检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
An ECS is available. For details, see Purchasing an ECS. GNU Compiler Collection (GCC) has been installed on the ECS. The created ECS is in the same region, AZ, VPC, and security group as the GeminiDB Redis instance.
Prerequisites An ECS has been created. The following uses a Linux ECS as an example. For details, see Purchasing an ECS in Getting Started with Elastic Cloud Server. You have bound an EIP to a node of the purchased instance and configure security group rules for the node.
Prerequisites An ECS has been created. The following uses a Linux ECS as an example. For details, see Purchasing an ECS in Getting Started with Elastic Cloud Server. Download the Redis client installation package. Procedure Log in to the ECS.
If the instance is not associated with the default security group, check whether the security group rules allow the ECS to access the instance. If the security group rule allows access from the ECS, you can connect to the instance through the ECS.
An ECS with 16 vCPUs, 64 GB of memory, and 100 or more GB of disk space has been created. For details about how to create an ECS, see Purchasing an ECS" in Getting Started with Elastic Cloud Server.
If not all access from the ECS is allowed, you need to configure an outbound rule for the ECS.
You can bind an EIP to an ECS (or a server on the public network) to access the instance. 8635 Low security For faster transmission and improved security, migrate your applications to an ECS that is in the same subnet as your instance and use a private IP address to access the instance
Your applications are deployed on an ECS that is in the same region and VPC as your instance.
You can connect to the instance from an ECS using a public domain name or an EIP. 6379 For faster transmission and improved security, migrate your applications to an ECS that is in the same subnet as your instance and use a private IP address to access the instance.
Prerequisites An ECS has been created. The following uses a Linux ECS as an example. For details, see Purchasing an ECS in Getting Started with Elastic Cloud Server. Procedure Log in to the ECS. For details, see Logging In to an ECS in Getting Started with Elastic Cloud Server.
Prerequisites An ECS has been created. The following uses a Linux ECS as an example. For details, see Purchasing an ECS in Getting Started with Elastic Cloud Server. Procedure Log in to the ECS. For details, see Logging In to an ECS in Getting Started with Elastic Cloud Server.
For details, see Logging In to an ECS in Getting Started with Elastic Cloud Server. Upload the InfluxDB client installation package to the ECS using file transfer tools like XFTP.
Figure 1 Relationship between GeminiDB and other services Table 1 Relationship between GeminiDB and other services Service Relationship with GeminiDB ECS Elastic Cloud Server (ECS) provides elastic computing resources for GeminiDB and a running environment for DB instances.
Redis-full-check must be deployed on the ECS, and the ECS is connected to the source and destination databases. During incremental migration, data may be inconsistent due to network latency between the source and destination databases.
The Redis-Full-Check open-source tool must be deployed on the ECS instance, and the ECS instance can communicate with the source and target networks.
If the ECS and GeminiDB Mongo instance are in different security groups, configure security group rules for the ECS and DB instance, respectively. GeminiDB Mongo instance: Configure inbound rules for the security group associated with the instance. For details, see Procedure.
For details, see Logging In to an ECS in Getting Started with Elastic Cloud Server.
For details, see Purchasing an ECS and Logging In to an ECS.
Redis-full-check must be deployed on the ECS, and the ECS is connected to the source and destination databases. During incremental migration, data may be inconsistent due to network latency between the source and destination databases.
There is no need to configure security rules for the ECS because the default security group rule of the ECS allows all outbound data packets. If not all outbound traffic is allowed in the security group, configure an outbound rule for the ECS.