


The content of this article is about how to use a snapshot to create a new cloud disk on the ECS console. It has certain reference value. Friends in need can refer to it. I hope it will be helpful to you. helped.
Create a cloud disk using a snapshot
You can use the snapshot of a cloud disk (whether it is a system disk or a data disk) to create a cloud disk individually through the console or API interface. The created cloud disk can be mounted to any ECS instance in the same region and the same availability zone. This article describes how to use a snapshot to create a new cloud disk on the ECS console.
Application Scenario
You may need to obtain some data in the snapshot, but do not want to roll back the cloud disk to achieve it . At this point, you can use the snapshot to create a new cloud disk and read data from the cloud disk. For example, if the system disk fails and the system cannot be started, you can use the existing snapshot of the system disk to create a new cloud disk and then mount it to a healthy instance to read the data in the system disk snapshot.
Performance Description
The newly created high-efficiency cloud disk and SSD cloud disk can achieve the highest performance corresponding to their capacity once they are successfully created. No preheating process is required. However, because snapshots are stored in object storage (OSS), when using snapshots to create cloud disks, ECS needs to retrieve data from OSS and write it to the cloud disk. This process takes a while and will cause performance degradation during the first access. It is recommended that you read all data blocks on the cloud disk before officially using this type of cloud disk to avoid initial performance degradation. For detailed information about OSS, see What is Object Storage OSS.
Notes
Before creating a cloud disk, you need to know the following information:
The cloud created in this way Disks can only be billed in a pay-as-you-go manner, and can only be used as data disks.
Note
You can also use a snapshot of the system disk or data disk to create a cloud disk when creating an ECS instance. Cloud disks created in this way are billed in the same way as instances.
You can create a new empty cloud disk. For specific operations, see Creating a Cloud Disk.
The limit of pay-as-you-go cloud disks created as data disks for each account in all regions = the number of pay-as-you-go instances for this account in all regions * 5. See Usage Restrictions for details.
Currently, cloud server ECS does not support merging multiple cloud disks. After a cloud disk is created, each cloud disk is an independent entity, and multiple cloud disk spaces cannot be merged together through formatting. It is recommended that you plan the number and capacity of cloud disks in advance.
It is not recommended to create logical volumes such as LVM (Logical Volume Manager) for multiple cloud disks that have been created. Because snapshots can only be created for each independent cloud disk, after using LVM, data differences will occur when rolling back the cloud disk using snapshots.
After creation, you can convert the billing method of the cloud disk:
If the cloud disk is mounted on a prepaid instance, upgrade the configuration of the prepaid instance to convert the pay-as-you-go cloud disk to Prepaid cloud storage.
If the cloud disk is mounted on a pay-as-you-go instance, convert the pay-as-you-go cloud disk to a prepaid cloud disk through Pay-As-You-Go to Prepaid.
For cloud disks created in this way, as long as the billing method is not converted, you can uninstall the cloud disk and release the cloud disk at any time.
Prerequisites
Before using a snapshot to create a cloud disk, you must confirm the following information:
You have configured the operating system Create a snapshot for the cloud disk or data disk and confirm the snapshot ID. For specific operations, see Creating a Snapshot.
Your account balance shall not be less than 100 yuan or equivalent vouchers or coupons. Because cloud disks created separately adopt a pay-as-you-go method.
The region and availability zone where the instance to which the cloud disk needs to be mounted is located. When mounting a cloud disk, the instance and the cloud disk must be in the same region and availability zone.
Operation steps
Log in to the ECS management console.
In the left navigation bar, click Storage > Cloud Disk.
In the upper right corner of the Disk List page, click Create Cloud Disk to enter the Create page.
Select a region and availability zone.
Note
When mounting a cloud disk, the instance and the cloud disk must be in the same region and availability zone.
Set the cloud disk configuration:
Select the cloud disk type: The optional cloud disk type is not affected by the source cloud disk type corresponding to the snapshot.
Click Create disk with snapshot and select a snapshot.
Description
If the selected snapshot is an encrypted disk snapshot, the encryption item will be automatically selected. Otherwise, you cannot check Encryption. For disk encryption, see ECS Disk Encryption.
Set the cloud disk capacity: the optional range is 20 GiB~32768 GiB. If the selected snapshot is less than 20 GiB, the system uses the minimum capacity of 20 GiB by default, and you can manually adjust the capacity according to your needs. If the selected snapshot is larger than 20 GiB, the system will automatically set the cloud disk size based on the snapshot size, but you must manually set the capacity after replacing the snapshot.
Set the purchase amount.
Confirm the current configuration and configuration fee.
Click Buy Now and follow the page guidance to complete creation.
After the creation is successful, return to the disk list page and refresh the list. You can see the newly created cloud disk and the disk status is displayed as To be mounted.
Follow-up operations
Mount cloud disk
Related API
Create cloud disk: CreateDisk
The above is the detailed content of How to use a snapshot to create a new cloud disk on the ECS console. For more information, please follow other related articles on the PHP Chinese website!

