Documentation
Prev Next
 

Acronis Cyber Infrastructure 3.0 Self-Service Guide

Nov 20, 2019
  • 1. About This Guide
  • 2. Logging in to the Self-Service Panel
  • 3. Managing Users and Projects
    • 3.1. Creating Users
    • 3.2. Assigning Users to Projects
    • 3.3. Viewing Project Quotas
  • 4. Managing Compute Resources
    • 4.1. Managing Virtual Machines
    • 4.2. Managing Images
    • 4.3. Managing Volumes
    • 4.4. Managing Private Virtual Networks
    • 4.5. Managing Virtual Routers
    • 4.6. Managing Floating IP Addresses
    • 4.7. Managing SSH Keys
  • Acronis Cyber Infrastructure 3.0 Self-Service GuidePDF, 719 KB
Prev Next

4. Managing Compute Resources¶

In this chapter:¶

  • 4.1. Managing Virtual Machines
    • 4.1.1. Supported Guest Operating Systems
    • 4.1.2. Creating Virtual Machines
    • 4.1.3. Virtual Machine Actions Overview
    • 4.1.4. Enabling Logging inside Virtual Machines
    • 4.1.5. Reconfiguring and Monitoring Virtual Machines
  • 4.2. Managing Images
  • 4.3. Managing Volumes
    • 4.3.1. Creating, Editing, and Removing Volumes
    • 4.3.2. Cloning Volumes
    • 4.3.3. Attaching and Detaching Volumes
    • 4.3.4. Creating Images from Volumes
    • 4.3.5. Managing Volume Snapshots
  • 4.4. Managing Private Virtual Networks
  • 4.5. Managing Virtual Routers
    • 4.5.1. Managing Router Interfaces
    • 4.5.2. Managing Static Routes
  • 4.6. Managing Floating IP Addresses
  • 4.7. Managing SSH Keys
Nov 20, 2019
Edit Raw Print Share
Prev Next