Common Operations
When using BMSs, you may encounter various problems, such as remotely logging in to a BMS, expanding disk capacity, resetting the password, and reinstalling the OS. This section provides navigation to common operations to help you with these problems.
Create and Manage a BMS
General Operations
Perform the following steps to use a BMS:
- Create a BMS by following the instructions in Creating a Common BMS.
If the BMS quota is insufficient, you can apply to increase the quota by following the instructions in Adjusting Resource Quotas.
- Log in to the BMS. The login mode varies depending on the BMS OS.
- Stop the BMS by following the instructions in Stopping a BMS.
- Delete the BMS by following the instructions in Releasing a BMS.
Billing Management
You can renew your yearly/monthly BMS in the following ways:
Configuration Change
If your BMS password is lost or has expired, you can reset the password by following the instructions in Resetting the BMS Password.
If the BMS OS cannot meet your requirements, you can reinstall or change the OS by following the instructions in Reinstalling the OS.
Refined BMS Control and Management
You can control and manage your BMS in a refined way using the following methods:
BMS Security and Reliability Configuration
You can improve the security and reliability of your BMS using the following methods:
Create and Manage Private Images
By using private images, you can quickly deploy the service environment.
You can create a private BMS image in the following ways:
You can perform the following operations on private images:
- Share images with other tenants.
- Replicate images across regions.
- Export images to your OBS bucket.
Create and Manage Disks
General Operations
To use a disk as a data disk, perform the following steps:
- Create a disk in any of the following ways:
For the differences between the two methods, see Disk Types.
- Attach the disk to a BMS.
- Initialize the disk.
- Detach the disk from the BMS.
- Delete the disk.
Configuration Changes
If the capacity of an existing system disk or data disk cannot meet requirements, you can expand the disk capacity. For details, see Expanding the Capacity of an EVS Disk. After the disk capacity has been expanded, the additional disk space needs to be allocated to an existing partition or a new partition.
Create and Use a Key Pair
To use a key pair, perform the following steps:
- Create or import a key pair.
- When creating a BMS, bind the key pair to the BMS.
- Log in to the BMS using the key pair.
- Delete the key pair.
Create and Manage a BMS Network
Security Group
To use a security group, perform the following steps:
- Create a security group.
- Add a security group rule.
- When creating a BMS, add it to the security group.
- Delete the security group rule.
- Delete the security group.
EIP
To use an EIP, perform the following steps:
VPC
You can bind an extra IP address (virtual or floating IP address) to a NIC to enable flexible network functions. You can also enable the source/destination check function of the NIC to prevent packet spoofing and improve security.
High-Speed Network
Operations related to the high-speed network include:
Enhanced High-Speed Network
The enhanced high-speed network is available only in Chinese mainland regions. Operations related to the enhanced high-speed network include:
- Adding an Enhanced High-Speed NIC
- Deleting an Enhanced High-Speed NIC
- After adding or deleting an enhanced high-speed NIC, configure the NIC in the OS. For details, see Configuring an Enhanced High-Speed NIC (SUSE Linux Enterprise Server 12) to Configuring an Enhanced High-Speed NIC (Windows Server).
User-defined VLAN
Operations related to the user-defined VLAN include:
- Overview
- The method of configuring a user-defined VLAN varies for different OSs. For details, see sections Configuring a User-defined VLAN (SUSE Linux Enterprise Server 12) to Configuring a User-defined VLAN (Windows Server).
IB Network
Operations related to the IB network include:
Tags
You can use tags to identify various resources to improve the efficiency in classifying, querying, and managing resources. To use a tag, perform the following steps:
Monitor a BMS
To meet the basic monitoring and O&M requirements for servers, Server Monitoring monitors more than 40 metrics, such as CPU, memory, disk, and network. You need to install Agent on the BMS to implement the monitoring. For details, see Overview.
For all the supported BMS metrics, see Monitored Metrics (with Agent Installed).
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot