检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
After an alarm rule is created, you can flexibly manage it, for example at any time you can modify, enable, disable, or delete it. Real-time notification: You can enable Alarm Notification when creating alarm rules.
Delete data from the old grid. Deploy and update grid code as follows: Combine the grid code deployment with cross-AZ and cross-region deployment to reduce the impact scope of faults through multi-layer isolation.
Be aware of who can access, modify, and delete data. This helps restrict data access permissions and reduce data leakage risks. Only authorized users can access data based on the least privilege principle and perform related operations.
Related cloud services and tools Cloud Operations Center (COC) Through job management, you can create, modify, and delete jobs, and execute jobs on VMs. (Job management is currently only supported for ECSs.)
Principle of least privilege (PoLP) Least roles: Delete unnecessary system administrators. Periodically check for and delete expired roles. Least privileges: Grant users or entities the least privileges required to perform their tasks to reduce security risks.
In versions earlier than Redis 4.0: To delete big Hashes, use HSCAN + HDEL commands. To delete big Lists, use the LTRIM command. To delete big Sets, use SSCAN + SREM commands. To delete big Sorted Sets, use ZSCAN + ZREM commands.