检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
DCS Data Migration Overview The DCS console supports online and backup (file) migration with intuitive operations. Incremental data can be migrated online. Online migration is suitable when the source Redis instance supports the SYNC and PSYNC commands. Data in the source Redis instance
Controlling DCS Redis Access Configuring DCS Redis Access Whitelist Configuring a Redis Password Transmitting DCS Redis Data with Encryption Using SSL Configuring DCS Redis ACL Users Parent Topic: Accessing a DCS Redis Instance
Buying a DCS Redis Instance Fully compatible with open-source Redis, Distributed Cache Service (DCS) for Redis is a high-speed in-memory data processing engine provided by Huawei Cloud. You can purchase Redis instances with specific computing power and storage space as needed. Video
Configuring DCS Instance Tags Tags facilitate DCS instance identification and management. Tags can be added in instance creation, or added or deleted for an instance later. If your organization has configured tag policies for DCS, add tags to DCS instances based on the tag policies
Diagnosing a DCS Redis Instance If a fault or performance issue occurs, you can ask DCS to diagnose your instance to learn about the cause and impact of the issue and how to handle it. Notes and Constraints DCS Redis 3.0 and Memcached instances do not support diagnosis. New instances
Configuring DCS Monitoring and Alarms This section describes the alarm rules of some metrics and how to configure the rules. In actual scenarios, configure alarm rules for metrics by referring to the following alarm policies. Alarm Policies for DCS Redis Instances Table 1 DCS Redis
Viewing DCS Background Tasks After you initiate certain instance operations such as scaling up the instance and changing or resetting a password, a background task will start for each operation. On the DCS console, you can view the background task status and clear task information
Creating a DCS Event Notification Cloud Eye can monitor DCS events. Master/Standby instance switchovers, abnormal Redis nodes, and data migration failures can be notified. When setting an event notification, if Topic subscriptions is enabled, Simple Message Notification (SMN) will
Modifying DCS Instance Specifications On the DCS console, you can change DCS Redis or Memcached instance specifications including the instance type, memory, and replica quantity. Modifying instance specifications does not affect the connection address, password, security group, and
Clearing DCS Instance Data To clear instance data, use the FLUSHDB or FLUSHALL commands on accessed instances, or the data clearance function on the DCS console. This section describes how to use the function to clear instance data with one click. Clearing instance data may cause
Binding a Key Pair to an ECS If you set the login mode to Password when purchasing an ECS running Linux, and you need to change the login mode to Key Pair, you can bind the key pair to the ECS on the KPS console, KPS will configure the key pair. After the key pair is bound, you can
Collecting ECS Network Information Scenarios Before configuring policy-based routes for an ECS with multiple network interfaces, you need to collect network information about the ECS. Table 1 lists the information to be collected for a Linux ECS using IPv4. Table 1 Linux ECS using
Changing the Security Group of an ECS Scenarios When creating an ECS, you must associate it with a security group. If no security group has been created yet, a default security group will be created and associated with the ECS. If the default security group cannot meet your service
Why Are Connections to a Linux ECS Using SSH or to Applications on the ECS Interrupted Occasionally? Scenarios This section applies to the scenario where the connection to a Linux ECS using SSH or the access to applications on the ECS is interrupted occasionally. Constraints Modifying
Why Is the Hostname of My ECS Restored to the Original Name After the ECS Is Restarted? The following uses an ECS running CentOS 7 as an example: Log in to the Linux ECS and view the Cloud-Init configuration file. In the /etc/cloud/cloud.cfg file, comment out or delete update_hostname
Obtaining the Password for Logging In to a Windows ECS Scenarios Password authentication mode is required to log in to a Windows ECS. Therefore, you must use the key file used when you created the ECS to obtain the administrator password generated when the ECS was initially installed
Querying the NIC IP Address of an ECS Scenarios The IP address of an ECS is required. Procedure On the management console, choose Computing > Elastic Cloud Server. On the left side of the page, choose Elastic Cloud Server. Then, the system displays all ECSs on the right side of the
Creating a Datasource Connection with a DCS Table Creating a DLI Table and Associating It with DCS Inserting Data to a DCS Table Querying the DCS Table Parent topic: Datasource Connections
Creating a DLI Table and Associating It with DCS Function This statement is used to create a DLI table and associate it with an existing DCS key. In Spark cross-source development scenarios, there is a risk of password leakage if datasource authentication information is directly configured
Accessing a Black-holed Server Through ECS Application Scenarios When your server is under a traffic flooding attack, a black hole will be triggered to block all accesses from the Internet. You can connect to a black-holed server through an Elastic Cloud Server (ECS). Once you have