Documentation
Prev Next
 

Acronis Cyber Infrastructure 3.5 Self-Service Guide

Jul 21, 2020
  • 1. About This Guide
  • 2. Logging in to the Self-Service Panel
  • 3. Managing Users and Projects
  • 4. Managing Compute Resources
    • 4.1. Managing Virtual Machines
    • 4.2. Managing Kubernetes Clusters
    • 4.3. Managing Images
    • 4.4. Managing Volumes
    • 4.5. Managing Private Virtual Networks
    • 4.6. Managing Virtual Routers
    • 4.7. Managing Floating IP Addresses
    • 4.8. Managing Load Balancers
    • 4.9. Managing SSH Keys
  • Acronis Cyber Infrastructure 3.5 Self-Service GuidePDF, 1107 KB
Prev Next

4. Managing Compute Resources¶

In this chapter:¶

  • 4.1. Managing Virtual Machines
    • 4.1.1. Supported Guest Operating Systems
    • 4.1.2. Creating Virtual Machines
    • 4.1.3. Virtual Machine Actions Overview
    • 4.1.4. Enabling Logging inside Virtual Machines
    • 4.1.5. Reconfiguring and Monitoring Virtual Machines
    • 4.1.6. Managing Guest Tools
      • 4.1.6.1. Installing Guest Tools
      • 4.1.6.2. Uninstalling Guest Tools
  • 4.2. Managing Kubernetes Clusters
    • 4.2.1. Using Persistent Volumes for Kubernetes Pods
      • 4.2.1.1. Creating Storage Classes
      • 4.2.1.2. Dynamically Provisioning Persistent Volumes
      • 4.2.1.3. Statically Provisioning Persistent Volumes
    • 4.2.2. Creating External Load Balancers in Kubernetes
  • 4.3. Managing Images
    • 4.3.1. Uploading and Removing Images
    • 4.3.2. Creating Volumes from Images
    • 4.3.3. Mounting ISO Images to Virtual Machines
  • 4.4. Managing Volumes
    • 4.4.1. Creating, Editing, and Removing Volumes
    • 4.4.2. Cloning Volumes
    • 4.4.3. Attaching and Detaching Volumes
    • 4.4.4. Creating Images from Volumes
    • 4.4.5. Managing Volume Snapshots
  • 4.5. Managing Private Virtual Networks
  • 4.6. Managing Virtual Routers
    • 4.6.1. Managing Router Interfaces
    • 4.6.2. Managing Static Routes
  • 4.7. Managing Floating IP Addresses
  • 4.8. Managing Load Balancers
    • 4.8.1. Managing Balancing Pools
  • 4.9. Managing SSH Keys
Jul 21, 2020
Print
Prev Next