检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Create an agency in Identity and Access Management (IAM) to delegate FunctionGraph to access ECS in the relevant region. Solution Description This solution will: 1. Create a FunctionGraph function to call the ECS API used to reinstall or change the OS. 2.
Create an agency in Identity and Access Management (IAM) to delegate FunctionGraph to access video files uploaded to an OBS bucket. 3. Create a video transcoding function and an OBS trigger in FunctionGraph.
Create an agency in Identity and Access Management (IAM) to delegate FunctionGraph to access ECS in the relevant region. 展开内容 收起内容 Advantages Serverless The serverless architecture frees you from underlying resource O&M and availability and scalability issues.
IAM IAM provides a user management mechanism designed for enterprises. It allocates different resources and rights to users who can use open APIs to access public cloud resources.
Applicable Products & Services ECS AS IMS EVS OBS VPC ELB IAM Cloud Eye CTS SMN RDS for MySQL BMS Recommended Services ServiceStage ServiceStage is an application management and O&M platform that facilitates application development, build, rollout, monitoring, and O&M.
Free Try Now IAM Authenticate user identities and access permissions > Free Try Now Cloud Trace Service Track cloud resource operations in your account > Free Try Now Blockchain Service Deploy and manage blockchain resources with low tech threshold and cost > Basic edition Try Now
API | 12 hours VPN 720 hours Direct Connect 1GE VSS Optional Anti-DDoS Optional WAF Optional SA Optional DBSS Free VPC Free Info Integration Medical Information Integration Cloud Service Contact Us ECS 6x2 cores | 4G | 128 GB SFS 2 TB OBS 20 TB RDS MySQL | 2x4 cores | 16G | 500 GB IAM
OpenStack Comprehensive Protection Comprehensive security protection at seven layers (access, transmission, infrastructure, network, virtualization, data, and management), three-layer Anti-DDoS traffic cleaning, secure network isolation provided by VPC, and access permission control by IAM