检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
If it is, delete the record and download the package again. If the download still fails after you have performed the preceding steps, you are advised to use another computer to download the package and upload it to the source server from there.
If there is not enough space, delete any unnecessary files from the partition on the target server or the source server to release enough space, and try again. Check whether the paired target server disk is detached. If it is, attach the disk to the target server.
If there is not enough space, delete any unnecessary files from the partition on the target server or the source server to release enough space, and try again. Check whether the paired target server disk is detached. If it is, attach the disk to the target server.
If the available space in the /tmp directory is insufficient for the mounted volume, perform either of the following operations: Delete unnecessary files or expand the capacity of the volume mounted to the /tmp directory.
Locate the source server and choose More > Delete Target Configuration. Attach disks to the target server to ensure that the target server has at least as many disks as the source server.
Search for and delete all antivirus software-related installation directories, registries, and startup items. Attach the disk back to target server, restart the system several times to check that BSOD does not occur.
If you delete a migration task before it is complete, you need to manually delete the temporary disk. Otherwise, the disk will continue to be billed, resulting in additional costs.
If you delete a migration task before it is complete, you need to manually delete the temporary disk. Otherwise, the disk will continue to be billed, resulting in additional costs.
You will need to delete the original migration task, create a new task, and perform a full migration again. For a Linux source server, after the full migration is complete, you can perform an incremental synchronization even if you have restarted the source server or Agent.
DELETE Requests the server to delete specified resources, for example, an object. HEAD Same as GET except that the server must return only the response header. PATCH Requests the server to update partial content of a specified resource.
Delete the migration task on the SMS console, create a task for the source server again, and start the migration task. Parent topic: Migration or Synchronization Failures
Delete target configuration, restart Agent, and expand target partition. Not enough space. Delete target configuration, restart Agent, and expand target partition.
Delete any files you no longer need from the source server before migration. Check the I/O read and write performance and CPU performance of the source server. In Windows, you can run perfmon to invoke Performance Monitor to monitor the CPU and I/O read and write performance.
After the migration is complete, SMS automatically deletes the logs on the target server, and you need to manually delete the logs from the source server. The logs contain the IP addresses and disk, mounting, and fstab details.
Delete the migrated servers from the server list in a timely manner so that other servers can continue to be migrated. OSs Supported Windows OSs Supported Linux OSs A server running multiple OSs cannot be migrated.
Do not delete these EVS disks during the migration or change their billing modes to yearly/monthly, or the migration will fail. For pricing details about EVS, see EVS Pricing Details.
What Happens If You Choose to Disable Google Services Servers with startup services in the /etc/systemd/system directory, such as those running Ubuntu, CentOS 8, or CentOS 9 If you choose to disable the Google services, the Agent will only delete the soft links related to these services
After the migration is complete, you are advised to delete the SMS software from the target server.
The rm command or other software is often used to delete files. If a file is used by a running process when the file is deleted, the file will still be accessible to this process and will continue to occupy disk space.
For example, you can create IAM users for software developers, and assign specific permissions to allow them to use SMS but disallow them to delete any resources or perform any high-risk operations.