You can copy snapshots within the same region or across regions to flexibly and reliably back up data. You can use the Copy and Encrypt feature to encrypt snapshot copies when you copy snapshots. This improves data security. This topic describes how to copy a snapshot within the same region or across regions.
Prerequisites
A snapshot is created. For more information, see Create a snapshot.
Key Management Service (KMS) is activated before you copy a snapshot to create an encrypted snapshot copy. For more information, see the Activate KMS section of the "Overview" topic.
Use scenarios
Snapshot replication is applicable to the following scenarios:
DevOps scenarios
You can copy snapshots to start business in new regions or migrate business systems to new regions. This helps you reduce O&M costs and improve data availability.
Inter-region or cross-region backup scenarios
Snapshot replication helps meet the requirements for compliance audit and improvement of business reliability. In the event of a disaster, you can restore your business systems by using snapshot copies in another region. This reduces the recovery time objective (RTO) and recovery point objective (RPO).
The following table describes the differences between copy scenarios and copy and encryption scenarios.
Scenario | Usage | Security | Procedure |
Copy scenarios | You can copy unencrypted snapshots across regions to back up data or create cloud disks based on the unencrypted snapshot copies in the destination regions. | You can directly access unencrypted snapshots. | |
Copy and encryption scenarios |
| You can access encrypted snapshots only by using encryption keys. This can protect sensitive snapshot data from unauthorized access. Encrypted snapshots provide a higher level of security than non-encrypted snapshots. This ensures better protection for data privacy and security. |
Precautions
When you copy snapshots, take note of the items described in the following table.
Item | Description |
Replication fee |
|
Replication efficiency | You can copy a snapshot faster than an image and use snapshot replication to bypass capacity constraints. If you want to copy a large image, such as an image larger than 2 TiB in size, we recommend that you copy the associated snapshots to the destination region and create an image based on the snapshot copies in the region.
|
Limits |
|
Procedure
Log on to the ECS console.
In the left-side navigation pane, choose .
In the top navigation bar, select the region and resource group to which the resource belongs.
Find the snapshot that you want to copy and choose
> Copy Snapshot in the Actions column.
In the Copy Snapshot dialog box, configure parameters based on the copy scenario. The following table describes the parameters.
Copy scenarios
Parameter
Description
Snapshot Name
Enter a name for the new snapshot.
Destination Region
Select a destination region that is different from the region where the source snapshot resides.
Copy Type
Select Copy.
Advanced Settings (Optional)
Description
Enter a description for the new snapshot. To facilitate management, we recommend that you enter relevant information, such as the purpose and environment of the new snapshot.
Tag
To facilitate management, specify the tags that you want to add to the new snapshot.
NoteYou cannot copy the tags of the source snapshot to the new snapshot.
Copy and encryption scenarios
Parameter
Description
Snapshot Name
Enter a name for the new snapshot.
Destination Region
Select a destination region. The selected region can be the region of the source snapshot or a different region.
Copy Type
Select Copy and Encrypt.
NoteSnapshots that are created for encrypted cloud disks are also encrypted. If the snapshot that you want to copy is an encrypted snapshot, select Copy and Encrypt.
Encryption Key
You can select the service key of the destination region or a customer master key (CMK) that is created in KMS from the drop-down list.
NoteFor more information about encryption keys, see the Encryption keys section of the "Encrypt cloud disks" topic.
If you select a CMK, make sure that the CMK meets the region and permission requirements. For more information, see the Limits section of the "Encrypt cloud disks" topic.
Advanced Settings (Optional)
Description
Enter a description for the new snapshot. To facilitate management, we recommend that you enter relevant information, such as the purpose and environment of the new snapshot.
Tag
To facilitate management, specify the tags that you want to add to the new snapshot.
NoteYou cannot copy the tags of the source snapshot to the new snapshot.
Confirm the information and click Confirm. The system copies the specified snapshot.
NoteWhen the new snapshot is being created in the destination region, Processing is displayed in the Progress column. You can click Delete Snapshot in the Actions column to cancel the snapshot copying task.
In the upper-left corner of the top navigation bar, select the destination region. On the Snapshots page, find the new snapshot.
In the Actions column, click Delete Snapshot.
(Optional) Switch to the destination region and view information about the new snapshot.
When the snapshot copying task is completed, Available is displayed in the Progress column corresponding to the new snapshot, as shown in the red box labeled ① in the preceding figure.
To view the ID of the copied snapshot, move the pointer over Snapshot Copy in the Creation Method column corresponding to the new snapshot, as shown in the red box labeled ② in the preceding figure.
To determine whether the new snapshot is encrypted and view the encryption key, view the value in the Encrypted/Unencrypted column, as shown in the red box labeled ③ in the preceding figure.