Common Operations
When using BMSs, you may encounter various problems, such as remotely logging in to a BMS, expanding disk capacity, and reinstalling the OS. This section provides navigation to common operations to help you with these problems.
Create and Manage a BMS
General Operations
Perform the following steps to use a BMS:
- Create a BMS by following the instructions in Creating a Common BMS.
If the BMS quota is insufficient, you can apply to increase the quota by following the instructions in Adjusting Resource Quotas.
- Log in to the BMS. The login mode varies depending on the BMS OS.
- Stop the BMS by following the instructions in Stopping a BMS.
- Delete the BMS by following the instructions in Releasing a BMS.
Billing Management
You can renew your yearly/monthly BMS in the following ways:
Configuration Change
If the BMS OS cannot meet your requirements, you can reinstall or change the OS by following the instructions in Reinstalling the OS.
Refined BMS Control and Management
You can control and manage your BMS in a refined way using the following methods:
BMS Security and Reliability Configuration
You can improve the security and reliability of your BMS using the following methods:
Create and Manage Private Images
By using private images, you can quickly deploy the service environment.
You can create a private BMS image in the following ways:
You can perform the following operations on private images:
- Share images with other tenants.
- Export images to your OBS bucket.
Create and Manage Disks
General Operations
To use a disk as a data disk, perform the following steps:
- Create a disk in any of the following ways:
- Attach the disk to a BMS.
- Initialize the disk.
- Detach the disk from the BMS.
- Delete the disk.
Configuration Changes
If the capacity of an existing system disk or data disk cannot meet requirements, you can expand the disk capacity. For details, see Expanding the Capacity of an EVS Disk. After the disk capacity has been expanded, the additional disk space needs to be allocated to an existing partition or a new partition.
Create and Use a Key Pair
To use a key pair, perform the following steps:
- Create or import a key pair.
- When creating a BMS, bind the key pair to the BMS.
- Log in to the BMS using the key pair.
- Delete the key pair.
Create and Manage a BMS Network
Security Group
To use a security group, perform the following steps:
- Create a security group.
- Add a security group rule.
- When creating a BMS, add it to the security group.
- Delete the security group rule.
- Delete the security group.
EIP
To use an EIP, perform the following steps:
VPC
You can bind an extra IP address (virtual or floating IP address) to a NIC to enable flexible network functions. You can also enable the source/destination check function of the NIC to prevent packet spoofing and improve security.
Tags
You can use tags to identify various resources to improve the efficiency in classifying, querying, and managing resources. To use a tag, perform the following steps:
Monitor a BMS
To meet the basic monitoring and O&M requirements for servers, Server Monitoring monitors more than 40 metrics, such as CPU, memory, disk, and network. You need to install Agent on the BMS to implement the monitoring. For details, see Overview.
For all the supported BMS metrics, see Monitored Metrics (with Agent Installed).
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.