search
HomeOperation and MaintenanceLinux Operation and MaintenanceHow to expand the system disk capacity without changing the operating system image

The content of this article is about how to expand the system disk capacity without changing the operating system image. It has certain reference value. Friends in need can refer to it. I hope it will be helpful to you.

Expanding the system disk

As your business develops, if you need to expand the system disk capacity, you can do so through the Replace System Disk function. This article only describes how to expand the system disk capacity without changing the operating system image.

Note

While expanding the system disk, you can also change the operating system. For specific operations, see Replacing the Operating System.

Notes

Replacing the system disk is a high-risk operation, so please be sure to read the following precautions carefully before replacing the system disk .

Risks

Replacing the system disk has the following risks:

Replacing the system disk requires stopping the instance, thus interrupting your business.

After the replacement is completed, you need to redeploy the business operating environment in the new system disk, which may cause long-term interruption to your business.

Replacing the system disk means reassigning a system disk to your instance. The cloud disk ID will change, so snapshots created based on the old system disk cannot be used to roll back the new system disk.

Note

After replacing the system disk, the snapshots you created manually will not be affected, and you can still use these snapshots to create custom images. If you set an automatic snapshot policy for the old system disk and set the automatic snapshot to be released with the cloud disk, the automatic snapshot policy will no longer apply to the new system disk, and the automatic snapshots of the old system disk will be automatically deleted.

Restrictions and instructions

When replacing the system disk, you need to pay attention to the following information:

After replacing the system disk, your instance will be assigned a For the new system disk, the system disk ID will be updated and the original system disk will be released.

You cannot change the cloud disk type of the system disk.

The system disk after expansion has a minimum capacity of the capacity before expansion and a maximum capacity of 500 GiB. The system disk capacity cannot be reduced.

Windows 2003 does not support system disk expansion.

If your annual or monthly subscription instance has been renewed and downgraded, you cannot modify the system disk capacity before entering the next billing cycle.

The IP address and MAC address of the instance remain unchanged.

Before expanding the system disk, it is recommended that you create a snapshot for the system disk. When creating a snapshot, pay attention to the following restrictions:

Avoid creating snapshots during your business peak period to avoid affecting your business. A 40 GiB snapshot takes about 40 minutes to create the first time. So please allow enough time. Moreover, creating snapshots may reduce block storage I/O performance (generally within 10%), causing temporary slowdowns.

When creating a snapshot for the system disk, please ensure that the system disk has enough space. It is recommended to reserve 1 GiB of space. Otherwise, the system may not start normally after the system disk is expanded and replaced.

To ensure that there are enough snapshot quotas to complete the automatic snapshot policy of the new system disk, you can delete unnecessary old system disk snapshots. For detailed operations, see Deleting Snapshots and Automatic Snapshot Policies.

Operation steps

#If you want to expand the system disk while retaining the contents of the original system disk, you must follow the steps below to replace the system disk:

Log in to the ECS management console.

In the left navigation bar, click Instances.

Select a region.

Find the instance that needs to expand the system disk, click the instance ID, and enter the instance details page.

Follow the following steps to create a snapshot of the system disk:

In the left navigation bar, click this instance disk.

Find the system disk and click Create Snapshot in the Operation column.

Note

For detailed operational restrictions or precautions on creating a snapshot, see Creating a Snapshot.

Follow the following steps to create a custom image using a system disk snapshot:

In the left navigation bar, click this instance snapshot to view the creation progress and status of the snapshot. When the progress is 100% and the status is Successful, in the Action column, click Create Custom Image.

Note

For detailed operational restrictions or precautions on creating a custom image, see Creating a Custom Image Using Snapshots.

When replacing the system disk, the image obtained through this method will appear in the drop-down list of Custom Image.

Return to the instance list page, in the left navigation bar, select Snapshots and Mirrors > Mirror to view the creation progress and status of the custom mirror.

When the custom image creation progress is 100% and the status is displayed as Available, click Instance in the left navigation bar.

Find the instance that requires operation, and in the Operation column, select More > Stop.

illustrate

If it is a pay-as-you-go VPC type instance and the no-charge-for-pay-as-you-go instance shutdown feature has been turned on, in the Reminder pop-up box, click OK. In the Stop Instance dialog box, select Keep the instance after stopping and continue to charge. If you use the no-charge mode, you may not be able to successfully start the instance after replacing the system disk.

How to expand the system disk capacity without changing the operating system image

When the status of the instance shows Stopped, in the Action column, select More > Replace the system disk.

In the pop-up dialog box, after carefully reading the precautions for replacing the system disk, click OK to replace the system disk.

On the Change System Disk page,

Image type: Select the custom image you just created from Custom Image.

System disk: Modify the system disk capacity according to business needs, and the maximum capacity can be expanded to 500 GiB. The minimum capacity that can be set during expansion is related to the current capacity of the system disk and the mirror, as shown in the following table.

How to expand the system disk capacity without changing the operating system image

Description

The cloud disk type of the system disk cannot be modified.

Security settings:

If it is a Windows system, you can only use password authentication.

If your instance is an I/O optimized instance and is a Linux system, you can choose to use password authentication or SSH key pair authentication. You can set a login password or bind an SSH key pair.

