- What's New
-
Service Overview
- DSS Infographics
- What Is DSS?
- Region and AZ
- Storage Pool Types and Performance
- Storage Pool Capacity Description
- DSS Disks
- DSS Three-Copy Redundancy
- Device Types and Usage Instructions
- Shared Disks and Usage Instructions
- Disk Encryption
- Disk Backup
- DSS and Other Services
- Billing
- Permissions
- Constraints
- Change History
-
Getting Started
- Operation Procedure
- Step 1: Apply for a Storage Pool
- Step 2: Create a Disk
- Step 3: Attach a Disk
-
Step 4: Initialize a Data Disk
- Introduction to Data Disk Initialization Scenarios and Partition Styles
- Initializing a Data Disk in Windows (Windows Server 2008)
- Initializing a Data Disk in Windows (Windows Server 2016)
- Initializing a Data Disk in Linux (fdisk)
- Initializing a Data Disk in Linux (parted)
- Initializing a Data Disk Greater Than 2 TB in Windows (Windows Server 2008)
- Initializing a Data Disk Greater Than 2 TB in Windows (Windows Server 2012)
- Initializing a Data Disk Greater Than 2 TB in Linux (parted)
- Change History
-
User Guide
- Permissions Management
- Storage Pool Management
-
Disk Management
- Detaching a Disk
- Attaching an Existing Disk
- Deleting a Disk
-
Expanding the Capacity of a Disk
- Introduction to Expansion Scenarios
- Expanding an In-use Disk
- Expanding an Available Disk
- Extending Partitions and File Systems on Windows
- Extending Partitions and File Systems on Linux (fdisk)
- Extending Partitions and File Systems on Linux (parted)
- Extending Partitions and File Systems of a SCSI Data Disk on Linux (fdisk)
- Extending Partitions and File Systems of a System Disk on Linux (fdisk)
- Managing Encrypted Disks
- Managing Shared Disks
- Managing Backups
- Change History
- API Reference
-
FAQs
- What Are the Risks of Not Expanding the Storage Pool Capacity?
- How Many Statuses Does a Storage Pool Have?
- How Many Statuses Does a Disk Have?
- Troubleshooting and Impacts on the DSS Usage
- Can I Attach a Disk to Multiple Servers?
- Will Data in the DSS Disk Be Lost When the DSS Disk Is Detached?
- What Should I Do If an Error Occurs on My DSS Disk?
- How Can I Test DSS Disk Performance?
- What Are the Restrictions on Attaching a Disk to an ECS?
- What Are the Precautions for Detaching a Disk from an ECS?
- Why My Disk Cannot Be Attached to a Server?
- Can the Disk Space Usage Be Reduced If I Delete Files on a Server?
- Videos
- Glossary
-
More Documents
-
User Guide (Paris and Amsterdam Regions)
- Introduction
-
Quick Start
- Operation Procedure
- Step 1: Apply for a Storage Pool
- Step 2: Create a Disk
- Step 3: Attach a Disk
-
Initialize a Data Disk
- Introduction to Data Disk Initialization Scenarios and Partition Styles
- Initializing a Data Disk in Windows (Windows Server 2008)
- Initializing a Data Disk in Windows (Windows Server 2016)
- Initializing a Data Disk in Linux (fdisk)
- Initializing a Data Disk in Linux (parted)
- Initializing a Data Disk Greater Than 2 TB in Windows (Windows Server 2008)
- Initializing a Data Disk Greater Than 2 TB in Windows (Windows Server 2012)
- Initializing a Data Disk Greater Than 2 TB in Linux (parted)
- Obtaining the Domain Name
- Obtaining the Region
-
Management
- Storage Pool Management
-
Disk Management
- Detaching a Disk
- Deleting a Disk
-
Expanding the Capacity of a Disk
- Introduction to Expansion Scenarios
- Expanding an In-use Disk
- Expanding an Available Disk
- Performing Post-Expansion Operations for a Windows Disk
- Performing Post-Expansion Operations for a Disk in Linux (fdisk)
- Performing Post-Expansion Operations for a Disk in Linux (parted)
- Performing Post-Expansion Operations for a SCSI Data Disk in Linux (fdisk)
- Performing Post-Expansion Operations for a System Disk in Linux (fdisk)
- Managing an Encrypted Disk
- Managing a Shared Disk
- Managing a Backup
-
FAQs
- What Are the Risks of Not Expanding the Storage Pool Capacity?
- How Many Statuses Does a Storage Pool Have?
- How Many Statuses Does a Disk Have?
- Troubleshooting and Impacts on the DSS Usage
- Can I Attach a Disk to Multiple Servers?
- Will Data in the DSS Disk Be Lost When the DSS Disk Is Detached?
- What Should I Do If an Error Occurs on My DSS Disk?
- What Are the Restrictions on Attaching a Disk to an ECS?
- What Are the Precautions for Detaching a Disk from an ECS?
- Why My Disk Cannot Be Attached to a Server?
- Change History
-
User Guide (Paris and Amsterdam Regions)
- General Reference
Show all
Copied.
Concepts
- Account
An account is created upon successful registration. The account has full access permissions for all of its cloud services and resources. It can be used to reset user passwords and grant user permissions. The account is a payment entity, which should not be used directly to perform routine management. For security purposes, create Identity and Access Management (IAM) users and grant them permissions for routine management.
- User
An IAM user is created by an account in IAM to use cloud services. Each IAM user has its own identity credentials (password and access keys).
API authentication requires information such as the account name, username, and password.
- Region
Regions are divided based on geographical location and network latency. Public services, such as Elastic Cloud Server (ECS), Elastic Volume Service (EVS), Object Storage Service (OBS), Virtual Private Cloud (VPC), Elastic IP (EIP), and Image Management Service (IMS), are shared within the same region. Regions are classified into universal regions and dedicated regions. A universal region provides universal cloud services for common tenants. A dedicated region provides specific services for specific tenants.
For details, see Region and AZ.
- AZ
An AZ comprises of one or more physical data centers equipped with independent ventilation, fire, water, and electricity facilities. Computing, network, storage, and other resources in an AZ are logically divided into multiple clusters. AZs within a region are interconnected using high-speed optical fibers to allow you to build cross-AZ high-availability systems.
- Project
A project corresponds to a region. Default projects are defined to group and physically isolate resources (including computing, storage, and network resources) across regions. Users can be granted permissions in a default project to access all resources under their accounts in the region associated with the project. If you need more refined access control, create subprojects under a default project and create resources in subprojects. Then you can assign users the permissions required to access only the resources in the specific subprojects.
Figure 1 Project isolation model - Enterprise project
Enterprise projects group and manage resources across regions. Resources in different enterprise projects are logically isolated. An enterprise project can contain resources of multiple regions, and resources can be added to or removed from enterprise projects.
For details about enterprise projects and about how to obtain enterprise project IDs, see Enterprise Management User Guide.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot