Jump To Close Expand all Collapse all Table of contents Creating and Managing Instances Preface Making open source more inclusive Providing feedback on Red Hat documentation 1. About instances 2. Instance boot source 3. Types of instance storage Expand section "3. Types of instance storage" Collapse section "3. Types of instance storage" 3.1. Instance disk 3.2. Instance ephemeral storage 3.3. Instance swap storage 3.4. Instance block storage 3.5. Config drive 4. Flavors for instances 5. Creating an instance Expand section "5. Creating an instance" Collapse section "5. Creating an instance" 5.1. Prerequisites 5.2. Creating an instance from an image 5.3. Creating an instance from a bootable volume 5.4. Creating an instance with a SR-IOV network interface 5.5. Additional resources 6. Creating an instance with a guaranteed minimum bandwidth QoS Expand section "6. Creating an instance with a guaranteed minimum bandwidth QoS" Collapse section "6. Creating an instance with a guaranteed minimum bandwidth QoS" 6.1. Removing a guaranteed minimum bandwidth QoS from an instance 7. Updating an instance Expand section "7. Updating an instance" Collapse section "7. Updating an instance" 7.1. Attaching a network to an instance 7.2. Detaching a network from an instance 7.3. Attaching a port to an instance 7.4. Detaching a port from an instance 7.5. Attaching a volume to an instance 7.6. Viewing the volumes attached to an instance 7.7. Detaching a volume from an instance 8. Providing public access to an instance Expand section "8. Providing public access to an instance" Collapse section "8. Providing public access to an instance" 8.1. Prerequisites 8.2. Securing instance access with security groups and key pairs Expand section "8.2. Securing instance access with security groups and key pairs" Collapse section "8.2. Securing instance access with security groups and key pairs" 8.2.1. Creating a security group 8.2.2. Updating security group rules 8.2.3. Deleting security group rules 8.2.4. Adding a security group to a port 8.2.5. Removing a security group from a port 8.2.6. Deleting a security group 8.2.7. Generating a new SSH key pair 8.2.8. Importing an existing SSH key pair 8.2.9. Additional resources 8.3. Assigning a floating IP address to an instance 8.4. Disassociating a floating IP address from an instance 8.5. Creating an instance with SSH access 8.6. Additional resources 9. Connecting to an instance Expand section "9. Connecting to an instance" Collapse section "9. Connecting to an instance" 9.1. Accessing an instance console 9.2. Logging in to an instance 10. Managing an instance Expand section "10. Managing an instance" Collapse section "10. Managing an instance" 10.1. Resizing an instance 10.2. Creating an instance snapshot 10.3. Rescuing an instance 10.4. Shelving an instance 10.5. Instance management operations 11. Creating a customized instance Expand section "11. Creating a customized instance" Collapse section "11. Creating a customized instance" 11.1. Customizing an instance by using user data 11.2. Customizing an instance by using metadata 11.3. Customizing an instance by using a config drive Legal Notice Settings Close Language: 한국어 简体中文 日本語 English Language: 한국어 简体中文 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: 한국어 简体中文 日本語 English Language: 한국어 简体中文 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Creating and Managing Instances Red Hat OpenStack Platform 16.2Creating and managing instances using the CLIOpenStack Documentation Teamrhos-docs@redhat.comLegal NoticeAbstract This guide provides procedures for creating and managing instances. Next