Confirm Configuration fee: includes the price of the image and the price of the system disk. Please see the cloud product pricing page for details.

After confirming that everything is correct, click OK to change.

You can monitor the system status through the console. It will take about 10 minutes to complete the operating system replacement. Once completed, the instance starts automatically.

Follow-up operations

After replacing the system disk, you may need to do the following operations:

If the Linux system, and, The instance has mounted the data disk and set up automatic mounting at startup: After replacing the system disk, the file system mounting information in the original system disk is lost. You must write the new partition information in the /etc/fstab file of the new system disk, and Mount the file system, but there is no need to format and partition the data disk. The operation steps are as follows. For specific operation commands, see Formatting and Mounting the Data Disk in Linux:

(Recommended) Back up /etc/fstab.

Write new partition information to /etc/fstab.

View the new partition information in /etc/fstab.

Mount the file system.

Check the current cloud disk space and usage: Run the command df -h.

After the mounting operation is completed, you can start using the new file system without restarting the instance.

Set an automatic snapshot policy for the disk. The automatic snapshot policy is bound to the cloud disk ID. After replacing the system disk with a new one, the automatic snapshot policy applied to the old cloud disk will automatically become invalid. You need to set an automatic snapshot policy for the new system disk.

The above is the detailed content of How to expand the system disk capacity without changing the operating system image. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
What is Maintenance Mode in Linux? ExplainedWhat is Maintenance Mode in Linux? ExplainedApr 22, 2025 am 12:06 AM

MaintenanceModeinLinuxisaspecialbootenvironmentforcriticalsystemmaintenancetasks.Itallowsadministratorstoperformtaskslikeresettingpasswords,repairingfilesystems,andrecoveringfrombootfailuresinaminimalenvironment.ToenterMaintenanceMode,interrupttheboo

Linux: A Deep Dive into Its Fundamental PartsLinux: A Deep Dive into Its Fundamental PartsApr 21, 2025 am 12:03 AM

The core components of Linux include kernel, file system, shell, user and kernel space, device drivers, and performance optimization and best practices. 1) The kernel is the core of the system, managing hardware, memory and processes. 2) The file system organizes data and supports multiple types such as ext4, Btrfs and XFS. 3) Shell is the command center for users to interact with the system and supports scripting. 4) Separate user space from kernel space to ensure system stability. 5) The device driver connects the hardware to the operating system. 6) Performance optimization includes tuning system configuration and following best practices.

Linux Architecture: Unveiling the 5 Basic ComponentsLinux Architecture: Unveiling the 5 Basic ComponentsApr 20, 2025 am 12:04 AM

The five basic components of the Linux system are: 1. Kernel, 2. System library, 3. System utilities, 4. Graphical user interface, 5. Applications. The kernel manages hardware resources, the system library provides precompiled functions, system utilities are used for system management, the GUI provides visual interaction, and applications use these components to implement functions.

Linux Operations: Utilizing the Maintenance ModeLinux Operations: Utilizing the Maintenance ModeApr 19, 2025 am 12:08 AM

Linux maintenance mode can be entered through the GRUB menu. The specific steps are: 1) Select the kernel in the GRUB menu and press 'e' to edit, 2) Add 'single' or '1' at the end of the 'linux' line, 3) Press Ctrl X to start. Maintenance mode provides a secure environment for tasks such as system repair, password reset and system upgrade.

Linux: How to Enter Recovery Mode (and Maintenance)Linux: How to Enter Recovery Mode (and Maintenance)Apr 18, 2025 am 12:05 AM

The steps to enter Linux recovery mode are: 1. Restart the system and press the specific key to enter the GRUB menu; 2. Select the option with (recoverymode); 3. Select the operation in the recovery mode menu, such as fsck or root. Recovery mode allows you to start the system in single-user mode, perform file system checks and repairs, edit configuration files, and other operations to help solve system problems.

Linux's Essential Components: Explained for BeginnersLinux's Essential Components: Explained for BeginnersApr 17, 2025 am 12:08 AM

The core components of Linux include the kernel, file system, shell and common tools. 1. The kernel manages hardware resources and provides basic services. 2. The file system organizes and stores data. 3. Shell is the interface for users to interact with the system. 4. Common tools help complete daily tasks.

Linux: A Look at Its Fundamental StructureLinux: A Look at Its Fundamental StructureApr 16, 2025 am 12:01 AM

The basic structure of Linux includes the kernel, file system, and shell. 1) Kernel management hardware resources and use uname-r to view the version. 2) The EXT4 file system supports large files and logs and is created using mkfs.ext4. 3) Shell provides command line interaction such as Bash, and lists files using ls-l.

Linux Operations: System Administration and MaintenanceLinux Operations: System Administration and MaintenanceApr 15, 2025 am 12:10 AM

The key steps in Linux system management and maintenance include: 1) Master the basic knowledge, such as file system structure and user management; 2) Carry out system monitoring and resource management, use top, htop and other tools; 3) Use system logs to troubleshoot, use journalctl and other tools; 4) Write automated scripts and task scheduling, use cron tools; 5) implement security management and protection, configure firewalls through iptables; 6) Carry out performance optimization and best practices, adjust kernel parameters and develop good habits.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

Dreamweaver Mac version

Dreamweaver Mac version

Visual web development tools

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software