检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
用户账号权限不足 解决方案 如果服务器记录未删除,可以尝试单击该服务器的“更多 >管理目的端> 解锁目的端”进行解锁。 如果解锁时提示“权限不足”,请更换有权限的账号重试。 如果服务器记录已删除,可参考解锁云服务器进行解锁或使用API Explorer进行解锁。 登录API Explorer。
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
d180d14e6xxx", "name": "project_name", "description": "", "links": { "next": null,
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
"vpc:vpcs:delete", "vpc:publicIps:create", "vpc:publicIps:delete", "vpc:subnets:create",
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
目的端系统镜像为私有镜像,该私有镜像在私有镜像列表中被删除,SMS无法识别该私有镜像信息导致保存配置失败。 解决方案 在弹性云服务器 ECS控制台,重装或者切换目的端主机操作系统。 如果目的端需要UEFI固件类型的操作系统,可参考文档制作私有镜像:创建迁移任务时提示“您选择的目的端与源端固件类型不
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
-Th查看挂载的各个磁盘分区使用率情况。 若磁盘剩余空间不足,请清理磁盘空间或者进行扩容,保证各分区剩余空间不低于1G。 在SMS控制台上删除此服务器,然后在源端重新注册Agent,重新进行迁移。 父主题: 错误码排查与解决方法
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted