How Do I Handle the Failure in Binding a Key Pair?
Symptom
Failed to bind the key pair to the ECS.

- The Failed Key Pair Task dialog box only records and displays failed key pair operations on ECSs, which do not affect the ECS status and subsequent operations. You can locate the target failure record and click Delete in the Operation column, or can click Delete All to delete all failure records.
- Click Learn more to view related documents.
Typical Errors in KPS Key Pair Tasks
Category |
Error Information |
Error Cause |
Solution |
---|---|---|---|
SSH connection failure |
Invalid server login credential. Message: ****** |
Failed to log in to the ECS in SSH mode using the authentication information provided by the user. Possible causes:
|
Use the password or private key to log in to the ECS. Check whether the password is correct. |
SSH connection failure. Check your port. |
Failed to log in to the ECS in SSH mode using the authentication information provided by the user. Possible causes:
|
Log in to the ECS using SSH. Check the listening status of the service port. |
|
Timeout: socket is not established. Check your security group rules. |
Failed to log in to the ECS in SSH mode using the authentication information provided by the user. Possible causes:
|
Log in to the ECS using SSH. Check the security group and firewall rules. |
|
ECS status check failure |
ECS is being executed. |
Failed to check the ECS status. Possible cause: The ECS is being created. |
Wait until the ECS is created. |
Image information of the server not found. |
Failed to check the ECS status. Possible cause: An unregistered image is used. |
Use a registered image. |
|
ECS OS not supported. |
Failed to check the ECS status. Possible cause: An unsupported OS is used. |
Use an OS supported by KPS. |
|
Server status error. |
Failed to check the ECS status. Possible causes:
|
Go to the ECS console and change the ECS status. |
|
System volume not found. |
Failed to check the ECS status. Possible cause: Failed to query the disks mounted to the ECS. |
Go to the ECS console and mount a disk to the ECS. |
|
Key pair binding failure |
Too many key pairs to be bound in batches. |
Failed to bind key pairs in batches. Possible cause: The number of key pairs to be bound exceeds the upper limit. |
Delete some key pair to be bound. |
Key pairs to be bound in batches are inconsistent. |
Failed to bind key pairs in batches. Possible cause: Different key pairs are used. |
Use only the same key pairs for batch binding. |
|
Unavailable ECS flavor. |
Failed to bind the key pair. Possible cause: Failed to obtain the flavor information. |
Check the ECS flavor. |
|
Key pair API parameter check |
The imported private key does not match the public key. |
Failed to check the key pairs. Possible causes:
|
Check the format of the public and private keys and check whether they are a pair. |
Invalid parameter. |
Failed to check the key pair API parameter. Possible causes:
|
Check the invoking parameters. |
|
Invalid key pair type. |
Failed to check the key pair API parameter. Possible cause: The key pair type is not ssh or x509 as required. |
Check the invoking parameters. |
Handling Procedure
You can troubleshoot the fault by performing the following steps:
- Check the ECS status.
- Use the password to log in to the ECS to check whether the password is correct.
- If it is correct, go to Step 4.
- If it is incorrect, use the correct password to bind the key pair again.
- Check whether the permission path and owner group of the /root/.ssh/authorized_keys file on the ECS have been modified.
- If yes, restore the permission to the following:
- The owner group of each level has the root:root permission.
- The permission for the .ssh file is 700.
- The permission for authorized_keys is 600.
- If no, go to Step 4.
- If yes, restore the permission to the following:
- Check whether the /root/.ssh/authorized_keys file of the ECS has been modified.
- If yes, restore the original content of the /root/.ssh/authorized_keys file based on the site requirements.
- If no, go to Step 5.
- Check whether the inbound direction of port 22 of the ECS security group is open to 100.125.0.0/16. That is, 100.125.0.0/16 can remotely connect to Linux ECSs through SSH.
- If yes, go to Step 6.
- If no, add the following security group rule and bind the key pair again. For details about how to add a security group, see Adding a Security Group Rule.
Direction
Protocol/Application
Port
Source
Inbound
SSH (22)
22
100.125.0.0/16
- Check whether the ECS can be powered on, shut down, and logged in to.
- If yes, bind the key pair again.
- If no, go to Step 7.
- Check whether the network is faulty.
- If yes, contact technical support to check and locate the fault.
- If no, bind the key pair again.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot