Updated on 2024-05-17 GMT+08:00

Common Operations

When using BMSs, you may encounter various problems, such as remotely logging in to a BMS, expanding disk capacity, and reinstalling the OS. This section provides navigation to common operations to help you with these problems.

Create and Manage a BMS

General Operations

Perform the following steps to use a BMS:

  1. Create a BMS by following the instructions in Creating a Common BMS.

    If the BMS quota is insufficient, you can apply to increase the quota by following the instructions in Adjusting Resource Quotas.

  2. Log in to the BMS. The login mode varies depending on the BMS OS.
  3. Stop the BMS by following the instructions in Stopping a BMS.
  4. Delete the BMS by following the instructions in Releasing a BMS.

Billing Management

You can renew your yearly/monthly BMS in the following ways:

Configuration Change

If the BMS OS cannot meet your requirements, you can reinstall or change the OS by following the instructions in Reinstalling the OS.

Refined BMS Control and Management

You can control and manage your BMS in a refined way using the following methods:

BMS Security and Reliability Configuration

You can improve the security and reliability of your BMS using the following methods:

Create and Manage Private Images

By using private images, you can quickly deploy the service environment.

You can create a private BMS image in the following ways:

You can perform the following operations on private images:

Create and Manage Disks

General Operations

To use a disk as a data disk, perform the following steps:

  1. Create a disk in any of the following ways:
  2. Attach the disk to a BMS.
  3. Initialize the disk.
  4. Detach the disk from the BMS.
  5. Delete the disk.

Configuration Changes

If the capacity of an existing system disk or data disk cannot meet requirements, you can expand the disk capacity. For details, see Expanding the Capacity of an EVS Disk. After the disk capacity has been expanded, the additional disk space needs to be allocated to an existing partition or a new partition.

Create and Use a Key Pair

To use a key pair, perform the following steps:

  1. Create or import a key pair.
  2. When creating a BMS, bind the key pair to the BMS.
  3. Log in to the BMS using the key pair.
  4. Delete the key pair.

Create and Manage a BMS Network

Security Group

To use a security group, perform the following steps:

  1. Create a security group.
  2. Add a security group rule.
  3. When creating a BMS, add it to the security group.
  4. Delete the security group rule.
  5. Delete the security group.


To use an EIP, perform the following steps:

  1. Bind an EIP to a BMS.
  2. Unbind the EIP from the BMS.


You can bind an extra IP address (virtual or floating IP address) to a NIC to enable flexible network functions. You can also enable the source/destination check function of the NIC to prevent packet spoofing and improve security.


You can use tags to identify various resources to improve the efficiency in classifying, querying, and managing resources. To use a tag, perform the following steps:

  1. Add a tag.
  2. Query resources by tag.
  3. Delete a tag.

Monitor a BMS

To meet the basic monitoring and O&M requirements for servers, Server Monitoring monitors more than 40 metrics, such as CPU, memory, disk, and network. You need to install Agent on the BMS to implement the monitoring. For details, see Overview.

For all the supported BMS metrics, see Monitored Metrics (with Agent Installed).