Halaman ini belum tersedia dalam bahasa lokal Anda. Kami berusaha keras untuk menambahkan lebih banyak versi bahasa. Terima kasih atas dukungan Anda.
- What's New
-
Service Overview
- DSS Infographics
- What Is DSS?
- Region and AZ
- Storage Pool Types and Performance
- Storage Pool Capacity Description
- DSS Disks
- DSS Three-Copy Redundancy
- Device Types and Usage Instructions
- Shared Disks and Usage Instructions
- Disk Encryption
- Disk Backup
- DSS and Other Services
- Billing
- Permissions
- Constraints
- Change History
-
Getting Started
- Operation Procedure
- Step 1: Apply for a Storage Pool
- Step 2: Create a Disk
- Step 3: Attach a Disk
-
Step 4: Initialize a Data Disk
- Introduction to Data Disk Initialization Scenarios and Partition Styles
- Initializing a Data Disk in Windows (Windows Server 2008)
- Initializing a Data Disk in Windows (Windows Server 2016)
- Initializing a Data Disk in Linux (fdisk)
- Initializing a Data Disk in Linux (parted)
- Initializing a Data Disk Greater Than 2 TB in Windows (Windows Server 2008)
- Initializing a Data Disk Greater Than 2 TB in Windows (Windows Server 2012)
- Initializing a Data Disk Greater Than 2 TB in Linux (parted)
- Change History
-
User Guide
- Permissions Management
- Storage Pool Management
-
Disk Management
- Detaching a Disk
- Attaching an Existing Disk
- Deleting a Disk
-
Expanding the Capacity of a Disk
- Introduction to Expansion Scenarios
- Expanding an In-use Disk
- Expanding an Available Disk
- Extending Partitions and File Systems on Windows
- Extending Partitions and File Systems on Linux (fdisk)
- Extending Partitions and File Systems on Linux (parted)
- Extending Partitions and File Systems of a SCSI Data Disk on Linux (fdisk)
- Extending Partitions and File Systems of a System Disk on Linux (fdisk)
- Managing Encrypted Disks
- Managing Shared Disks
- Managing Backups
- Change History
- API Reference
-
FAQs
- What Are the Risks of Not Expanding the Storage Pool Capacity?
- How Many Statuses Does a Storage Pool Have?
- How Many Statuses Does a Disk Have?
- Troubleshooting and Impacts on the DSS Usage
- Can I Attach a Disk to Multiple Servers?
- Will Data in the DSS Disk Be Lost When the DSS Disk Is Detached?
- What Should I Do If an Error Occurs on My DSS Disk?
- How Can I Test DSS Disk Performance?
- What Are the Restrictions on Attaching a Disk to an ECS?
- What Are the Precautions for Detaching a Disk from an ECS?
- Why My Disk Cannot Be Attached to a Server?
- Can the Disk Space Usage Be Reduced If I Delete Files on a Server?
- Videos
- Glossary
-
More Documents
-
User Guide (Paris and Amsterdam Regions)
- Introduction
-
Quick Start
- Operation Procedure
- Step 1: Apply for a Storage Pool
- Step 2: Create a Disk
- Step 3: Attach a Disk
-
Initialize a Data Disk
- Introduction to Data Disk Initialization Scenarios and Partition Styles
- Initializing a Data Disk in Windows (Windows Server 2008)
- Initializing a Data Disk in Windows (Windows Server 2016)
- Initializing a Data Disk in Linux (fdisk)
- Initializing a Data Disk in Linux (parted)
- Initializing a Data Disk Greater Than 2 TB in Windows (Windows Server 2008)
- Initializing a Data Disk Greater Than 2 TB in Windows (Windows Server 2012)
- Initializing a Data Disk Greater Than 2 TB in Linux (parted)
- Obtaining the Domain Name
- Obtaining the Region
-
Management
- Storage Pool Management
-
Disk Management
- Detaching a Disk
- Deleting a Disk
-
Expanding the Capacity of a Disk
- Introduction to Expansion Scenarios
- Expanding an In-use Disk
- Expanding an Available Disk
- Performing Post-Expansion Operations for a Windows Disk
- Performing Post-Expansion Operations for a Disk in Linux (fdisk)
- Performing Post-Expansion Operations for a Disk in Linux (parted)
- Performing Post-Expansion Operations for a SCSI Data Disk in Linux (fdisk)
- Performing Post-Expansion Operations for a System Disk in Linux (fdisk)
- Managing an Encrypted Disk
- Managing a Shared Disk
- Managing a Backup
-
FAQs
- What Are the Risks of Not Expanding the Storage Pool Capacity?
- How Many Statuses Does a Storage Pool Have?
- How Many Statuses Does a Disk Have?
- Troubleshooting and Impacts on the DSS Usage
- Can I Attach a Disk to Multiple Servers?
- Will Data in the DSS Disk Be Lost When the DSS Disk Is Detached?
- What Should I Do If an Error Occurs on My DSS Disk?
- What Are the Restrictions on Attaching a Disk to an ECS?
- What Are the Precautions for Detaching a Disk from an ECS?
- Why My Disk Cannot Be Attached to a Server?
- Change History
-
User Guide (Paris and Amsterdam Regions)
- General Reference
Copied.
Managing Encrypted Disks
Relationships Between Encrypted Disks and Backups
The encryption function can be used to encrypt system disks, data disks, and backups. The details are as follows:
- System disk encryption depends on the image of the server OS. If the server is created from an encrypted image, the system disk will be an encrypted disk. For details, see Encrypting an Image in the Image Management Service User Guide.
- The encryption attribute of an existing disk cannot be changed. You can create new disks and determine whether to encrypt the disks or not.
- When a disk is created from a backup, the encryption attribute of the new disk will be consistent with that of the backup's source disk.
- When a backup is created for a disk, the encryption attribute of the backup is the same as that of the disk.
For how to create encrypted disks, see Create a Disk.
Creating Encrypted Disks
Before you use the disk encryption function, KMS access rights need to be granted to EVS. If you have the Security Administrator permission, grant KMS access rights directly. If you do not have this permission, contact a user with the security administrator permissions to grant KMS access rights to EVS, then repeat the preceding operations.
For how to create encrypted disks, see Create a Disk.
Detaching Encrypted Disks
Before you detach a disk encrypted by a custom key, check whether the custom key is disabled or scheduled for deletion. If the custom key is unavailable, the disk can still be used, but normal read/write operations are not guaranteed permanently. If the disk is detached and then re-attached, re-attaching this disk will fail. In this case, do not detach the disk and restore the custom key status first.
The restoration method varies depending on the current CMK status. For details, see Disk Encryption.
If the custom key is available, the disk can be detached and re-attached, and data on the disk will not be lost.
For how to detach an encrypted disk, see Detaching a Data Disk.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot