


How to import local physical image files into ECS is suitable for business deployment scenarios on the cloud
The content of this article is about how to import local physical image files into ECS, which is suitable for deploying business on the cloud. It has certain reference value. Friends in need can refer to it. I hope it will be helpful to you. helped.
Import custom image
Importing local physical image files into ECS is suitable for scenarios where business is deployed on the cloud. The imported custom image will appear in your custom image list in the corresponding region. You can use this image to create ECS instances and replace system disks.
Description
Importing a custom image is a relatively time-consuming task. The completion time depends on the size of the image file and the current number of concurrent import tasks, so you need to wait patiently.
When importing a custom image, the system will automatically generate a snapshot, and you can see the snapshot information in the snapshot list. Before the import image task is completed, the status of the snapshot will be displayed as failed. After the task is completed, the status is automatically updated to Available. The capacity of this snapshot is the size of the imported custom image file, and has nothing to do with the system disk size set when importing the custom image. Currently, snapshot capacity has been charged. For more details, please refer to the Snapshot Commercialization FAQ.
Prerequisites
Before importing the image, you should have completed the following work:
See the required reading for importing the image, Configure Customized Linux custom images and convert image formats to understand image limitations and requirements.
Activate OSS service.
(Optional) If you are using a RAM sub-account, you should contact the main account in advance to authorize the AliyunECSImageImportDefaultRole role policy to obtain operation permission.
Operation steps
The steps to import a custom image on the Alibaba Cloud Management Console are as follows:
Using OSS Use a third-party tool client, API or OSS SDK to upload the customized image. For information on how to upload files larger than 5 GiB, please refer to OSS resume upload.
Log in to the ECS management console.
In the left navigation bar, select Snapshots and Mirroring > Mirroring.
On the image list page, click Import Image.
In the Import Image dialog box, click Confirm the address in step 3 of the prompt message.
In the cloud resource access authorization window, check AliyunECSImageImportDefaultRole and AliyunECSExportDefaultRole, and click Agree to authorize the ECS service to access your OSS resources.
On the image list page, click Import Image again.
In the Import Image dialog box, complete the following settings:
Image Region: The region where the OSS Bucket that uploaded the image file is located.
OSS Object address: The image file Object address obtained from the OSS console. For more details, please refer to OSS Obtaining File Access Address.
Image name: Specify the name displayed after the custom image image file is imported. The length is 2−128 characters, starting with uppercase and lowercase letters or Chinese characters, and can contain numbers, periods (.), underscores (_), half-width colons (:), and hyphens (-).
Operating system: Select Windows or Linux according to the type of your mirroring operation. If you want to import a non-standard platform custom image, you should select Linux.
System disk size: The system disk size range is 40 GiB−500 GiB.
System architecture: Select x86_64 for 64-bit operating system, and i386 for 32-bit operating system.
System platform: The options provided in the drop-down list are determined by the operating system options. Select the system platform applicable to your image.
Windows: Supports Windows Server 2003, Windows Server 2008 and Windows Server 2012.
Linux: Supports CentOS, SUSE, Ubuntu, Debian, FreeBSD, CoreOS, Aliyun, Customized Linux and Others Linux (please submit a work order to confirm whether it is supported).
If the operating system of your image is customized and developed based on the Linux kernel, please submit a work order to contact us.
Image format: Only RAW, qcow2 and VHD formats are supported. It is recommended to use qcow2 or VHD format with smaller transmission content.
Image description: Fill in the image description information to facilitate subsequent management.
Add a data disk image: Import a custom image containing a data disk at the same time. The supported data disk capacity range is 5 GiB−2000 GiB.
After confirming that the information is correct, click OK to create a task to import the custom image.
(Optional) You can check the import progress in the image list of the region you imported. Before the task is completed, you can find the imported custom image through task management and cancel the import image task.
You can also use ECS API ImportImage to import a custom image.
Next step
Create an instance using a custom image
The above is the detailed content of How to import local physical image files into ECS is suitable for business deployment scenarios on the cloud. For more information, please follow other related articles on the PHP Chinese website!

The five core components of the Linux operating system are: 1. Kernel, 2. System libraries, 3. System tools, 4. System services, 5. File system. These components work together to ensure the stable and efficient operation of the system, and together form a powerful and flexible operating system.

The five core elements of Linux are: 1. Kernel, 2. Command line interface, 3. File system, 4. Package management, 5. Community and open source. Together, these elements define the nature and functionality of Linux.

Linux user management and security can be achieved through the following steps: 1. Create users and groups, using commands such as sudouseradd-m-gdevelopers-s/bin/bashjohn. 2. Bulkly create users and set password policies, using the for loop and chpasswd commands. 3. Check and fix common errors, home directory and shell settings. 4. Implement best practices such as strong cryptographic policies, regular audits and the principle of minimum authority. 5. Optimize performance, use sudo and adjust PAM module configuration. Through these methods, users can be effectively managed and system security can be improved.

The core operations of Linux file system and process management include file system management and process control. 1) File system operations include creating, deleting, copying and moving files or directories, using commands such as mkdir, rmdir, cp and mv. 2) Process management involves starting, monitoring and killing processes, using commands such as ./my_script.sh&, top and kill.

Shell scripts are powerful tools for automated execution of commands in Linux systems. 1) The shell script executes commands line by line through the interpreter to process variable substitution and conditional judgment. 2) The basic usage includes backup operations, such as using the tar command to back up the directory. 3) Advanced usage involves the use of functions and case statements to manage services. 4) Debugging skills include using set-x to enable debugging mode and set-e to exit when the command fails. 5) Performance optimization is recommended to avoid subshells, use arrays and optimization loops.

Linux is a Unix-based multi-user, multi-tasking operating system that emphasizes simplicity, modularity and openness. Its core functions include: file system: organized in a tree structure, supports multiple file systems such as ext4, XFS, Btrfs, and use df-T to view file system types. Process management: View the process through the ps command, manage the process using PID, involving priority settings and signal processing. Network configuration: Flexible setting of IP addresses and managing network services, and use sudoipaddradd to configure IP. These features are applied in real-life operations through basic commands and advanced script automation, improving efficiency and reducing errors.

The methods to enter Linux maintenance mode include: 1. Edit the GRUB configuration file, add "single" or "1" parameters and update the GRUB configuration; 2. Edit the startup parameters in the GRUB menu, add "single" or "1". Exit maintenance mode only requires restarting the system. With these steps, you can quickly enter maintenance mode when needed and exit safely, ensuring system stability and security.

The core components of Linux include kernel, shell, file system, process management and memory management. 1) Kernel management system resources, 2) shell provides user interaction interface, 3) file system supports multiple formats, 4) Process management is implemented through system calls such as fork, and 5) memory management uses virtual memory technology.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

SublimeText3 Chinese version
Chinese version, very easy to use
