In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-29 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/02 Report--
This article will explain in detail how to restore all or part of the rules in an original security group to the rules of the target security group. The editor thinks it is very practical, so I share it for you as a reference. I hope you can get something after reading this article.
Restore security group rules
Restoring security group rules refers to the process of restoring all or part of the rules in an original security group to the target security group rules. Where:
Restore all means that when restoring, the system deletes rules that are not in the target security group in the original security group, and adds rules that only exist in the target security group in the original security group. After the restore operation, the rules in the original security group are exactly the same as those in the target security group.
Partial restore means that only the rules that exist in the target security group are added to the original security group, ignoring the rules that exist in the original security group but not in the target security group.
Limit
Currently, there are the following restrictions on restoring security group rules:
The original security group and the target security group must be in the same region.
The original security group and the target security group must be of the same network type.
If there are system-level security group rules in the target security group (priority is 110), such rules cannot be created during restore. After restore, the rules in the original security group may be different than expected. If you need these security group rules, create similar rules manually (priority can be set to 100).
Working with scen
If you need to implement new security group rules for an online business, you can first clone the original security group as a backup, and then modify the rules in the security group. If the new security group rules adversely affect your online business, you can restore the security group rules in whole or in part.
prerequisite
You should have at least one security group in the same region and network type.
Operation steps
Log in to the ECS console of the CVM.
In the left navigation bar, click Security Group.
Select the region.
In the list of security groups, find the security group for which you want to restore the rule as the original security group, and in the actions column, click restore rule.
In the restore rules dialog box:
Select the target security group: the target security group must have different rules from the original security group.
Select a restore strategy:
If you want the original security group to have exactly the same rules as the target security group, you should choose to restore all.
If you only need to add rules to the original security group that are unique to the target security group, you should choose partial restore.
Preview the restore results:
Green shows rules that exist only in the target security group. Whether it is a full restore or a partial restore, this part of the rule is added to the original security group.
Red shows rules that are not in the target security group. If you choose to restore all, the system deletes this part of the rule in the original security group. If you choose partial restore, this part of the rule in the original security group will still be retained.
Click OK after confirming that it is correct.
After successful creation, the restore rule dialog box closes automatically. "in the list of security groups, find the original security group that has just completed the restore operation. In the Action column, click configure rules to enter the security group rules page to view the updated security group rules."
The method of restoring all or part of the rules in an original security group to the target security group rules is shared here. I hope the above content can be helpful to you and learn more knowledge. If you think the article is good, you can share it for more people to see.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.