SNAT has been configured if information similar to Figure 2 is displayed.

      Figure 2 Successful SNAT configuration
      -
    8. Add a route.
      1. Log in to the management console.
      2. Click in the upper left corner and select your region and project.
      3. Under Network, click Virtual Private Cloud.
      4. Choose Route Tables in the left navigation pane. In the route table list, click a target route table. On the displayed page, click Add Route.
      5. Set route information on the displayed page.
        • Destination: indicates the destination network segment. The default value is 0.0.0.0/0.
        • Next Hop: indicates the private IP address of the proxy ECS.

          You can obtain the private IP address of the ECS on the Elastic Cloud Server page.

          +
        • Add a route.
          1. Log in to the management console.
          2. Click in the upper left corner and select your region and project.
          3. Under Network, click Virtual Private Cloud.
          4. Choose Route Tables in the left navigation pane. In the route table list, click a target route table. On the displayed page, click Add Route.
          5. Set route information on the displayed page.
            • Destination: indicates the destination network segment. The default value is 0.0.0.0/0.
            • Next Hop: indicates the private IP address of the proxy ECS.

              You can obtain the private IP address of the ECS on the Elastic Cloud Server page.

        • Delete the added iptables rules as needed.

          iptables -t nat -D POSTROUTING -o eth0 -s subnet/netmask-bits -j SNAT --to nat-instance-ip

          diff --git a/docs/ecs/umn/en-us_topic_0027371530.html b/docs/ecs/umn/en-us_topic_0027371530.html index 298bf96e..d067cf79 100644 --- a/docs/ecs/umn/en-us_topic_0027371530.html +++ b/docs/ecs/umn/en-us_topic_0027371530.html @@ -11,7 +11,7 @@
        • The target ECS has been properly running for at least 10 minutes.

          The monitoring data and graphics are available for a new ECS after the ECS runs for at least 10 minutes.

    -

    Procedure

    1. Log in to the management console.
    2. Click in the upper left corner and select your region and project.
    3. Under Computing, click Elastic Cloud Server.
    4. In the search box above the upper right corner of the ECS list, enter the ECS name, IP address, or ID for search.
    5. Click the name of the target ECS. The page providing details about the ECS is displayed.
    6. Click the Monitoring tab to view the monitoring data.
    7. In the ECS monitoring area, select a duration to view the monitoring data.

      You can view the monitoring data of the ECS in the last 1 hour, last 3 hours, last 12 hours, last 1 day, or last 7 days.

      +

      Procedure

      1. Log in to the management console.
      2. Click in the upper left corner and select your region and project.
      3. Under Computing, click Elastic Cloud Server.
      4. In the search box above the upper right corner of the ECS list, enter the ECS name, IP address, or ID to search for the target ECS.
      5. Click the name of the target ECS. The page providing details about the ECS is displayed.
      6. Click the Monitoring tab to view the monitoring data.
      7. In the ECS monitoring area, select a duration to view the monitoring data.

        You can view the monitoring data of the ECS in the last 1 hour, last 3 hours, last 12 hours, last 1 day, or last 7 days.

    diff --git a/docs/ecs/umn/en-us_topic_0030878383.html b/docs/ecs/umn/en-us_topic_0030878383.html index 34189033..d29508ba 100644 --- a/docs/ecs/umn/en-us_topic_0030878383.html +++ b/docs/ecs/umn/en-us_topic_0030878383.html @@ -7,110 +7,113 @@

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select your region and project.
  3. Under Computing, click Elastic Cloud Server.
  4. On the Elastic Cloud Server page, click the name of the target ECS.

    The page providing details about the ECS is displayed.

  5. Click the Security Groups tab, expand the information of the security group, and view security group rules.
  6. Click the security group ID.

    The system automatically switches to the security group details page.

    -
  7. Configure required parameters.

    You can click + to add more inbound rules.

    -
    Figure 1 Add Inbound Rule
    +
  8. On the Inbound Rules tab, click Add Rule.

    The Add Inbound Rule dialog box is displayed.

    +
  9. Configure required parameters.

    You can click + to add more inbound rules.

    +
    Figure 1 Adding inbound rules
    -
    Table 1 Inbound rule parameter description

    Parameter

    +
    - - - - - - - - - - - - - - - - -
    Table 1 Inbound rule parameter description

    Parameter

    Description

    +

    Description

    Example Value

    +

    Example Value

    Protocol

    +

    Protocol

    The network protocol used to match traffic in a security group rule.

    -

    Currently, the value can be All, TCP, UDP, GRE, ICMP, or more.

    +

    The network protocol used to match traffic in a security group rule.

    +

    Currently, the value can be All, TCP, UDP, GRE, ICMP, or more.

    TCP

    +

    TCP

    Port

    +

    Port

    The port or port range over which traffic can reach your ECS. The value can be from 1 to 65535.

    +

    The port or port range over which traffic can reach your ECS. The value can be from 1 to 65535.

    22, or 22-30

    +

    22, or 22-30

    Type

    +

    Type

    Source IP address version. You can select:
    • IPv4
    • IPv6
    +
    Source IP address version. You can select:
    • IPv4
    • IPv6

    IPv4

    +

    IPv4

    Source

    +

    Source

    Source of the security group rule. The value can be an IP address or a security group to allow access from IP addresses or instances in the security group.
    • IP address:
      • Single IP address: 192.168.10.10/32
      • All IP addresses: 0.0.0.0/0
      • IP address range: 192.168.1.0/24
      -
    • Security group: The source is from another security group. You can select a security group in the same region from the drop-down list. If there is instance A in security group A and instance B in security group B, and the inbound rule of security group A allows traffic from security group B, traffic is allowed from instance B to instance A.
    +
    Source of the security group rule. The value can be an IP address or a security group to allow access from IP addresses or instances in the security group.
    • IP address:
      • Single IP address: 192.168.10.10/32
      • All IP addresses: 0.0.0.0/0
      • IP address range: 192.168.1.0/24
      +
    • Security group: The source is from another security group. You can select a security group in the same region from the drop-down list. If there is instance A in security group A and instance B in security group B, and the inbound rule of security group A allows traffic from security group B, traffic is allowed from instance B to instance A.

    If the source is a security group, this rule will apply to all instances associated with the selected security group.

    0.0.0.0/0

    +

    0.0.0.0/0

    Description

    +

    Description

    Supplementary information about the security group rule. This parameter is optional.

    -

    The security group rule description can contain a maximum of 255 characters and cannot contain angle brackets (< or >).

    +

    Supplementary information about the security group rule. This parameter is optional.

    +

    The description can contain a maximum of 255 characters and cannot contain angle brackets (< or >).

    N/A

    +

    -

    -
  10. Configure required parameters.

    You can click + to add more outbound rules.

    -
    Figure 2 Add Outbound Rule
    +
  11. Click OK.

    The inbound rule list is displayed.

    +
  12. On the Outbound Rules tab, click Add Rule.

    The Add Outbound Rule dialog box is displayed.

    +
  13. Configure required parameters.

    You can click + to add more outbound rules.

    +
    Figure 2 Adding outbound rules
    -
    Table 2 Outbound rule parameter description

    Parameter

    +
    - - - - - - - - - - - - - - - - - diff --git a/docs/ecs/umn/en-us_topic_0031523135.html b/docs/ecs/umn/en-us_topic_0031523135.html index a35920ea..de3cbeda 100644 --- a/docs/ecs/umn/en-us_topic_0031523135.html +++ b/docs/ecs/umn/en-us_topic_0031523135.html @@ -21,10 +21,10 @@
  14. If you plan to use a private image to change the OS, ensure that a private image is available. For details about how to create a private image, see Image Management Service User Guide.
    • If the image of a specified ECS is required, make sure that a private image has been created using this ECS.
    • If a local image file is required, make sure that the image file has been imported to the cloud platform and registered as a private image.
    • If a private image from another region is required, make sure that the image has been copied.
    • If a private image from another user account is required, make sure that the image has been shared with you.
  15. -

    Procedure

    1. Log in to the management console.
    2. Click in the upper left corner and select your region and project.
    3. Under Computing, choose Elastic Cloud Server.
    4. Locate the row containing the target ECS and choose More > Manage Image/Backup > Change OS in the Operation column.

      Only stopped ECSs support OS change. If the ECS is not stopped, stop it before proceeding with changing.

      +

      Procedure

      1. Log in to the management console.
      2. Click in the upper left corner and select your region and project.
      3. Under Computing, choose Elastic Cloud Server.
      4. Locate the row containing the target ECS and choose More > Manage Image/Backup > Change OS in the Operation column.

        Only stopped ECSs support OS change. If the ECS is not stopped, stop it before proceeding with changing.

      5. Select the target image.

        For more details, see Creating an ECS.

        Figure 1 Changing an OS
        -
      6. (Optional) Select the Encryption option to encrypt the system disk during OS change.

        To enable encryption, click Create Xrole to assign KMS access permissions to EVS. If you have rights granting permission, assign the KMS access permissions to EVS. If you do not have the permission, contact the user having the security administrator rights to assign the KMS access permissions. For details, see Can All Users Use the Encryption Feature?

        +
      7. (Optional) Select the Encryption option to encrypt the system disk during OS change.

        To enable encryption, click Create Xrole to assign KMS access permissions to EVS. If you have rights granting permissions, assign the KMS access permissions to EVS. If you do not have the required permissions, contact the user who has the Security Administrator permissions to assign the KMS access permissions. For details, see Can All Users Use the Encryption Feature?

        Encryption parameters are as follows:

        • Encryption: indicates that the EVS disk has been encrypted.
        • Create Xrole: assigns KMS access permissions to EVS to obtain KMS keys. After the permissions are assigned, follow-up operations do not require assigning permissions again.
        • Xrole Name: set to EVSAccessKMS, which means that permissions have been assigned to EVS to obtain KMS keys for encrypting or decrypting EVS disks.
        • KMS Key Name: specifies the name of the key used by the encrypted EVS disk. You can select an existing key, or click Create KMS Key and create a new one on the KMS console. The default value is evs/default.
        • KMS Key ID: specifies the ID of the key used by the encrypted data disk.
      8. (Optional) Select a License Type (Use license from the system or Bring your own license (BYOL)) if the changed OS running on your ECS is billed. For more details, see License Types.
        The following OSs are billed:
        • SUSE Linux Enterprise Server
        • Oracle Enterprise Linux
        • Red Hat Enterprise Linux
        diff --git a/docs/ecs/umn/en-us_topic_0032980085.html b/docs/ecs/umn/en-us_topic_0032980085.html index e06ddb8c..e2a14f35 100644 --- a/docs/ecs/umn/en-us_topic_0032980085.html +++ b/docs/ecs/umn/en-us_topic_0032980085.html @@ -17,11 +17,11 @@
        1. Log in to the management console.
        2. Click in the upper left corner and select your region and project.
        3. Under Computing, choose Elastic Cloud Server.
        4. In the navigation pane on the left, choose ECS Group.
        5. Locate the row that contains the target ECS group and click Add ECS in the Operation column.
        6. On the Add ECS page, select an ECS to be added.
        7. Click OK. The ECS is added to the ECS group.

        Removing an ECS from an ECS Group

        After an ECS is removed from an ECS group, the ECS does not comply with the ECS group policy anymore.

        -
        1. Log in to the management console.
        2. Click in the upper left corner and select your region and project.
        3. Under Computing, choose Elastic Cloud Server.
        4. In the navigation pane on the left, choose ECS Group.
        5. Expand the ECS group information and view the ECSs in the ECS group.
        6. Locate the ECS to be removed and click Remove in the Operation column.
        7. In the displayed dialog box, click Yes.

          The ECS is removed from the ECS group.

          +
          1. Log in to the management console.
          2. Click in the upper left corner and select your region and project.
          3. Under Computing, choose Elastic Cloud Server.
          4. In the navigation pane on the left, choose ECS Group.
          5. Expand the ECS group information and view the ECSs in the ECS group.
          6. Locate the ECS to be removed and click Remove in the Operation column.
          7. In the displayed dialog box, click Yes.

            The ECS is removed from the ECS group.

        Deleting an ECS Group

        After an ECS group is deleted, the policy does not apply to the ECSs in the ECS group anymore.

        -
        1. Log in to the management console.
        2. Click in the upper left corner and select your region and project.
        3. Under Computing, choose Elastic Cloud Server.
        4. In the navigation pane on the left, choose ECS Group.
        5. Locate the ECS group to be deleted and click Delete in the Operation column.
        6. In the displayed dialog box, click Yes.
        +
        1. Log in to the management console.
        2. Click in the upper left corner and select your region and project.
        3. Under Computing, choose Elastic Cloud Server.
        4. In the navigation pane on the left, choose ECS Group.
        5. Locate the ECS group to be deleted and click Delete in the Operation column.
        6. In the displayed dialog box, click Yes.
      diff --git a/docs/ecs/umn/en-us_topic_0038024694.html b/docs/ecs/umn/en-us_topic_0038024694.html index a3438913..46ac6016 100644 --- a/docs/ecs/umn/en-us_topic_0038024694.html +++ b/docs/ecs/umn/en-us_topic_0038024694.html @@ -218,8 +218,7 @@
    - diff --git a/docs/ecs/umn/en-us_topic_0041169567.html b/docs/ecs/umn/en-us_topic_0041169567.html index 54477bcd..d985b29a 100644 --- a/docs/ecs/umn/en-us_topic_0041169567.html +++ b/docs/ecs/umn/en-us_topic_0041169567.html @@ -8,7 +8,14 @@ - + + + - diff --git a/docs/ecs/umn/en-us_topic_0050735736.html b/docs/ecs/umn/en-us_topic_0050735736.html index ab3c152f..5359dded 100644 --- a/docs/ecs/umn/en-us_topic_0050735736.html +++ b/docs/ecs/umn/en-us_topic_0050735736.html @@ -29,21 +29,21 @@

    Modifying the Mapping Between the ECS Hostname and IP Address (Modifying the hosts File)

    If you want to use the changed hostname as the preferred localhost and localhost.localdomain, update the mapping between the hostname and IP address after the hostname is changed and then save the configuration to the corresponding Cloud-Init configuration file so that the new hostname takes effect permanently.

    The changed hostname is assumed to be new_hostname.

    -
    1. Modify the /etc/hostname configuration file.
      1. Run the following command to edit the configuration file:

        sudo vim /etc/hostname

        +
        1. Modify the /etc/hostname configuration file.
          1. Run the following command to edit the configuration file:

            sudo vim /etc/hostname

          2. Change the hostname to the new one.
          3. Run the following command to save and exit the configuration file:

            :wq

          -
        2. Modify the /etc/sysconfig/network configuration file.
          1. Run the following command to edit the configuration file:

            sudo vim /etc/sysconfig/network

            -
          2. Change the HOSTNAME value to the new hostname.

            HOSTNAME=Changed hostname

            -

            If there is no HOSTNAME in the configuration file, manually add this parameter and set it to the changed hostname.

            +
          3. Modify the /etc/sysconfig/network configuration file.
            1. Run the following command to edit the configuration file:

              sudo vim /etc/sysconfig/network

              +
            2. Change the HOSTNAME value to the new hostname.

              HOSTNAME=Changed hostname

              +

              If there is no HOSTNAME in the configuration file, manually add this parameter and set it to the changed hostname.

              For example:

              HOSTNAME=new_hostname
            3. Run the following command to save and exit the configuration file:

              :wq

            -
          4. Modify the /etc/cloud/cloud.cfg configuration file.
            1. Run the following command to edit the configuration file:

              sudo vim /etc/cloud/cloud.cfg

              -
            2. Use either of the following methods to modify the configuration file:
              • Method 1: Change the preserve_hostname parameter value or add the preserve_hostname parameter to the configuration file.

                If preserve_hostname: false is already available in the /etc/cloud/cloud.cfg configuration file, change it to preserve_hostname: true. If preserve_hostname is unavailable in the /etc/cloud/cloud.cfg configuration file, add preserve_hostname: true before cloud_init_modules.

                -

                If you use method 1, the changed hostname still takes effect after the ECS is stopped or restarted. However, if the ECS is used to create a private image and the image is used to create a new ECS, the hostname of the new ECS is the hostname (new_hostname) used by the private image, and user-defined hostnames cannot be injected using Cloud-Init.

                -
              • Method 2 (recommended): Delete or comment out - update_hostname.

                If you use method 2, the changed hostname still takes effect after the ECS is stopped or restarted. If the ECS is used to create a private image and the image is used to create a new ECS, the changed hostname permanently takes effect, and user-defined hostnames (such as new_new_hostname) can be injected using Cloud-Init.

                +
              • Modify the /etc/cloud/cloud.cfg configuration file.
                1. Run the following command to edit the configuration file:

                  sudo vim /etc/cloud/cloud.cfg

                  +
                2. Use either of the following methods to modify the configuration file:
                  • Method 1: Change the preserve_hostname parameter value or add the preserve_hostname parameter to the configuration file.

                    If preserve_hostname: false is already available in the /etc/cloud/cloud.cfg configuration file, change it to preserve_hostname: true. If preserve_hostname is unavailable in the /etc/cloud/cloud.cfg configuration file, add preserve_hostname: true before cloud_init_modules.

                    +

                    If you use method 1, the changed hostname still takes effect after the ECS is stopped or restarted. However, if the ECS is used to create a private image and the image is used to create a new ECS, the hostname of the new ECS is the hostname (new_hostname) used by the private image, and user-defined hostnames cannot be injected using Cloud-Init.

                    +
                  • Method 2 (recommended): Delete or comment out - update_hostname.

                    If you use method 2, the changed hostname still takes effect after the ECS is stopped or restarted. If the ECS is used to create a private image and the image is used to create a new ECS, the changed hostname permanently takes effect, and user-defined hostnames (such as new_new_hostname) can be injected using Cloud-Init.

            1. Update the mapping between the hostname and IP address in /etc/hosts to an entry starting with 127.0.0.1. Use new_hostname as your preferred localhost and localhost.localdomain.
              1. Run the following command to edit /etc/hosts:

                sudo vim /etc/hosts

                @@ -52,7 +52,7 @@ 127.0.0.1 new_hostname new_hostname
              2. Run the following command to save and exit the configuration file:

                :wq

              -
            2. Modify the /etc/cloud/cloud.cfg configuration file.
              1. Run the following command to edit the configuration file:

                sudo vim /etc/cloud/cloud.cfg

                +
              2. Modify the /etc/cloud/cloud.cfg configuration file.
                1. Run the following command to edit the configuration file:

                  sudo vim /etc/cloud/cloud.cfg

                2. Set manage_etc_hosts to manage_etc_hosts: false.
                  manage_etc_hosts: false
                3. Run the following command to save and exit the configuration file:

                  :wq

                diff --git a/docs/ecs/umn/en-us_topic_0074825901.html b/docs/ecs/umn/en-us_topic_0074825901.html index 3ade6467..85c8a392 100644 --- a/docs/ecs/umn/en-us_topic_0074825901.html +++ b/docs/ecs/umn/en-us_topic_0074825901.html @@ -36,7 +36,7 @@
              3. Select Internet Protocol Version 4 (TCP/IPv4) and click Properties.
                Figure 3 Selecting a protocol type
              4. Select Use the following DNS server addresses and set the IP addresses of the DNS servers.
                Figure 4 Setting the IP addresses of the DNS servers
              -

            3. Configure the NTP server for the ECS.

              1. Start the Run dialog box. Enter regedit and click OK.
              2. Modify the registry entries.
                • In HKEY_LOCAL_MACHINE > SYSTEM > CurrentControlSet > Services > W32Time > TimeProviders > NtpClient, set the value of Enabled to 1, indicating that the NTP client is used.
                • In HKEY_LOCAL_MACHINE > SYSTEM > CurrentControlSet > Services > W32Time > TimeProviders > NtpServer, set the value of Enabled to 0, indicating that the NTP server is stopped.
                • Choose HKEY_LOCAL_MACHINE > SYSTEM > CurrentControlSet > Services > W32Time > Parameters file and set the NtpServer data. Set the data of TYPE to NTP.
                • In HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ W32Time \ TimeProviders \ NtpClient, set the value of SpecialPollInterval to 60 and that of Base to Decimal, indicating the clock synchronization cycle is 60s.
                • In HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ W32Time \ config, set the values of MaxPosPhaseCorrection and MaxNegPhaseCorrection to ffffffff and that of Base to Hexadecimal.
                +

              3. Configure the NTP server for the ECS.

                1. Start the Run dialog box. Enter regedit and click OK.
                2. Modify the registry entries.
                  • In HKEY_LOCAL_MACHINE > SYSTEM > CurrentControlSet > Services > W32Time > TimeProviders > NtpClient, set the value of Enabled to 1, indicating that the NTP client is used.
                  • In HKEY_LOCAL_MACHINE > SYSTEM > CurrentControlSet > Services > W32Time > TimeProviders > NtpServer, set the value of Enabled to 0, indicating that the NTP server is stopped.
                  • Choose the HKEY_LOCAL_MACHINE > SYSTEM > CurrentControlSet > Services > W32Time > Parameters file and set the NtpServer data. Set the data of TYPE to NTP.
                  • In HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ W32Time \ TimeProviders \ NtpClient, set the value of SpecialPollInterval to 60 and that of Base to Decimal, indicating the clock synchronization cycle is 60s.
                  • In HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ W32Time \ config, set the values of MaxPosPhaseCorrection and MaxNegPhaseCorrection to ffffffff and that of Base to Hexadecimal.
                3. Open the Run dialog box, enter services.msc, and click OK. The Services window is displayed.
                4. View the service named Windows Time and set the Start Type to Automatic to synchronize time from the NTP server.
                5. Open the Run dialog box and run the following commands in sequence to restart the Windows Time service:

                  net stop w32time

                  net start w32time

                6. Manually change the time on the client to make it different from that on the NTP server. One minute later, check whether the time on the client is the same as that on the NTP server. If yes, the time is synchronized.
                diff --git a/docs/ecs/umn/en-us_topic_0093492521.html b/docs/ecs/umn/en-us_topic_0093492521.html index 3d91d77a..c9ec3d18 100644 --- a/docs/ecs/umn/en-us_topic_0093492521.html +++ b/docs/ecs/umn/en-us_topic_0093492521.html @@ -3,7 +3,7 @@

                Modifying an EIP Bandwidth

                Scenarios

                If an EIP has been bound to the ECS, the ECS can access the Internet using the bandwidth associated with the EIP. This section describes how to adjust the bandwidth of an ECS.

                -

                Procedure

                1. Log in to the management console.
                2. Click in the upper left corner and select your region and project.
                3. Under Computing, click Elastic Cloud Server.
                4. Locate the row containing the target ECS. Click More in the Operation column and select Manage Network > Modify Bandwidth.
                5. Change the bandwidth name and size as prompted.
                +

                Procedure

                1. Log in to the management console.
                2. Click in the upper left corner and select your region and project.
                3. Under Computing, click Elastic Cloud Server.
                4. In the ECS list, locate the row containing the target ECS and choose More > Manage Network > Modify Bandwidth in the Operation column.
                5. Change the bandwidth name and size as prompted.
                diff --git a/docs/ecs/umn/en-us_topic_0094801708.html b/docs/ecs/umn/en-us_topic_0094801708.html index 53382fa4..0a91da2a 100644 --- a/docs/ecs/umn/en-us_topic_0094801708.html +++ b/docs/ecs/umn/en-us_topic_0094801708.html @@ -4,10 +4,10 @@

                Symptom

                When you run the sudo command to switch to user root on an Ubuntu or Debian ECS, the system prompts connection timeout.

                Figure 1 Connection timeout
                -

                Solution

                1. Log in to the ECS.
                2. Run the following command to edit the hosts configuration file:

                  vi /etc/hosts

                  -
                3. Press i to enter editing mode.
                4. Add the IP address and hostname to the last line of the hosts configuration file.

                  Private IP address hostname

                  +

                  Solution

                  1. Log in to the ECS.
                  2. Run the following command to edit the hosts configuration file:

                    vi /etc/hosts

                    +
                  3. Press i to enter insert mode.
                  4. Add the IP address and hostname to the last line of the hosts configuration file.

                    Private IP address hostname

                    An example is provided as follows:

                    -

                    If the ECS hostname is hostname and the private IP address of the ECS is 192.168.0.1, add the following statement:

                    +

                    If the ECS hostname is hostname and the private IP address of the ECS is 192.168.0.1, add the following statement:

                    192.168.0.1 hostname

                  5. Press Esc to exit editing mode.
                  6. Run the following command to save the configuration and exit:

                    :wq

                  diff --git a/docs/ecs/umn/en-us_topic_0096170524.html b/docs/ecs/umn/en-us_topic_0096170524.html index 29dfebf4..a7f8871c 100644 --- a/docs/ecs/umn/en-us_topic_0096170524.html +++ b/docs/ecs/umn/en-us_topic_0096170524.html @@ -7,7 +7,7 @@
    + + + +
    Table 2 Outbound rule parameter description

    Parameter

    Description

    +

    Description

    Example Value

    +

    Example Value

    Protocol

    +

    Protocol

    The network protocol used to match traffic in a security group rule.

    -

    Currently, the value can be All, TCP, UDP, GRE, ICMP, or more.

    +

    The network protocol used to match traffic in a security group rule.

    +

    Currently, the value can be All, TCP, UDP, GRE, ICMP, or more.

    TCP

    +

    TCP

    Port

    +

    Port

    The port or port range over which traffic can leave your ECS. The value can be from 1 to 65535.

    +

    The port or port range over which traffic can leave your ECS. The value can be from 1 to 65535.

    22, or 22-30

    +

    22, or 22-30

    Type

    +

    Type

    Source IP address version. You can select:
    • IPv4
    • IPv6
    +
    Source IP address version. You can select:
    • IPv4
    • IPv6

    IPv4

    +

    IPv4

    Destination

    +

    Destination

    Destination of the security group rule. The value can be an IP address or a security group to allow access to IP addresses or instances in the security group.

    +

    Destination of the security group rule. The value can be an IP address or a security group to allow access to IP addresses or instances in the security group.

    • IP address:
      • Single IP address: 192.168.10.10/32
      • All IP addresses: 0.0.0.0/0
      • IP address range: 192.168.1.0/24
      -
    • Security group: The source is from another security group. You can select a security group in the same region from the drop-down list. If there is instance A in security group A and instance B in security group B, and the inbound rule of security group A allows traffic from security group B, traffic is allowed from instance B to instance A.
    +
  16. Security group: The source is from another security group. You can select a security group in the same region from the drop-down list. If there is instance A in security group A and instance B in security group B, and the inbound rule of security group A allows traffic from security group B, traffic is allowed from instance B to instance A.
  17. 0.0.0.0/0

    +

    0.0.0.0/0

    Description

    +

    Description

    Supplementary information about the security group rule. This parameter is optional.

    -

    The security group rule description can contain a maximum of 255 characters and cannot contain angle brackets (< or >).

    +

    Supplementary information about the security group rule. This parameter is optional.

    +

    The description can contain a maximum of 255 characters and cannot contain angle brackets (< or >).

    N/A

    +

    -

    Windows

    • Windows Server 2022 Standard 64bit
    • Windows Server 2022 Datacenter 64bit
    • Windows Server 2019 Standard 64bit
    • Windows Server 2019 Datacenter 64bit

      -
    • Windows Server 2016 Standard 64bit
    • Windows Server 2012 R2 Standard 64bit
    +
    • Windows Server 2022 Standard 64bit
    • Windows Server 2022 Datacenter 64bit
    • Windows Server 2019 Standard 64bit
    • Windows Server 2019 Datacenter 64bit
    • Windows Server 2016 Standard 64bit
    • Windows Server 2012 R2 Standard 64bit

    2024-09-04

    +

    2024-11-04

    +

    Modified the following content:

    +

    Added P5s ECSs in A Summary List of ECS Specifications and GPU-accelerated ECSs.

    +

    Added parameters for multi-AZ deployment in Step 1: Configure Basic Settings.

    +

    2024-09-04

    Modified the following content:

    Deleted expired actions in Permissions Management.

    @@ -74,7 +81,7 @@

    2023-06-27

    Added Key Operations Supported by CTS.

    +

    Added ECS Operations Supported by CTS.

    2023-06-13

    @@ -92,7 +99,7 @@

    2023-03-04

    Added the following content:

    - +

    Modified the following content:

    Added P3 ECSs in GPU-accelerated ECSs.

    • EulerOS 2.5 64bit
    • Windows Server 2019 Standard 64bit
    • Windows Server 2016 Standard 64bit
    • Windows Server 2012 R2 Standard 64bit

    Computing-accelerated

    +

    P5s

    +
    • CentOS 7.9 64bit
    • CentOS 7.8 64bit
    • CentOS 7.7 64bit
    • CentOS 7.6 64bit
    • Ubuntu 22.04 64bit
    • Ubuntu 20.04 64bit
    • Ubuntu 18.04 64bit
    • Ubuntu 16.04 64bit
    +

    Computing-accelerated

    P3

    @@ -148,7 +155,7 @@
  18. CUDA, DirectCompute, OpenACC, and OpenCL
  19. A single card is equipped with 10,752 CUDA cores, 84 second-generation RT cores, and 336 third-generation Tensor cores.
  20. Graphics applications accelerated
  21. Heavy-load CPU inference
  22. Application flow identical to common ECSs
  23. Automatic scheduling of G7 ECSs to AZs where NVIDIA A40 GPUs are used
  24. One NVENC (encoding) engine and two NVDEC (decoding) engines (including AV1 decoding) embedded
  25. Supported Common Software

    G7 ECSs are used in graphics acceleration scenarios, such as video rendering, cloud desktop, and 3D visualization. If the software relies on GPU DirectX and OpenGL hardware acceleration, use G7 ECSs. G7 ECSs support the following commonly used graphics processing software:

    -
    • AutoCAD
    • 3DS MAX
    • MAYA
    • Agisoft PhotoScan
    • ContextCapture
    • Adobe Premiere Pro
    • Solidworks
    • Unreal Engine
    • Blender
    • Vray
    +
    • AutoCAD
    • 3ds Max
    • MAYA
    • Agisoft PhotoScan
    • ContextCapture
    • Adobe Premiere Pro
    • Solidworks
    • Unreal Engine
    • Blender
    • Vray

    Notes

    • After a G7 ECS is stopped, basic resources (including vCPUs, memory, image, and GPUs) are not billed, but its system disk is billed based on the disk capacity. If other products, such as EVS disks, EIP, and bandwidth are associated with the ECS, these products are billed separately.

      Resources will be released after a G7 ECS is stopped. If resources are insufficient at the next start, the start may fail. If you want to use such an ECS for a long period of time, do not stop the ECS.

      @@ -258,7 +265,7 @@
    • CUDA and OpenCL
    • NVIDIA T4 GPUs
    • Graphics applications accelerated
    • Heavy-load CPU inference
    • Automatic scheduling of G6 ECSs to AZs where NVIDIA T4 GPUs are used
    • One NVENC engine and two NVDEC engines embedded

    Supported Common Software

    G6 ECSs are used in graphics acceleration scenarios, such as video rendering, cloud desktop, and 3D visualization. If the software relies on GPU DirectX and OpenGL hardware acceleration, use G6 ECSs. G6 ECSs support the following commonly used graphics processing software:

    -
    • AutoCAD
    • 3DS MAX
    • MAYA
    • Agisoft PhotoScan
    • ContextCapture
    +
    • AutoCAD
    • 3ds Max
    • MAYA
    • Agisoft PhotoScan
    • ContextCapture

    Notes

    • After a G6 ECS is stopped, basic resources (including vCPUs, memory, image, and GPUs) are not billed, but its system disk is billed based on the disk capacity. If other products, such as EVS disks, EIP, and bandwidth are associated with the ECS, these products are billed separately.

      Resources will be released after a G6 ECS is stopped. If resources are insufficient at the next start, the start may fail. If you want to use such an ECS for a long period of time, do not stop the ECS.

      @@ -266,117 +273,238 @@
    • If a G6 ECS is created using a private image, make sure that the GRID driver was installed during the private image creation. If not, install the driver for graphics acceleration after the ECS is created.

    • GPU-accelerated ECSs differ greatly in general-purpose and heterogeneous computing power. Their specifications can only be changed to other specifications of the same instance type.
    • GPU-accelerated ECSs do not support live migration.
    +

    Computing-accelerated P5s

    Overview

    +

    P5s ECSs use high-performance NVIDIA Tesla H100 PCIe and provide outstanding real-time inference.

    +

    Specifications

    + +
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Table 4 P5s ECS specifications

    Flavor

    +

    vCPUs

    +

    Memory (GiB)

    +

    Max./Assured Bandwidth (Gbit/s)

    +

    Max. PPS (10,000)

    +

    Max. NIC Queues

    +

    Max. NICs

    +

    GPUs

    +

    GPU Memory (GiB)

    +

    Virtualization

    +

    p5s.5xlarge.12

    +

    20

    +

    240

    +

    16/4.5

    +

    280

    +

    8

    +

    4

    +

    1 * H100 PCIe

    +

    80

    +

    KVM

    +

    p5s.10xlarge.12

    +

    40

    +

    480

    +

    24/9

    +

    550

    +

    16

    +

    8

    +

    2 * H100 PCIe

    +

    160

    +

    KVM

    +

    p5s.20xlarge.12

    +

    80

    +

    960

    +

    32/18

    +

    750

    +

    32

    +

    8

    +

    4 * H100 PCIe

    +

    320

    +

    KVM

    +

    p5s.40xlarge.12

    +

    160

    +

    1920

    +

    40/36

    +

    850

    +

    32

    +

    8

    +

    8 * H100 PCIe

    +

    640

    +

    KVM

    +
    +
    +

    P5s ECS Features

    +
    • 1:12 ratio of vCPUs to memory
    • CPU: 4th Generation Intel® Xeon® Scalable 8458P processors (2.7 GHz of base frequency and 3.8 GHz of turbo frequency)
    • Each GPU provides 80 GiB of GPU memory and 3,026 TFLOPS INT8 compute.
    • The GPU memory bandwidth can reach up to 2,000 Gbit/s.
    +

    Supported Common Software

    +

    P5s ECSs are used in computing acceleration scenarios, such as deep learning training, inference, scientific computing, molecular modeling, and seismic analysis. If the software is required to support GPU CUDA, use P5s ECSs. The following commonly used software is supported:

    +
    • Common deep learning frameworks, such as TensorFlow, Spark, PyTorch, MXNet, and Caffe
    • CUDA GPU rendering supported by RedShift for Autodesk 3ds Max and V-Ray for 3ds Max
    • Agisoft PhotoScan
    • MapD
    • More than 2,000 GPU-accelerated applications such as Amber, NAMD, and VASP
    +

    Notes

    +
    • P5s ECSs support automatic recovery when the hosts accommodating such ECSs become faulty.
    • After a P5s ECS is stopped, basic resources (including vCPUs, memory, image, and encoding cards) are not billed, but its system disk is billed based on the disk capacity. If other products, such as EVS disks, EIP, and bandwidth are associated with the ECS, these products are billed separately.
    • Specifications of P5s ECSs can only be changed to other specifications of the same instance type.
    +

    Computing-accelerated P3

    Overview

    P3 ECSs use NVIDIA A100 GPUs and provide flexibility and ultra-high-performance computing. P3 ECSs have strengths in AI-based deep learning, scientific computing, Computational Fluid Dynamics (CFD), computing finance, seismic analysis, molecular modeling, and genomics. Theoretically, the FP32 is 19.5 TFLOPS and the TF32 tensor core is 156 TFLOPS | 312 TFLOPS (sparsity enabled).

    Specifications

    -
    Table 4 P3 ECS specifications

    Flavor

    +
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -389,9 +517,9 @@

    Supported Common Software

    P3 ECSs are used in computing acceleration scenarios, such as deep learning training, inference, scientific computing, molecular modeling, and seismic analysis. If the software is required to support GPU CUDA, use P3 ECSs. P3 ECSs support the following commonly used software:

    -
    • Common deep learning frameworks, such as TensorFlow, Spark, PyTorch, MXNet, and Caffee
    • CUDA GPU rendering supported by RedShift for Autodesk 3dsMax and V-Ray for 3ds Max
    • Agisoft PhotoScan
    • MapD
    • More than 2,000 GPU-accelerated applications such as Amber, NAMD, and VASP
    -

    Notes

    -
    • After a P3 ECS is stopped, basic resources (including vCPUs, memory, image, and GPUs) are not billed, but its system disk is billed based on the disk capacity. If other products, such as EVS disks, EIP, and bandwidth are associated with the ECS, these products are billed separately.

      Resources will be released after a P3 ECS is stopped. If resources are insufficient at the next start, the start may fail. If you want to use such an ECS for a long period of time, do not stop the ECS.

      +
      • Common deep learning frameworks, such as TensorFlow, Spark, PyTorch, MXNet, and Caffe
      • CUDA GPU rendering supported by RedShift for Autodesk 3ds Max and V-Ray for 3ds Max
      • Agisoft PhotoScan
      • MapD
      • More than 2,000 GPU-accelerated applications such as Amber, NAMD, and VASP
      +

      Notes

      +
      • After a P3 ECS is stopped, basic resources (including vCPUs, memory, image, and GPUs) are not billed, but its system disk is billed based on the disk capacity. If other products, such as EVS disks, EIP, and bandwidth are associated with the ECS, these products are billed separately.

        Resources will be released after a P3 ECS is stopped. If resources are insufficient at the next start, the start may fail. If you want to use such an ECS for a long period of time, do not stop the ECS.

      • If a P3 ECS is created using a private image, make sure that the Tesla driver was installed during the private image creation. If not, install the driver for computing acceleration after the ECS is created. For details, see Manually Installing a Tesla Driver on a GPU-accelerated ECS.
      • GPU-accelerated ECSs differ greatly in general-purpose and heterogeneous computing power. Their specifications can only be changed to other specifications of the same instance type.
      • GPU-accelerated ECSs do not support live migration.
      @@ -399,129 +527,129 @@

      P2s ECSs use NVIDIA Tesla V100 GPUs to provide flexibility, high-performance computing, and cost-effectiveness. P2s ECSs provide outstanding general computing capabilities and have strengths in AI-based deep learning, scientific computing, Computational Fluid Dynamics (CFD), computing finance, seismic analysis, molecular modeling, and genomics.

      Specifications

      -
    Table 5 P3 ECS specifications

    Flavor

    vCPUs

    +

    vCPUs

    Memory

    +

    Memory

    (GiB)

    Max./Assured Bandwidth (Gbit/s)

    +

    Max./Assured Bandwidth (Gbit/s)

    Max. PPS

    +

    Max. PPS

    (10,000)

    Max. NIC Queues

    +

    Max. NIC Queues

    Max. NICs

    +

    Max. NICs

    GPUs

    +

    GPUs

    GPU Memory

    +

    GPU Memory

    (GiB)

    Virtualization

    +

    Virtualization

    p3.2xlarge.8

    +

    p3.2xlarge.8

    8

    +

    8

    64

    +

    64

    10/4

    +

    10/4

    100

    +

    100

    4

    +

    4

    4

    +

    4

    1 × NVIDIA A100 80GB

    +

    1 × NVIDIA A100 80GB

    80

    +

    80

    KVM

    +

    KVM

    p3.4xlarge.8

    +

    p3.4xlarge.8

    16

    +

    16

    128

    +

    128

    15/8

    +

    15/8

    200

    +

    200

    8

    +

    8

    8

    +

    8

    2 × NVIDIA A100 80GB

    +

    2 × NVIDIA A100 80GB

    160

    +

    160

    KVM

    +

    KVM

    p3.8xlarge.8

    +

    p3.8xlarge.8

    32

    +

    32

    256

    +

    256

    25/15

    +

    25/15

    350

    +

    350

    16

    +

    16

    8

    +

    8

    4 × NVIDIA A100 80GB

    +

    4 × NVIDIA A100 80GB

    320

    +

    320

    KVM

    +

    KVM

    p3.16xlarge.8

    +

    p3.16xlarge.8

    64

    +

    64

    512

    +

    512

    36/30

    +

    36/30

    700

    +

    700

    32

    +

    32

    8

    +

    8

    8 × NVIDIA A100 80GB

    +

    8 × NVIDIA A100 80GB

    640

    +

    640

    KVM

    +

    KVM

    Table 5 P2s ECS specifications

    Flavor

    +
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -533,137 +661,137 @@

    Supported Common Software

    -
    P2s ECSs are used in computing acceleration scenarios, such as deep learning training, inference, scientific computing, molecular modeling, and seismic analysis. If the software is required to support GPU CUDA, use P2s ECSs. P2s ECSs support the following commonly used software:
    • Common deep learning frameworks, such as TensorFlow, Caffe, PyTorch, and MXNet
    • CUDA GPU rendering supported by RedShift for Autodesk 3dsMax and V-Ray for 3ds Max
    • Agisoft PhotoScan
    • MapD
    +
    P2s ECSs are used in computing acceleration scenarios, such as deep learning training, inference, scientific computing, molecular modeling, and seismic analysis. If the software is required to support GPU CUDA, use P2s ECSs. P2s ECSs support the following commonly used software:
    • Common deep learning frameworks, such as TensorFlow, Caffe, PyTorch, and MXNet
    • CUDA GPU rendering supported by RedShift for Autodesk 3ds Max and V-Ray for 3ds Max
    • Agisoft PhotoScan
    • MapD
    -
    Notes
    • After a P2s ECS is stopped, basic resources (including vCPUs, memory, image, and GPUs) are not billed, but its system disk is billed based on the disk capacity. If other products, such as EVS disks, EIP, and bandwidth are associated with the ECS, these products are billed separately.

      Resources will be released after a P2s ECS is stopped. If resources are insufficient at the next start, the start may fail. If you want to use such an ECS for a long period of time, do not stop the ECS.

      +
      Notes
      • After a P2s ECS is stopped, basic resources (including vCPUs, memory, image, and GPUs) are not billed, but its system disk is billed based on the disk capacity. If other products, such as EVS disks, EIP, and bandwidth are associated with the ECS, these products are billed separately.

        Resources will be released after a P2s ECS is stopped. If resources are insufficient at the next start, the start may fail. If you want to use such an ECS for a long period of time, do not stop the ECS.

      • By default, P2s ECSs created using a Windows public image have the Tesla driver installed.
      • If a P2s ECS is created using a private image, make sure that the Tesla driver was installed during the private image creation. If not, install the driver for computing acceleration after the ECS is created. For details, see Manually Installing a Tesla Driver on a GPU-accelerated ECS.
      • GPU-accelerated ECSs differ greatly in general-purpose and heterogeneous computing power. Their specifications can only be changed to other specifications of the same instance type.
      • GPU-accelerated ECSs do not support live migration.
      -

      Computing-accelerated P2v

      Overview

      +

      Computing-accelerated P2v

      Overview

      P2v ECSs use NVIDIA Tesla V100 GPUs and deliver high flexibility, high-performance computing, and high cost-effectiveness. These ECSs use GPU NVLink for direct communication between GPUs, improving data transmission efficiency. P2v ECSs provide outstanding general computing capabilities and have strengths in AI-based deep learning, scientific computing, Computational Fluid Dynamics (CFD), computing finance, seismic analysis, molecular modeling, and genomics.

