rsnt_translations
56,420
edits
No edit summary |
No edit summary |
||
Line 14: | Line 14: | ||
# The VM is shut down and locked at the sysadmin level. | # The VM is shut down and locked at the sysadmin level. | ||
# You are notified by email. | # You are notified by email. | ||
==Why do you need to rebuild?== <!--T:4--> | ==Why do you need to rebuild?== <!--T:4--> | ||
Line 20: | Line 19: | ||
* The contents of the VM are no longer trustworthy, but it is relatively safe to extract the data. | * The contents of the VM are no longer trustworthy, but it is relatively safe to extract the data. | ||
* You have to build a new VM. | * You have to build a new VM. | ||
==What steps should you take?== <!--T:5--> | ==What steps should you take?== <!--T:5--> | ||
Line 29: | Line 27: | ||
# Under <i>Volumes</i>, select <i>Manage Attachments</i> for the volume that was compromised and select <i>Attach To Instance</i> (select the recovery instance you just launched). | # Under <i>Volumes</i>, select <i>Manage Attachments</i> for the volume that was compromised and select <i>Attach To Instance</i> (select the recovery instance you just launched). | ||
# ssh in to your recovery instance: you will now see your old, compromised volume available as the “vdb” disk. | # ssh in to your recovery instance: you will now see your old, compromised volume available as the “vdb” disk. | ||
# Mounting the appropriate filesystem out of a partition or | # Mounting the appropriate filesystem out of a partition or an LVM logical volume depends on how the base OS image was created. Because instructions vary greatly, contact someone with experience to continue. | ||
<!--T:7--> | <!--T:7--> | ||
[[Category:Cloud]] | [[Category:Cloud]] | ||
</translate> | </translate> |