检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Formula: Memory usage = Used memory on all nodes/Total memory on all nodes × 100% Cost Breakdown Cost breakdown during the specified time period, including the ECS cost, EVS cost, and CCE cluster management cost.
Users can access the instance using the IP address through the ECS deployed on a private network. publicIp String Public network access address of a graph instance.
For example, the cloud service type of ECS is Elastic Cloud Server. region_code String A maximum of 64 characters Cloud service region code, for example, ap-southeast-1.
For example, the cloud service type of ECS is Elastic Cloud Server. region_code String A maximum of 64 characters Cloud service region code, for example, ap-southeast-1.
For example, the VM resource type code of ECS is hws.resource.type.vm. To obtain a specific resource type, call the API in Querying Resource Types. payMethod String A maximum of 32 characters Payment method.
Example value: Elastic Cloud Server If you select Custom event for Event Type, the event source must be the same as the reported field and written in the Service.Item format. - Monitoring Scope If you select Metric for Alarm Type, you need to select a resource scope to which the alarm
For details about how to obtain the ID, see Querying Information About the Resources Associated with a Vault and Querying Protectable Resources. type Yes String Type of the resource to be backed up: OS::Nova::Server: ECS; OS::Cinder::Volume: EVS disks; OS::Ironic::BareMetalServer:
resource detail Object Resource details id String id name String Backup name protectable ProtectableResult object Whether backup is supported size Integer Size of the resource, in GB status String Resource status type String Type of the resource to be backed up: OS::Nova::Server: ECS
Default Value: N/A key_pair_names No Array of strings Definition: Name of the SSH key pair, which can be created and viewed on the Key Pair page of the Elastic Cloud Server (ECS) console.
Table 1 Original resources and configuration Resource Type Billing Start Time Original Billing Mode Original Configuration Quantity Cluster March 18, 2023, 15:30:00 Pay-per-use Region: CN-Hong Kong Cluster scale: 50 worker nodes HA mode 1 ECS March 18, 2023, 15:40:00 Pay-per-use Region
Minimum length: 0 Maximum length: 36 associate_instance_id No String ID of the bound instance, such as a load balancer ID or an ECS NIC ID. Constraints: If neither associate_instance_type nor associate_instance_id is left empty, the EIP is bound to an instance.
Deploying the Application Download the Go SDK source code to the /root directory of the ECS and decompress the package. To obtain it, go to the BCS console and click Use Cases. Download the source code in the Go SDK Demo area.
For example, if an IAM user wants to query ECSs using an API, the user must have been granted permissions that allow the ecs:servers:list action. Supported Actions in IAM IAM provides system-defined policies that can be directly used.
Limitations and Constraints 2FA If 2FA is enabled, it can be used only in following scenarios: Linux: The SSH password is used to log in to an ECS, and the OpenSSH version is earlier than 8. Windows: The RDP file is used to log in to a Windows ECS.
To connect a GeminiDB Influx instance to an ECS over a private network, ensure they are in the same VPC. If they are not, create a VPC peering connection between them. Subnet A subnet where your instance is created.
To connect a GeminiDB Influx instance to an ECS over a private network, ensure they are in the same VPC. If they are not, create a VPC peering connection between them. Subnet A subnet where your instance is created.
After an ECS initiates an outbound access request, the traffic is forwarded to the firewall through the enterprise router. The firewall blocks or allows the traffic based on SNAT protection rules, and forwards secure traffic to the enterprise router.
quota 40 MB/day/quota Security Modeling Analysis × 120 MB/day/quota Table 3 Recommended security analysis configurations Value-added Function Recommended Quantity for Yearly/Monthly Subscription Security Analysis You can estimate the security analysis data volume based on 120 MB/ECS
If two clusters are used for clustered data sources, such as MRS, GaussDB(DWS), RDS, MySQL, Oracle, DIS, and ECS, you can create data connections in Management Center to distinguish data lake services in the development environment from those in the production environment.
If the shared disk is attached to multiple ECSs, these ECSs must belong to the same anti-affinity ECS group. If these ECSs fail to meet the anti-affinity requirement, the shared disk cannot reach the optimal performance. The testing process for Windows and Linux is different.