      Specifications

      -
    Table 6 P2s ECS specifications

    Flavor

    vCPUs

    +

    vCPUs

    Memory

    +

    Memory

    (GiB)

    Max./Assured Bandwidth (Gbit/s)

    +

    Max./Assured Bandwidth (Gbit/s)

    Max. PPS (10,000)

    +

    Max. PPS (10,000)

    Max. NIC Queues

    +

    Max. NIC Queues

    Max. NICs

    +

    Max. NICs

    GPUs

    +

    GPUs

    GPU Connection

    +

    GPU Connection

    GPU Memory (GiB)

    +

    GPU Memory (GiB)

    Virtualization

    +

    Virtualization

    Hardware

    +

    Hardware

    p2s.2xlarge.8

    +

    p2s.2xlarge.8

    8

    +

    8

    64

    +

    64

    10/4

    +

    10/4

    50

    +

    50

    4

    +

    4

    4

    +

    4

    1 × V100

    +

    1 × V100

    PCIe Gen3

    +

    PCIe Gen3

    1 × 32 GiB

    +

    1 × 32 GiB

    KVM

    +

    KVM

    CPU: 2nd Generation Intel® Xeon® Scalable Processor 6278

    +

    CPU: 2nd Generation Intel® Xeon® Scalable Processor 6278

    p2s.4xlarge.8

    +

    p2s.4xlarge.8

    16

    +

    16

    128

    +

    128

    15/8

    +

    15/8

    100

    +

    100

    8

    +

    8

    8

    +

    8

    2 × V100

    +

    2 × V100

    PCIe Gen3

    +

    PCIe Gen3

    2 × 32 GiB

    +

    2 × 32 GiB

    KVM

    +

    KVM

    p2s.8xlarge.8

    +

    p2s.8xlarge.8

    32

    +

    32

    256

    +

    256

    25/15

    +

    25/15

    200

    +

    200

    16

    +

    16

    8

    +

    8

    4 × V100

    +

    4 × V100

    PCIe Gen3

    +

    PCIe Gen3

    4 × 32 GiB

    +

    4 × 32 GiB

    KVM

    +

    KVM

    p2s.16xlarge.8

    +

    p2s.16xlarge.8

    64

    +

    64

    512

    +

    512

    30/30

    +

    30/30

    400

    +

    400

    32

    +

    32

    8

    +

    8

    8 × V100

    +

    8 × V100

    PCIe Gen3

    +

    PCIe Gen3

    8 × 32 GiB

    +

    8 × 32 GiB

    KVM

    +

    KVM

    Table 6 P2v ECS specifications

    Flavor

    +
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @@ -676,9 +804,9 @@

    Supported Common Software

    -
    P2v ECSs are used in computing acceleration scenarios, such as deep learning training, inference, scientific computing, molecular modeling, and seismic analysis. If the software is required to support GPU CUDA, use P2v ECSs. P2v ECSs support the following commonly used software:
    • Common deep learning frameworks, such as TensorFlow, Caffe, PyTorch, and MXNet
    • CUDA GPU rendering supported by RedShift for Autodesk 3dsMax and V-Ray for 3ds Max
    • Agisoft PhotoScan
    • MapD
    +
    P2v ECSs are used in computing acceleration scenarios, such as deep learning training, inference, scientific computing, molecular modeling, and seismic analysis. If the software is required to support GPU CUDA, use P2v ECSs. P2v ECSs support the following commonly used software:
    • Common deep learning frameworks, such as TensorFlow, Caffe, PyTorch, and MXNet
    • CUDA GPU rendering supported by RedShift for Autodesk 3ds Max and V-Ray for 3ds Max
    • Agisoft PhotoScan
    • MapD
    -
    Notes
    • After a P2v ECS is stopped, basic resources (including vCPUs, memory, image, and GPUs) are not billed, but its system disk is billed based on the disk capacity. If other products, such as EVS disks, EIP, and bandwidth are associated with the ECS, these products are billed separately.

      Resources will be released after a P2v ECS is stopped. If resources are insufficient at the next start, the start may fail. If you want to use such an ECS for a long period of time, do not stop the ECS.

      +
      Notes
      • After a P2v ECS is stopped, basic resources (including vCPUs, memory, image, and GPUs) are not billed, but its system disk is billed based on the disk capacity. If other products, such as EVS disks, EIP, and bandwidth are associated with the ECS, these products are billed separately.

        Resources will be released after a P2v ECS is stopped. If resources are insufficient at the next start, the start may fail. If you want to use such an ECS for a long period of time, do not stop the ECS.

      • By default, P2v ECSs created using a Windows public image have the Tesla driver installed.
      • By default, P2v ECSs created using a Linux public image do not have a Tesla driver installed. After the ECS is created, install a driver on it for computing acceleration. For details, see Manually Installing a Tesla Driver on a GPU-accelerated ECS.
      • If a P2v ECS is created using a private image, make sure that the Tesla driver was installed during the private image creation. If not, install the driver for computing acceleration after the ECS is created. For details, see Manually Installing a Tesla Driver on a GPU-accelerated ECS.
      • GPU-accelerated ECSs differ greatly in general-purpose and heterogeneous computing power. Their specifications can only be changed to other specifications of the same instance type.
      • GPU-accelerated ECSs do not support live migration.
      @@ -687,151 +815,151 @@

      Pi2 ECSs use NVIDIA Tesla T4 GPUs dedicated for real-time AI inference. These ECSs use the T4 INT8 calculator for up to 130 TOPS of INT8 computing. The Pi2 ECSs can also be used for light-load training.

      Specifications

      -
    Table 7 P2v ECS specifications

    Flavor

    vCPUs

    +

    vCPUs

    Memory

    +

    Memory

    (GiB)

    Max./Assured Bandwidth (Gbit/s)

    +

    Max./Assured Bandwidth (Gbit/s)

    Max. PPS (10,000)

    +

    Max. PPS (10,000)

    Max. NIC Queues

    +

    Max. NIC Queues

    Max. NICs

    +

    Max. NICs

    GPUs

    +

    GPUs

    GPU Connection

    +

    GPU Connection

    GPU Memory

    +

    GPU Memory

    (GiB)

    Virtualization

    +

    Virtualization

    Hardware

    +

    Hardware

    p2v.2xlarge.8

    +

    p2v.2xlarge.8

    8

    +

    8

    64

    +

    64

    10/4

    +

    10/4

    50

    +

    50

    4

    +

    4

    4

    +

    4

    1 × V100

    +

    1 × V100

    N/A

    +

    N/A

    1 × 16 GiB

    +

    1 × 16 GiB

    KVM

    +

    KVM

    CPU: Intel® Xeon® Skylake-SP Gold 6151 v5

    +

    CPU: Intel® Xeon® Skylake-SP Gold 6151 v5

    p2v.4xlarge.8

    +

    p2v.4xlarge.8

    16

    +

    16

    128

    +

    128

    15/8

    +

    15/8

    100

    +

    100

    8

    +

    8

    8

    +

    8

    2 × V100

    +

    2 × V100

    NVLink

    +

    NVLink

    2 × 16 GiB

    +

    2 × 16 GiB

    KVM

    +

    KVM

    p2v.8xlarge.8

    +

    p2v.8xlarge.8

    32

    +

    32

    256

    +

    256

    25/15

    +

    25/15

    200

    +

    200

    16

    +

    16

    8

    +

    8

    4 × V100

    +

    4 × V100

    NVLink

    +

    NVLink

    4 × 16 GiB

    +

    4 × 16 GiB

    KVM

    +

    KVM

    p2v.16xlarge.8

    +

    p2v.16xlarge.8

    64

    +

    64

    512

    +

    512

    30/30

    +

    30/30

    400

    +

    400

    32

    +

    32

    8

    +

    8

    8 × V100

    +

    8 × V100

    NVLink

    +

    NVLink

    8 × 16 GiB

    +

    8 × 16 GiB

    KVM

    +

    KVM

    Table 7 Pi2 ECS specifications

    Flavor

    +
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/docs/ecs/umn/en-us_topic_0107412162.html b/docs/ecs/umn/en-us_topic_0107412162.html index e87cf9a7..37c453f7 100644 --- a/docs/ecs/umn/en-us_topic_0107412162.html +++ b/docs/ecs/umn/en-us_topic_0107412162.html @@ -1,6 +1,6 @@ -

    What Should I Do If Error "command ´gcc´ failed with exit status 1" Occurs During PIP-based Software Installation

    +

    What Should I Do If Error "command ´gcc´ failed with exit status 1" Occurs During PIP-based Software Installation?

    Symptom

    When installing the Python library software, you need to configure the PIP source. Take the official image source as an example:
    [root@test home]# cat /root/.pip/pip.conf 
     [global]
     index-url = https://pypi.python.org/simple
    diff --git a/docs/ecs/umn/en-us_topic_0116262067.html b/docs/ecs/umn/en-us_topic_0116262067.html
    index 0f302e6e..a29a276b 100644
    --- a/docs/ecs/umn/en-us_topic_0116262067.html
    +++ b/docs/ecs/umn/en-us_topic_0116262067.html
    @@ -1,16 +1,16 @@
     
     
    -

    Key Operations Supported by CTS

    +

    ECS Operations Supported by CTS

    Scenarios

    Cloud Trace Service (CTS) records user operations performed on ECSs and related resources for further query, auditing, and backtracking.

    -

    Prerequisites

    CTS has been provisioned.

    +

    Prerequisites

    CTS has been enabled.

    Key ECS Operations Recorded by CTS

    Table 8 Pi2 ECS specifications

    Flavor

    vCPUs

    +

    vCPUs

    Memory

    +

    Memory

    (GiB)

    Max./Assured Bandwidth

    +

    Max./Assured Bandwidth

    (Gbit/s)

    Max. PPS

    +

    Max. PPS

    (10,000)

    Max. NIC Queues

    +

    Max. NIC Queues

    Max. NICs

    +

    Max. NICs

    GPUs

    +

    GPUs

    GPU Memory

    +

    GPU Memory

    (GiB)

    Local Disks

    +

    Local Disks

    Virtualization

    +

    Virtualization

    Hardware

    +

    Hardware

    pi2.2xlarge.4

    +

    pi2.2xlarge.4

    8

    +

    8

    32

    +

    32

    10/4

    +

    10/4

    50

    +

    50

    4

    +

    4

    4

    +

    4

    1 × T4

    +

    1 × T4

    1 × 16 GiB

    +

    1 × 16 GiB

    N/A

    +

    N/A

    KVM

    +

    KVM

    CPU: Intel® Xeon® Skylake 6151 3.0 GHz or Intel® Xeon® Cascade Lake 6278 2.6 GHz

    +

    CPU: Intel® Xeon® Skylake 6151 3.0 GHz or Intel® Xeon® Cascade Lake 6278 2.6 GHz

    pi2.3xlarge.4

    +

    pi2.3xlarge.4

    12

    +

    12

    48

    +

    48

    12/6

    +

    12/6

    80

    +

    80

    6

    +

    6

    6

    +

    6

    1 × T4

    +

    1 × T4

    1 × 16 GiB

    +

    1 × 16 GiB

    N/A

    +

    N/A

    KVM

    +

    KVM

    pi2.4xlarge.4

    +

    pi2.4xlarge.4

    16

    +

    16

    64

    +

    64

    15/8

    +

    15/8

    100

    +

    100

    8

    +

    8

    8

    +

    8

    2 × T4

    +

    2 × T4

    2 × 16 GiB

    +

    2 × 16 GiB

    N/A

    +

    N/A

    KVM

    +

    KVM

    pi2.8xlarge.4

    +

    pi2.8xlarge.4

    32

    +

    32

    128

    +

    128

    25/15

    +

    25/15

    200

    +

    200

    16

    +

    16

    8

    +

    8

    4 × T4

    +

    4 × T4

    4 × 16 GiB

    +

    4 × 16 GiB

    N/A

    +

    N/A

    KVM

    +

    KVM

    pi2.16xlarge.4

    +

    pi2.16xlarge.4

    64

    +

    64

    256

    +

    256

    30/30

    +

    30/30

    400

    +

    400

    32

    +

    32

    8

    +

    8

    8 × T4

    +

    8 × T4

    8 × 16 GiB

    +

    8 × 16 GiB

    N/A

    +

    N/A

    KVM

    +

    KVM

    - diff --git a/docs/ecs/umn/en-us_topic_0116266206.html b/docs/ecs/umn/en-us_topic_0116266206.html index 48c7264c..a09aa4f5 100644 --- a/docs/ecs/umn/en-us_topic_0116266206.html +++ b/docs/ecs/umn/en-us_topic_0116266206.html @@ -5,7 +5,7 @@

    Constraints

    • Only stopped ECSs can be migrated.
    • To ensure that the migration is successful, there must be an available DeH.
    • CBR and CSBS backups are not affected by migrations.
    • ECS IDs remain unchanged after a migration.
    -

    Procedure

    1. Log in to the management console.
    2. Click in the upper left corner and select your region and project.
    3. Under Computing, click Elastic Cloud Server.
    4. In the ECS list, locate the target ECS and choose More In the Operation column of the ECS to be migrated, choose More > Migrate ECS in the Operation column.
    5. In the displayed dialog box, select the target DeH.

