Help Center/ GaussDB/ User Guide/ Instance Management/ Deleting a Pay-per-Use GaussDB Instance
Updated on 2024-12-25 GMT+08:00

Deleting a Pay-per-Use GaussDB Instance

Scenarios

  • You need to delete unnecessary DB instances.
  • You need to delete the DB instance that fails to be created.
  • Deleted DB instances cannot be recovered. Exercise caution when performing this operation. To retain data, back up the data before deleting a DB instance.
  • DB instances cannot be deleted when operations are being performed on them.
  • You can restore a DB instance that was deleted up to 7 days ago from the recycle bin. For details, see Modifying the Recycle Bin Policy for a GaussDB Instance.
  • If you delete a stopped instance, it cannot be rebuilt from the recycle bin. Exercise caution when performing this operation. If you might want to rebuild it later, start the instance first and make sure it is running properly before deleting it.
  • DB instances to be rebuilt in the recycle bin will not incur charges.
  • When pay-per-use instances are deleted, manual backups are retained.
  • Instances cannot be deleted while an operation is being performed on them. They can only be deleted once the operations are complete.

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select a region and project.
  3. Click in the upper left corner of the page and choose Databases > GaussDB.
  4. On the Instances page, locate the instance you want to delete and click More > Delete in the Operation column.
  5. In the displayed dialog box, click Yes. Refresh the Instances page later to check that the deletion is successful.

    Figure 1 Deleting an instance

  6. If you have enabled the operation protection function, click Start Verification in the Delete DB Instance dialog box. On the displayed page, click Send Code, enter the obtained verification code, and click Verify to close the page.

    Two-factor authentication improves the security of your account. For details about how to view and enable high-risk operation protection, see Identity and Access Management User Guide.