This article discusses how to improve Hadoop data processing efficiency on Debian systems. Optimization strategies cover hardware upgrades, operating system parameter adjustments, Hadoop configuration modifications, and the use of efficient algorithms and tools. 1. Hardware resource strengthening ensures that all nodes have consistent hardware configurations, especially paying attention to CPU, memory and network equipment performance. Choosing high-performance hardware components is essential to improve overall processing speed. 2. Operating system tunes file descriptors and network connections: Modify the /etc/security/limits.conf file to increase the upper limit of file descriptors and network connections allowed to be opened at the same time by the system. JVM parameter adjustment: Adjust in hadoop-env.sh file

This guide will guide you to learn how to use Syslog in Debian systems. Syslog is a key service in Linux systems for logging system and application log messages. It helps administrators monitor and analyze system activity to quickly identify and resolve problems. 1. Basic knowledge of Syslog The core functions of Syslog include: centrally collecting and managing log messages; supporting multiple log output formats and target locations (such as files or networks); providing real-time log viewing and filtering functions. 2. Install and configure Syslog (using Rsyslog) The Debian system uses Rsyslog by default. You can install it with the following command: sudoaptupdatesud

When choosing a Hadoop version suitable for Debian system, the following key factors need to be considered: 1. Stability and long-term support: For users who pursue stability and security, it is recommended to choose a Debian stable version, such as Debian11 (Bullseye). This version has been fully tested and has a support cycle of up to five years, which can ensure the stable operation of the system. 2. Package update speed: If you need to use the latest Hadoop features and features, you can consider Debian's unstable version (Sid). However, it should be noted that unstable versions may have compatibility issues and stability risks. 3. Community support and resources: Debian has huge community support, which can provide rich documentation and

This article describes how to use TigerVNC to share files on Debian systems. You need to install the TigerVNC server first and then configure it. 1. Install the TigerVNC server and open the terminal. Update the software package list: sudoaptupdate to install TigerVNC server: sudoaptinstalltigervnc-standalone-servertigervnc-common 2. Configure TigerVNC server to set VNC server password: vncpasswd Start VNC server: vncserver:1-localhostno

Configuring a Debian mail server's firewall is an important step in ensuring server security. The following are several commonly used firewall configuration methods, including the use of iptables and firewalld. Use iptables to configure firewall to install iptables (if not already installed): sudoapt-getupdatesudoapt-getinstalliptablesView current iptables rules: sudoiptables-L configuration

The steps to install an SSL certificate on the Debian mail server are as follows: 1. Install the OpenSSL toolkit First, make sure that the OpenSSL toolkit is already installed on your system. If not installed, you can use the following command to install: sudoapt-getupdatesudoapt-getinstallopenssl2. Generate private key and certificate request Next, use OpenSSL to generate a 2048-bit RSA private key and a certificate request (CSR): openss

Configuring a virtual host for mail servers on a Debian system usually involves installing and configuring mail server software (such as Postfix, Exim, etc.) rather than Apache HTTPServer, because Apache is mainly used for web server functions. The following are the basic steps for configuring a mail server virtual host: Install Postfix Mail Server Update System Package: sudoaptupdatesudoaptupgrade Install Postfix: sudoapt

To configure the DNS settings for the Debian mail server, you can follow these steps: Open the network configuration file: Use a text editor (such as vi or nano) to open the network configuration file /etc/network/interfaces. sudonano/etc/network/interfaces Find network interface configuration: Find the network interface to be modified in the configuration file. Normally, the configuration of the Ethernet interface is located in the ifeth0 block.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 Chinese version
Chinese version, very easy to use

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

Dreamweaver Mac version
Visual web development tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.