      If no DeHs are available, create a DeH first. For details, see Allocating DeHs in the Dedicated Host User Guide.

      +

      Procedure

      1. Log in to the management console.
      2. Click in the upper left corner and select your region and project.
      3. Under Computing, click Elastic Cloud Server.
      4. In the ECS list, locate the target ECS to be migrated, choose More > Migrate ECS in the Operation column.
      5. In the displayed dialog box, select the target DeH.

        If no DeHs are available, create a DeH first. For details, see Allocating DeHs in the Dedicated Host User Guide.

      6. Click OK.
      diff --git a/docs/ecs/umn/en-us_topic_0140323150.html b/docs/ecs/umn/en-us_topic_0140323150.html index 4fb0444c..6d655508 100644 --- a/docs/ecs/umn/en-us_topic_0140323150.html +++ b/docs/ecs/umn/en-us_topic_0140323150.html @@ -89,14 +89,14 @@
    - - @@ -110,7 +110,7 @@ - @@ -124,7 +124,7 @@ - diff --git a/docs/ecs/umn/en-us_topic_0140323152.html b/docs/ecs/umn/en-us_topic_0140323152.html index 049d2668..1592bc15 100644 --- a/docs/ecs/umn/en-us_topic_0140323152.html +++ b/docs/ecs/umn/en-us_topic_0140323152.html @@ -93,10 +93,10 @@
    Table 1 ECS operations recorded by CTS

    Operation

    Resource Type

    Event Name

    +

    Trace

    An exception has occurred on the ECS. Contact technical support for assistance.

    Reinstalling OS

    +

    Reinstalling

    Intermediate

    The ECS has received a request to reinstall the OS and has begun the reinstallation.

    Reinstalling OS failed

    +

    Reinstalling failed

    Stable

    The ECS received a request to change the OS and has begun implementing the changes.

    OS change failed

    +

    Failed to change the OS

    Stable

    The ECS is being forcibly restarted.

    Rolling back resizing

    +

    Reverting resizing

    Intermediate

    -

    If the source is set to 0.0.0.0/0, any IP address can be used to remotely log in to the ECS. To ensure security, set the source to a specific IP address based on service requirements. For details about the configuration example, see Table 4.

    +

    If the source is set to 0.0.0.0/0, all external IP addresses are allowed to remotely log in to the ECS. To ensure network security and prevent service interruptions caused by network intrusions, set the source to a known IP address. For details, see Table 4.

    -
    Table 4 Remotely logging in to an ECS using a specified IP address

    ECS Type

    +
    @@ -137,7 +137,7 @@

    Remotely Connecting to an ECS from a Local Server to Upload or Download FTP Files

    By default, a security group denies all external requests. If you need to remotely connect to an ECS from a local server to upload or download files, you need to enable FTP ports 20 and 21.

    -
    Table 4 Remotely logging in to an ECS using a known IP address

    ECS Type

    Direction

    Table 5 Remotely connecting to an ECS from a local server to upload or download files

    Direction

    +
    @@ -159,12 +159,35 @@
    Table 5 Remotely connecting to an ECS from any server to upload or download files

    Direction

    Type

    -

    You must first install the FTP server program on the ECSs and check whether ports 20 and 21 are working properly.

    +
    • If the source is set to 0.0.0.0/0, all external IP addresses are allowed to remotely log in to the ECS to upload or download files. To ensure network security and prevent service interruptions caused by network intrusions, set the source to a known IP address. For details, see Table 6.
    • You must first install the FTP server program on the ECSs and check whether ports 20 and 21 are working properly.
    + +
    + + + + + + + + + + + +
    Table 6 Remotely connecting to an ECS from a known server to upload or download files

    Direction

    +

    Type

    +

    Protocol & Port

    +

    Source

    +

    Inbound

    +

    IPv4

    +

    TCP: 20-21

    +

    IP address: 192.168.0.0/24

    +
    +

    Setting Up a Website on an ECS to Provide Services Externally

    A security group denies all external requests by default. If you have set up a website on an ECS that can be accessed externally, you need to add an inbound rule to the ECS security group to allow access over specific ports, such as HTTP (80) and HTTPS (443).

    -
    Table 6 Setting up a website on an ECS to provide services externally

    Direction

    +
    @@ -198,7 +221,7 @@

    Using ping Command to Verify Network Connectivity

    Ping works by sending an Internet Control Message Protocol (ICMP) Echo Request. To ping an ECS from your PC to verify the network connectivity, you need to add an inbound rule to the security group of the ECS to allow ICMP traffic.

    -
    Table 7 Setting up a website on an ECS to provide services externally

    Direction

    Type

    Table 7 Using ping command to verify network connectivity

    Direction

    +
    @@ -232,7 +255,7 @@

    Enabling Communications Between Instances in Different Security Groups

    Instances in the same VPC but associated with different security groups cannot communicate with each other. If you want ECSs in security group sg-A to access MySQL databases in security group sg-B, you need to add an inbound rule to security group sg-B to allow access from ECSs in security group sg-A.

    -
    Table 8 Using ping command to verify network connectivity

    Direction

    Type

    Table 8 Enabling communications between instances in different security groups

    Direction

    +
    @@ -258,7 +281,7 @@

    Allowing External Instances to Access the Database Deployed on an ECS

    A security group denies all external requests by default. If you have deployed a database on an ECS and want the database to be accessed from external instances on a private network, you need to add an inbound rule to the security group of the ECS to allow access over corresponding ports. Here are some common ports for databases:
    • MySQL: port 3306
    • Oracle: port 1521
    • MS SQL: port 1433
    • PostgreSQL: port 5432
    • Redis: port 6379
    -
    Table 9 Enabling communications between instances in different security groups

    Direction

    Type

    Table 9 Allowing external instances to access the database deployed on an ECS

    Direction

    +
    @@ -320,9 +343,9 @@

    In this example, the source is for reference only. Set the source address based on your requirements.

    -

    Allowing ECSs to Access Specific External Websites

    By default, a security group allows all outbound traffic. Table 11 lists the default rules. If you want to allow ECSs to access specific websites, configure the security group as follows:

    +

    Allowing ECSs to Access Specific External Websites

    By default, a security group allows all outbound traffic. Table 12 lists the default rules. If you want to allow ECSs to access specific websites, configure the security group as follows:

    1. Add outbound rules to allow traffic over specific ports to specific IP addresses. -
    Table 10 Allowing external instances to access the database deployed on an ECS

    Direction

    Type

    Table 10 Allowing ECSs to access specific external websites

    Direction

    +
    @@ -360,7 +383,7 @@
    Table 11 Allowing ECSs to access specific external websites

    Direction

    Type

  26. Delete the original outbound rules that allow all traffic. -
    Table 11 Default outbound rules in a security group

    Direction

    +
    diff --git a/docs/ecs/umn/en-us_topic_0140963099.html b/docs/ecs/umn/en-us_topic_0140963099.html index ac6c4ecc..45966ee0 100644 --- a/docs/ecs/umn/en-us_topic_0140963099.html +++ b/docs/ecs/umn/en-us_topic_0140963099.html @@ -109,7 +109,7 @@

  27. Enable IPv6 for the ECS.

    1. Run the following command to check whether IPv6 is enabled for the kernel:

      sysctl -a | grep ipv6

      • If a command output is displayed, IPv6 is enabled.
      • If no information is displayed, IPv6 is disabled. Go to 2.b to load the IPv6 module.
    2. Run the following command to load the IPv6 module:

      modprobe ipv6

      -
    3. Add the following content to the /etc/sysctl.conf file:

      net.ipv6.conf.all.disable_ipv6=0

      +
    4. Add the following content to the /etc/sysctl.conf file:

      net.ipv6.conf.all.disable_ipv6=0

    5. Save the configuration and exit. Then, run the following command to load the configuration:

      sysctl -p

  28. Enable dynamic IPv6 address assignment for the ECS.

    • Ubuntu 18.04/20.04
      1. Run the following command to access /etc/netplan/:

        cd /etc/netplan

        @@ -195,15 +195,15 @@ DHCPV6C=yes
        • CentOS 6.x:
          1. Run the following command to edit the dhclient.conf file:

            vi /etc/dhcp/dhclient.conf

          2. Press i to enter editing mode and add the timeout attribute to the file.
            timeout  30;
          3. Enter :wq to save the settings and exit.
          -
        • Debian 7.5:
          1. Run the following command to edit the networking file:

            vi /etc/init.d/networking

            +
          2. Debian 7.5:
            1. Run the following command to edit the networking file:

              vi /etc/init.d/networking

            1. Press i to enter editing mode and add the timeout attribute.
              Figure 20 Modification 1
              Figure 21 Modification 2
            -
          3. Debian 8.2.0/8.8.0
            1. Run the following command to edit the network-pre.conf file:

              vi /lib/systemd/system/networking.service.d/network-pre.conf

              +
            2. Debian 8.2.0/8.8.0
              1. Run the following command to edit the network-pre.conf file:

                vi /lib/systemd/system/networking.service.d/network-pre.conf

              2. Press i to enter editing mode and add the timeout attribute to the file.
                [Service]
                 TimeoutStartSec=30
              -
            3. Debian 9.0
              1. Run the following command to edit the networking.service file:

                vi /etc/system/system/network-online.target.wants/networking.service

                +
              2. Debian 9.0
                1. Run the following command to edit the networking.service file:

                  vi /etc/system/system/network-online.target.wants/networking.service

                2. Press i to enter editing mode and change TimeoutStartSec=5min to TimeoutStartSec=30.
        diff --git a/docs/ecs/umn/en-us_topic_0144542149.html b/docs/ecs/umn/en-us_topic_0144542149.html index cff5476d..eee0a5cf 100644 --- a/docs/ecs/umn/en-us_topic_0144542149.html +++ b/docs/ecs/umn/en-us_topic_0144542149.html @@ -5,6 +5,8 @@

        Each EIP can be used by only one cloud resource at a time.

        Figure 1 Accessing the Internet using an EIP
        +

        Basic Settings

        1. Select an AZ.

          An AZ is a physical location that uses independent power supply and networks. AZs in the same region can communicate with each other over an intranet.

          • To enhance application availability, create ECSs in different AZs.
          • To shorten network latency, create ECSs in the same AZ.
          -
          • During the creation process, you can select a random AZ. The system will use a hash algorithm to select an AZ as the default AZ based on your universally unique identifier (UUID).
          • The available ECS types and flavors vary depending on AZs. To view all supported ECS types and flavors on the cloud service platform, set AZ to Random. Then, the system automatically allocates an AZ according to your selected ECS flavor.

            For example, S3 ECSs are available only in AZ1; S2 ECSs are available in AZ2 and AZ3 and have been sold out in AZ1. If you set AZ to Random, you can view both S3 and S2 ECSs. If you create an S3 ECS, the system automatically allocates it to AZ1. If you create an S2 ECS, the system randomly allocates it to AZ2 or AZ3.

            +
            • During the creation process, you can select a random AZ. The system will use a hash algorithm to select an AZ as the default AZ based on your universally unique identifier (UUID).

              If you batch create multiple ECSs and want to deploy them in different AZs, select Multi-AZ deployment.

              +
            • The available ECS types and flavors vary depending on AZs. To view all supported ECS types and flavors on the cloud service platform, set AZ to Random. Then, the system automatically allocates an AZ according to your selected ECS flavor.

              For example, S3 ECSs are available only in AZ1; S2 ECSs are available in AZ2 and AZ3 and have been sold out in AZ1. If you set AZ to Random, you can view both S3 and S2 ECSs. If you create an S3 ECS, the system automatically allocates it to AZ1. If you create an S2 ECS, the system randomly allocates it to AZ2 or AZ3.

          • Set DeH.

            This configuration is optional. This parameter is available only when you click Create ECS on the Dedicated Host page. It is unavailable when you click Create ECS on the Elastic Cloud Server page.

            DeH refers to physical server resources dedicated for a specified user. You can deploy ECSs on DeHs for better isolation, security, and performance of your ECSs. You can continue using your existing server software licenses of ECSs on DeHs to reduce costs. For more details, see Dedicated Host User Guide.

          • Set Specifications.

            The cloud platform provides various ECS types for different application scenarios. You can choose from existing ECS types and flavors in the list. Alternatively, you can enter a flavor or specify vCPUs and memory size to search for the flavor suited to your needs.

            Latest generation shows the types and flavors of newly released ECSs, and All generations show the types and flavors of all ECSs provided by the cloud platform.

            -
            • Before selecting an ECS type, learn about the introduction and notes on each type of ECSs. For details, see ECS Types.
            • You can select Hide sold-out specifications to hide specifications that have been sold out.
            • Local Disk: specifies the local storage of the physical server where the ECS is deployed. Only Hard Disk Driver (HDD) disks are supported. If the ECS of the selected type (such as Disk-intensive) uses local disks, the system automatically attaches the local disks to the ECS and displays the information of the local disks.

              For example, if Local Disk is 3x1800 GiB (HDD), three HDDs are attached to the ECS and the capacity of each HDD is 1800 GiB.

              +
              • Before selecting an ECS type, learn about various types of ECSs and their precautions. For details, see ECS Types.
              • You can select Hide sold-out specifications to hide specifications that have been sold out.
              • Local Disk: specifies the local storage of the physical server where the ECS is deployed. Only Hard Disk Driver (HDD) disks are supported. If the ECS of the selected type (such as Disk-intensive) uses local disks, the system automatically attaches the local disks to the ECS and displays the information of the local disks.

                For example, if Local Disk is 3x1800 GiB (HDD), three HDDs are attached to the ECS and the capacity of each HDD is 1800 GiB.

            • Select an image.
              • Public image

                A public image is a standard, widely used image. It contains an OS and preinstalled public applications and is available to all users. You can configure the runtime environment or software in the public image as needed.

                @@ -35,15 +36,15 @@
              • Bring your own license (BYOL)

                Allows you to use your existing OS license. In such a case, you do not need to apply for a license again.

              For more information about license types, see License Types.

              -
            • Set System Disk and Data Disk if required.
              • System disk

                For details about the disk types supported by ECS, see EVS Disks.

                +
              • Set System Disk and Data Disk if required.
                • System disk

                  For details about the disk types supported by ECSs, see EVS Disks.

                  • If the image based on which an ECS is created is not encrypted, the system disk of the ECS is not encrypted. If the image based on which an ECS is created is encrypted, the system disk of the ECS is automatically encrypted. For details, see (Optional) Encryption-related parameters.
                  • Encryption: indicates that the system disk is encrypted if you select this option. For details, see (Optional) Encryption-related parameters.
                • Data disk

                  You can create multiple data disks for an ECS and enable required functions for each data disk. During the creation process, you can add a maximum of 23 data disks for each ECS and customize the disk size as needed.

                  Click Show and set the following functions if required:

                  -
                  • SCSI: indicates that the device type of the data disk is SCSI if you select this option. For more information about SCSI disks and the ECSs that can be attached with SCSI disks, see EVS Disks.
                  • Share: indicates that the EVS disk is sharable if you select this option. Such an EVS disk can be attached to multiple ECSs.
                  • Encryption: indicates that the data disk is encrypted if you select this option. For details, see (Optional) Encryption-related parameters.
                  • Create Disk from Data Disk Image: If you have created a data disk image on the Image Management Service page, when using a Windows or Linux image to create an ECS, you can use the data disk image to create data disks for the ECS.

                    Click Create Disk from Data Disk Image. In the dialog box that is displayed, select your data disk image.

                    +
                    • SCSI: indicates that the device type of the data disk is SCSI if you select this option. For more information about SCSI disks and ECSs that can have SCSI disks attached, see EVS Disks.
                    • Share: indicates that the EVS disk is sharable if you select this option. Such an EVS disk can be attached to multiple ECSs.
                    • Encryption: indicates that the data disk is encrypted if you select this option. For details, see (Optional) Encryption-related parameters.
                    • Create Disk from Data Disk Image: If you have created a data disk image on the Image Management Service page, when using a Windows or Linux image to create an ECS, you can use the data disk image to create data disks for the ECS.

                      Click Create Disk from Data Disk Image. In the dialog box that is displayed, select your data disk image.

                      • One data disk image can be used for one data disk only.
                      • When you use a data disk image to create a disk, SCSI, Encryption, and Share are unavailable.
                      • For instructions about how to create a data disk image, see Image Management Service User Guide.
                    -
                  • (Optional) Encryption-related parameters

                    To enable encryption, click Create Xrole to assign KMS access permissions to EVS. If you have rights granting permission, assign the KMS access permissions to EVS. If you do not have the permission, contact the user having the security administrator rights to assign the KMS access permissions. For details, see Can All Users Use the Encryption Feature?

                    +
                  • (Optional) Encryption-related parameters

                    To enable encryption, click Create Xrole to assign KMS access permissions to EVS. If you have rights granting permissions, assign the KMS access permissions to EVS. If you do not have the required permissions, contact the user who has the Security Administrator permissions to assign the KMS access permissions. For details, see Can All Users Use the Encryption Feature?

                    • Encryption: indicates that the EVS disk has been encrypted.
                    • Create Xrole: assigns KMS access permissions to EVS to obtain KMS keys. After the permissions are assigned, follow-up operations do not require assigning permissions again.
                    • Xrole Name: set to EVSAccessKMS, which means that permissions have been assigned to EVS to obtain KMS keys for encrypting or decrypting EVS disks.
                    • KMS Key Name: specifies the name of the key used by the encrypted EVS disk. You can select an existing key, or click Create KMS Key and create a new one on the KMS console. The default value is evs/default.
                    • KMS Key ID: specifies the ID of the key used by the encrypted data disk.
                • Click Next: Configure Network.
        diff --git a/docs/ecs/umn/en-us_topic_0163572590.html b/docs/ecs/umn/en-us_topic_0163572590.html index 1c716cd4..1753447a 100644 --- a/docs/ecs/umn/en-us_topic_0163572590.html +++ b/docs/ecs/umn/en-us_topic_0163572590.html @@ -18,7 +18,7 @@

        If you use the default security group rules for the outbound direction, the preceding requirements are met, and the ECS can be initialized. The default security group rules for the outbound direction are as follows:

        • Protocol: ANY
        • Port: ANY
        • Remote End: 0.0.0.0/16
        -
      2. Set EIP.

        An EIP is a static public IP address bound to an ECS in a VPC. Using the EIP, the ECS can provide services externally.

        +
      3. Set EIP.

        An EIP is a static public IP address bound to an ECS in a VPC. Using the EIP, the ECS can provide services externally.

        The following options are provided:

        • Auto assign

          The system automatically assigns an EIP for the ECS. The EIP provides a dedicated bandwidth that is configurable.

        • Use existing

          An existing EIP is assigned for the ECS. When using an existing EIP, you are not allowed to create ECSs in a batch.

          diff --git a/docs/ecs/umn/en-us_topic_0170265910.html b/docs/ecs/umn/en-us_topic_0170265910.html index 89be1115..69024178 100644 --- a/docs/ecs/umn/en-us_topic_0170265910.html +++ b/docs/ecs/umn/en-us_topic_0170265910.html @@ -1,6 +1,6 @@ -

          Permissions Management

          +

          Using IAM to Grant Access to ECS

          diff --git a/docs/ecs/umn/en-us_topic_0170265914.html b/docs/ecs/umn/en-us_topic_0170265914.html index b323bbc8..e6091c27 100644 --- a/docs/ecs/umn/en-us_topic_0170265914.html +++ b/docs/ecs/umn/en-us_topic_0170265914.html @@ -67,7 +67,7 @@ diff --git a/docs/ecs/umn/en-us_topic_0177512565.html b/docs/ecs/umn/en-us_topic_0177512565.html index 957624c1..896a5cf4 100644 --- a/docs/ecs/umn/en-us_topic_0177512565.html +++ b/docs/ecs/umn/en-us_topic_0177512565.html @@ -3413,519 +3413,629 @@
  29. Table 12 Default outbound rules in a security group

    Direction

    Type

    -
    Table 17 P3 ECS specifications

    Flavor

    +
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Table 17 P5s ECS specifications

    Flavor

    vCPUs

    +

    vCPUs

    Memory

    -

    (GiB)

    +

    Memory (GiB)

    Max./Assured Bandwidth (Gbit/s)

    +

    Max./Assured Bandwidth (Gbit/s)

    Max. PPS

    -

    (10,000)

    +

    Max. PPS (10,000)

    Max. NIC Queues

    +

    Max. NIC Queues

    Max. NICs

    +

    Max. NICs

    GPUs

    +

    GPUs

    GPU Memory

    -

    (GiB)

    +

    GPU Memory (GiB)

