检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
          • All
          • Products
          • Solutions
          • Documentation
          • KooGallery
          • Developer
          • Learn
          • More
          10000 results found
          • Log Access Overview - Application Operations Management

            Log Access Overview - Application Operations Management

            Figure 3 Modifying a mapping Deleting a Mapping When you delete an access rule or a mapped log stream, the corresponding mapping is deleted. New logs are reported only to the AOM log stream. In this case, you cannot view the content of log stream A, as shown in Figure 4.

            Help > Application Operations Management > User Guide > (Old) Log Management > Ingesting Logs to LTS
          • Scenario Overview - Application Operations Management

            Scenario Overview - Application Operations Management

            If yes, delete the scenario first. For details, see Reference Details. After a card is removed, it will not be displayed on the Scenarios page.

            Help > Application Operations Management > User Guide > O&M Management > Scenarios
          • Obtaining Classification and Grading Templates for Sensitive Data Identification - Data Security Center

            Obtaining Classification and Grading Templates for Sensitive Data Identification - Data Security Center

            project_id String Project ID. name String Template name. description String Template description. category String Template category. is_default Boolean Whether the template is a default template. create_time Long Creation time. update_time Long Update time. is_deleted Boolean Whether to delete

            Help > Data Security Center > API Reference > API Description > Sensitive Data Identification
          • Releasing an Instance - KooGallery

            Releasing an Instance - KooGallery

            Releasing an Instance Description When an instance of a purchased product is released (for example, the instance is not renewed upon expiration or unsubscribed from), KooGallery calls this interface to delete the instance.

            Help > KooGallery > Access Guide > SaaS Access Guide V2.0 (New Products) > Basic Interfaces
          • Selecting a Distribution Mode - GaussDB

            Selecting a Distribution Mode - GaussDB

            Figure 1 Replication tables and hash tables When you insert, modify, or delete data in a replication table, if you use the shippable or immutable function to encapsulate components that cannot be pushed down, data on different DNs in the replication table may be inconsistent.

            Help > GaussDB > Developer Guide(Distributed_V2.0-8.x) > SQL Optimization > Reviewing and Modifying a Table Definition
          • ALTER FOREIGN DATA WRAPPER - GaussDB

            ALTER FOREIGN DATA WRAPPER - GaussDB

            Example -- Creates a foreign data wrapper dbi. gaussdb=# CREATE FOREIGN DATA WRAPPER dbi OPTIONS (bar 'true'); -- Modify a foreign data wrapper dbi, add the foo option, and delete bar. gaussdb=# ALTER FOREIGN DATA WRAPPER dbi OPTIONS (ADD foo '1', DROP 'bar'); -- Change the validator

            Help > GaussDB > Developer Guide(Centralized_V2.0-8.x) > SQL Reference > SQL Syntax > A
          • SAVEPOINT - GaussDB

            SAVEPOINT - GaussDB

            You can see 1 and 3 at the same time, but cannot see 2 because 2 is rolled back. gaussdb=# SELECT * FROM table1; -- Delete the table. gaussdb=# DROP TABLE table1; Helpful Links RELEASE SAVEPOINT and ROLLBACK TO SAVEPOINT Parent topic: S

            Help > GaussDB > Developer Guide(Centralized_V2.0-8.x) > SQL Reference > SQL Syntax > S
          • SET SESSION AUTHORIZATION - GaussDB

            SET SESSION AUTHORIZATION - GaussDB

            ----------+-------------- paul | paul (1 row) -- Reset the session user and the current user. gaussdb=> RESET SESSION AUTHORIZATION; gaussdb=# SELECT SESSION_USER, CURRENT_USER; session_user | current_user --------------+-------------- omm | omm (1 row) -- Delete

            Help > GaussDB > Developer Guide(Centralized_V2.0-8.x) > SQL Reference > SQL Syntax > S
          • FAQ - GaussDB

            FAQ - GaussDB

            What are the differences between the DROP, TRUNCATE, and DELETE methods in GaussDB? How many bytes does a Chinese character occupy in GaussDB? How Do I Set the Validity Period of an Account? What Are the Differences Between Unique Constraints and Unique Indexes?

            Help > GaussDB > Developer Guide(Centralized_V2.0-8.x)
          • ADM_TRIGGERS - GaussDB

            ADM_TRIGGERS - GaussDB

            Value range: update, insert, delete, and truncate. table_owner character varying(64) Owner of the table that defines a trigger. base_object_type character varying(18) Defines the basic object of a trigger.

            Help > GaussDB > Developer Guide(Centralized_V2.0-8.x) > System Catalogs and System Views > System Views > Other System Views
          • FAQs - GaussDB

            FAQs - GaussDB

            What are the differences between the DROP, TRUNCATE, and DELETE methods in GaussDB? How many bytes does a Chinese character occupy in GaussDB? What Are the Differences Between Unique Constraints and Unique Indexes? How Do I Create a Weak Password in GaussDB?

            Help > GaussDB > Developer Guide(Distributed_V2.0-8.x)
          • ALTER FOREIGN DATA WRAPPER - GaussDB

            ALTER FOREIGN DATA WRAPPER - GaussDB

            Examples -- Creates a foreign data wrapper dbi. gaussdb=# CREATE FOREIGN DATA WRAPPER dbi OPTIONS (bar 'true'); -- Modify a foreign data wrapper dbi, add the foo option, and delete bar. gaussdb=# ALTER FOREIGN DATA WRAPPER dbi OPTIONS (ADD foo '1', DROP 'bar'); -- Change the validator

            Help > GaussDB > Developer Guide(Distributed_V2.0-8.x) > SQL Reference > SQL Syntax > A
          • Overview - Document Database Service

            Overview - Document Database Service

            Proper Use of Data Definition Languages (DDL) Statements This section describes DDL statements used to create, modify, and delete the structure of databases and collections. How Is a DDS Node Going to Be Disconnected and What Can I Do?

            Help > Document Database Service > Best Practices
          • Deleting an Application Rule - Workspace

            Deleting an Application Rule - Workspace

            URI DELETE /v1/{project_id}/app-center/app-rules/{rule_id} Table 1 Path Parameters Parameter Mandatory Type Description project_id Yes String Project ID. rule_id Yes String Rule ID.

            Help > Workspace > API Reference > Workspace APIs > Application Management
          • Deleting a Script - Workspace

            Deleting a Script - Workspace

            URI DELETE /v2/{project_id}/scripts/{script_id} Table 1 Path Parameters Parameter Mandatory Type Description project_id Yes String Project ID. script_id Yes String Script ID.

            Help > Workspace > API Reference > Workspace APIs > Script
          • Billing - Workspace

            Billing - Workspace

            After you delete a created image, you will not be billed anymore. For more information, see IMS Billing. Network-attached storage (NAS) is billed based on the selected SFS 3.0 Capacity-Oriented file system. See SFS Billing.

            Help > Workspace > User Guide (Application Streaming) > Overview
          • How Do I Calculate the Number of Concurrent Sessions of a Cloud Application? - Workspace

            How Do I Calculate the Number of Concurrent Sessions of a Cloud Application? - Workspace

            Recommended maximum number of sessions = (85% – Bottleneck metric usage when the server is unloaded)/Bottleneck metric usage of each session After the calculation is complete, if the resources are no longer used, delete or unsubscribe from the servers, server groups, and application

            Help > Workspace > User Guide (Application Streaming) > Administrator Operation Guide > FAQs
          • DBSS Custom Policies - Database Security Service

            DBSS Custom Policies - Database Security Service

            The following is an example of a deny policy: 1 2 3 4 5 6 7 8 9 10 11 { "Version": "1.1", "Statement": [ { "Action": [ "dbss:auditInstance:delete" ]

            Help > Database Security Service > User Guide > Permission Control
          • Viewing Your Profile - Cloud Bastion Host

            Viewing Your Profile - Cloud Bastion Host

            To add, modify, and delete a public key, see Managing SSH Public Keys. Figure 4 SSH Pubkey My Permission To view the personal system permissions and check whether the administrator permission is enabled, click the My Permission tab.

            Help > Cloud Bastion Host > User Guide > Basic Instance Information Management > Profile
          • Managing Session Videos - Cloud Bastion Host

            Managing Session Videos - Cloud Bastion Host

            They can also generate, download, or delete operation videos for different audit purposes. Sensitive data may exist in the video files to be audited. Exercise caution when downloading these files to prevent information leaks.

            Help > Cloud Bastion Host > User Guide > Audit > History Session
          Total results: 10000
          • Previous
          • 1
          • ...
          • 471
          • 472
          • 473
          • ...
          • 500
          • Next
          • Go
          Load More
          Was this helpful?
          Feedback
          /200
          Submit Cancel
          Contact Sales After-Sales Self Service
          • Site Terms
          • Privacy Statement

          Explore Huawei Cloud

          Why Us Customer Stories Trust Center Legal Press Releases

          Featured Services

          Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

          Service and Support

          Documentation Contact Us Public Notices Support Plans Service Health Dashboard

          Account and Payment

          Top Up Invoices Billing Center My Account Payment Method

          Quick Links

          Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

          © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

          • Site Terms
          • Privacy Statement