检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Statements Table 1 Statements Statement Example Select SELECT * FROM my-index Delete DELETE FROM my-index WHERE _id=1 Where SELECT * FROM my-index WHERE ['field']='value' Order by SELECT * FROM my-index ORDER BY _id asc Group by SELECT * FROM my-index GROUP BY range(age, 20,30,39)
Click Delete in the Operation column to delete an authorized account. Click OK. Check VPC endpoint information. The VPC endpoint list shows the VPC endpoints created for the current cluster. You can obtain their Status, Service Address, and Private Domain Name.
Disabling cluster snapshots does not automatically delete existing snapshots. Instead, you need to manually delete them on the OBS console. Figure 8 Disable Snapshot Parent topic: Backing up and Restoring the Data of an OpenSearch Cluster
Disabling cluster snapshots does not automatically delete existing snapshots. Instead, you need to manually delete them on the OBS console. Figure 8 Disable Snapshot Related Documents By creating and restoring snapshots, you can migrate data between clusters.
DELETE https://{Endpoint}/v1.0/{project_id}/clusters/ea244205-d641-45d9-9dcb-ab2236bcd07e/index_snapshots Example Responses None SDK Sample Code The SDK sample code is as follows.
For read-only indexes that are periodically rolled, you can periodically execute forcemerge to combine small segments into large segments and permanently delete indexes marked as deleted.
You can call these APIs to easily create, query, delete, restart, and scale clusters. If you plan to access CSS through an API, ensure that you are familiar with CSS concepts. For details, see What Is Cloud Search Service.
Delete access logs. Logs are recorded in the memory. After reading the logs, you are advised to delete them to reclaim resources.
Example: OPTIONS, GET, POST Value range: OPTIONS, HEAD, GET, POST, PUT, and DELETE Reindexing reindex.remote.whitelist Which remote hosts are allowed for remote reindexing operations. Use commas (,) to separate multiple values.
Example: OPTIONS, GET, POST Value range: OPTIONS, HEAD, GET, POST, PUT, and DELETE Reindexing reindex.remote.whitelist Which remote hosts are allowed for remote reindexing operations. Use commas (,) to separate multiple values.
a specified pattern by name: DELETE auto_sync/pattern/{PATTERN} Enabling Forcible Synchronization By default, the plug-in determines whether to synchronize metadata based on whether the number of documents in the index of the primary cluster changes.
a specified pattern by name: DELETE auto_sync/pattern/{PATTERN} Enabling Forcible Synchronization By default, the plug-in determines whether to synchronize metadata based on whether the number of documents in the index of the leader cluster changes.
Run the following command to disable memory flow control: Run the following command to delete memory flow control for a single request path. Before disabling memory flow control, you need delete per-request path memory flow control configuration.
Delete duplicate parameters. 400 CSS.5044 Invalid backup prefix. Invalid backup prefix. Change the backup prefix based on the API parameter description. 400 CSS.5046 NICS is left blank. NICS is left blank.
For example, if you purchased a pay-per-use cluster at 08:45:30 and delete it at 08:55:00, you are billed for one hour. Billing Examples Suppose you purchased a cluster on April 18, 2023, 9:39:30 and deleted it on April 18, 2023, 10:45:46.
Click Delete in the Operation column to delete accounts. NOTE: To obtain your authorized account ID, point to your username in the upper right corner, and choose My Credentials. Copy the value of Account ID.
For example, if you want your software developers to use CSS resources but not delete them or perform any high-risk operations, you can create IAM users for these software developers and assign them only the permissions required for using CSS resources.
Constraints During incremental data migration, do not delete index data in the source cluster. Otherwise, incremental data may be lost, and after the migration, data in the destination cluster may be inconsistent with that in the source cluster.
API for deleting access logs for all nodes: DELETE /_access_log Enabling Access Logging in Files Typically you record access logs in files to locate faults. After faults are rectified, you should disable it.
WARNING: If a cluster is unavailable, you can delete it or use a snapshot created when it was available to restore its data to another cluster.