    Virtualization

    +

    Virtualization

    p3.2xlarge.8

    +

    p5s.5xlarge.12

    8

    +

    20

    64

    +

    240

    10/4

    +

    16/4.5

    100

    +

    280

    4

    +

    8

    4

    +

    4

    1 × NVIDIA A100 80GB

    +

    1 * H100 PCIe

    80

    +

    80

    KVM

    +

    KVM

    p3.4xlarge.8

    +

    p5s.10xlarge.12

    16

    +

    40

    128

    +

    480

    15/8

    +

    24/9

    200

    +

    550

    8

    +

    16

    8

    +

    8

    2 × NVIDIA A100 80GB

    +

    2 * H100 PCIe

    160

    +

    160

    KVM

    +

    KVM

    p3.8xlarge.8

    +

    p5s.20xlarge.12

    32

    +

    80

    256

    +

    960

    25/15

    +

    32/18

    350

    +

    750

    16

    +

    32

    8

    +

    8

    4 × NVIDIA A100 80GB

    +

    4 * H100 PCIe

    320

    +

    320

    KVM

    +

    KVM

    p3.16xlarge.8

    +

    p5s.40xlarge.12

    64

    +

    160

    512

    +

    1920

    36/30

    +

    40/36

    700

    +

    850

    32

    +

    32

    8

    +

    8

    8 × NVIDIA A100 80GB

    +

    8 * H100 PCIe

    640

    +

    640

    KVM

    +

    KVM

    -
    Table 18 P2s ECS specifications

    Flavor

    +
    - - - - - - - - - - - - - - - - - - - - - - + - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Table 18 P3 ECS specifications

    Flavor

    vCPUs

    +

    vCPUs

    Memory

    -

    (GiB)

    +

    Memory

    +

    (GiB)

    Max./Assured Bandwidth (Gbit/s)

    +

    Max./Assured Bandwidth (Gbit/s)

    Max. PPS (10,000)

    +

    Max. PPS

    +

    (10,000)

    Max. NIC Queues

    +

    Max. NIC Queues

    Max. NICs

    +

    Max. NICs

    GPUs

    +

    GPUs

    GPU Connection

    +

    GPU Memory

    +

    (GiB)

    GPU Memory (GiB)

    -

    Virtualization

    -

    Hardware

    +

    Virtualization

    p2s.2xlarge.8

    +

    p3.2xlarge.8

    8

    +

    8

    64

    +

    64

    10/4

    +

    10/4

    50

    +

    100

    4

    +

    4

    4

    +

    4

    1 × V100

    +

    1 × NVIDIA A100 80GB

    PCIe Gen3

    +

    80

    1 × 32 GiB

    +

    KVM

    KVM

    +

    p3.4xlarge.8

    CPU: 2nd Generation Intel® Xeon® Scalable Processor 6278

    +

    16

    +

    128

    +

    15/8

    +

    200

    +

    8

    +

    8

    +

    2 × NVIDIA A100 80GB

    +

    160

    +

    KVM

    +

    p3.8xlarge.8

    +

    32

    +

    256

    +

    25/15

    +

    350

    +

    16

    +

    8

    +

    4 × NVIDIA A100 80GB

    +

    320

    +

    KVM

    +

    p3.16xlarge.8

    +

    64

    +

    512

    +

    36/30

    +

    700

    +

    32

    +

    8

    +

    8 × NVIDIA A100 80GB

    +

    640

    +

    KVM

    +
    +
    + +
    + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Table 19 P2s ECS specifications

    Flavor

    +

    vCPUs

    +

    Memory

    +

    (GiB)

    +

    Max./Assured Bandwidth (Gbit/s)

    +

    Max. PPS (10,000)

    +

    Max. NIC Queues

    +

    Max. NICs

    +

    GPUs

    +

    GPU Connection

    +

    GPU Memory (GiB)

    +

    Virtualization

    +

    Hardware

    +

    p2s.2xlarge.8

    +

    8

    +

    64

    +

    10/4

    +

    50

    +

    4

    +

    4

    +

    1 × V100

    +

    PCIe Gen3

    +

    1 × 32 GiB

    +

    KVM

    +

    CPU: 2nd Generation Intel® Xeon® Scalable Processor 6278

    p2s.4xlarge.8

    +

    p2s.4xlarge.8

    16

    +

    16

    128

    +

    128

    15/8

    +

    15/8

    100

    +

    100

    8

    +

    8

    8

    +

    8

    2 × V100

    +

    2 × V100

    PCIe Gen3

    +

    PCIe Gen3

    2 × 32 GiB

    +

    2 × 32 GiB

    KVM

    +

    KVM

    p2s.8xlarge.8

    +

    p2s.8xlarge.8

    32

    +

    32

    256

    +

    256

    25/15

    +

    25/15

    200

    +

    200

    16

    +

    16

    8

    +

    8

    4 × V100

    +

    4 × V100

    PCIe Gen3

    +

    PCIe Gen3

    4 × 32 GiB

    +

    4 × 32 GiB

    KVM

    +

    KVM

    p2s.16xlarge.8

    +

    p2s.16xlarge.8

    64

    +

    64

    512

    +

    512

    30/30

    +

    30/30

    400

    +

    400

    32

    +

    32

    8

    +

    8

    8 × V100

    +

    8 × V100

    PCIe Gen3

    +

    PCIe Gen3

    8 × 32 GiB

    +

    8 × 32 GiB

    KVM

    +

    KVM

    -
    Table 19 P2v ECS specifications

    Flavor

    +
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Table 20 P2v ECS specifications

    Flavor

    vCPUs

    +

    vCPUs

    Memory

    +

    Memory

    (GiB)

    Max./Assured Bandwidth (Gbit/s)

    +

    Max./Assured Bandwidth (Gbit/s)

    Max. PPS (10,000)

    +

    Max. PPS (10,000)

    Max. NIC Queues

    +

    Max. NIC Queues

    Max. NICs

    +

    Max. NICs

    GPUs

    +

    GPUs

    GPU Connection

    +

    GPU Connection

    GPU Memory

    +

    GPU Memory

    (GiB)

    Virtualization

    +

    Virtualization

    Hardware

    +

    Hardware

    p2v.2xlarge.8

    +

    p2v.2xlarge.8

    8

    +

    8

    64

    +

    64

    10/4

    +

    10/4

    50

    +

    50

    4

    +

    4

    4

    +

    4

    1 × V100

    +

    1 × V100

    N/A

    +

    N/A

    1 × 16 GiB

    +

    1 × 16 GiB

    KVM

    +

    KVM

    CPU: Intel® Xeon® Skylake-SP Gold 6151 v5

    +

    CPU: Intel® Xeon® Skylake-SP Gold 6151 v5

    p2v.4xlarge.8

    +

    p2v.4xlarge.8

    16

    +

    16

    128

    +

    128

    15/8

    +

    15/8

    100

    +

    100

    8

    +

    8

    8

    +

    8

    2 × V100

    +

    2 × V100

    NVLink

    +

    NVLink

    2 × 16 GiB

    +

    2 × 16 GiB

    KVM

    +

    KVM

    p2v.8xlarge.8

    +

    p2v.8xlarge.8

    32

    +

    32

    256

    +

    256

    25/15

    +

    25/15

    200

    +

    200

    16

    +

    16

    8

    +

    8

    4 × V100

    +

    4 × V100

    NVLink

    +

    NVLink

    4 × 16 GiB

    +

    4 × 16 GiB

    KVM

    +

    KVM

    p2v.16xlarge.8

    +

    p2v.16xlarge.8

    64

    +

    64

    512

    +

    512

    30/30

    +

    30/30

    400

    +

    400

    32

    +

    32

    8

    +

    8

    8 × V100

    +

    8 × V100

    NVLink

    +

    NVLink

    8 × 16 GiB

    +

    8 × 16 GiB

    KVM

    +

    KVM

    -
    Table 20 Pi2 ECS specifications

    Flavor

    +
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/docs/ecs/umn/en-us_topic_0240831198.html b/docs/ecs/umn/en-us_topic_0240831198.html index 7a025b10..e15a5703 100644 --- a/docs/ecs/umn/en-us_topic_0240831198.html +++ b/docs/ecs/umn/en-us_topic_0240831198.html @@ -10,7 +10,7 @@
    UUID=b9a07b7b-9322-4e05-ab9b-14b8050bdc8a  /  ext4  defaults  0  1 
     /dev/vdb1                       /data1   ext4  defaults  0  0 
     /dev/vdc1                       /data2   ext4  defaults  0  0
    -

    After /dev/vdb1 is detached and the ECS is restarted, /dev/vdc1 becomes /dev/vdb1 and is mounted to /data. In such a case, no disk is mounted to /data2.

    +

    After /dev/vdb1 is detached and the ECS is restarted, /dev/vdc1 becomes /dev/vdb1 and is mounted to /data1. In such a case, no disk is mounted to /data2.

    The change of drive letters can affect the running of applications. To solve this problem, you are advised to use the universally unique identifiers (UUIDs) to replace /dev/vdx because a UUID uniquely identifies a disk partition in the Linux OS.

    Solution

    1. Log in to the ECS.
    2. Run the following command to obtain the partition UUID:

      blkid Disk partition

    Table 21 Pi2 ECS specifications

    Flavor

    vCPUs

    +

    vCPUs

    Memory

    +

    Memory

    (GiB)

    Max./Assured Bandwidth

    +

    Max./Assured Bandwidth

    (Gbit/s)

    Max. PPS

    +

    Max. PPS

    (10,000)

    Max. NIC Queues

    +

    Max. NIC Queues

    Max. NICs

    +

    Max. NICs

    GPUs

    +

    GPUs

    GPU Memory

    +

    GPU Memory

    (GiB)

    Local Disks

    +

    Local Disks

    Virtualization

    +

    Virtualization

    Hardware

    +

    Hardware

    pi2.2xlarge.4

    +

    pi2.2xlarge.4

    8

    +

    8

    32

    +

    32

    10/4

    +

    10/4

    50

    +

    50

    4

    +

    4

    4

    +

    4

    1 × T4

    +

    1 × T4

    1 × 16 GiB

    +

    1 × 16 GiB

    N/A

    +

    N/A

    KVM

    +

    KVM

    CPU: Intel® Xeon® Skylake 6151 3.0 GHz or Intel® Xeon® Cascade Lake 6278 2.6 GHz

    +

    CPU: Intel® Xeon® Skylake 6151 3.0 GHz or Intel® Xeon® Cascade Lake 6278 2.6 GHz

    pi2.3xlarge.4

    +

    pi2.3xlarge.4

    12

    +

    12

    48

    +

    48

    12/6

    +

    12/6

    80

    +

    80

    6

    +

    6

    6

    +

    6

    1 × T4

    +

    1 × T4

    1 × 16 GiB

    +

    1 × 16 GiB

    N/A

    +

    N/A

    KVM

    +

    KVM

    pi2.4xlarge.4

    +

    pi2.4xlarge.4

    16

    +

    16

    64

    +

    64

    15/8

    +

    15/8

    100

    +

    100

    8

    +

    8

    8

    +

    8

    2 × T4

    +

    2 × T4

    2 × 16 GiB

    +

    2 × 16 GiB

    N/A

    +

    N/A

    KVM

    +

    KVM

    pi2.8xlarge.4

    +

    pi2.8xlarge.4

    32

    +

    32

    128

    +

    128

    25/15

    +

    25/15

    200

    +

    200

    16

    +

    16

    8

    +

    8

    4 × T4

    +

    4 × T4

    4 × 16 GiB

    +

    4 × 16 GiB

    N/A

    +

    N/A

    KVM

    +

    KVM

    pi2.16xlarge.4

    +

    pi2.16xlarge.4

    64

    +

    64

    256

    +

    256

    30/30

    +

    30/30

    400

    +

    400

    32

    +

    32

    8

    +

    8

    8 × T4

    +

    8 × T4

    8 × 16 GiB

    +

    8 × 16 GiB

    N/A

    +

    N/A

    KVM

    +

    KVM