检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
"65382450e8f64ac0870cd180d14e684b", "name": "XXXXX", "description": "", "links": { "next": null,
r集群分片的主备节点,请在实例详情的“节点管理”(或“分片与副本”)页签中操作,具体操作可参考管理DCS实例分片与副本。 实例主备切换后,IP地址不变,不需要切换客户端连接地址。 约束与限制 只有当DCS缓存实例处于“运行中”状态,才能执行此操作。 主备节点切换期间,业务会发生少
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
String Key名称。 type String Key类型。 shard String 热key所在的分片,仅在实例类型为集群时支持,格式为ip:port。 db Integer 热key所在的DB。 size Long Key的value大小。 unit String 表示key
String Key名称。 type String Key类型。 shard String 热key所在的分片,仅在实例类型为集群时支持,格式为ip:port。 db Integer 热key所在的DB。 size Long Key的value大小。 unit String 表示key
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
String Key名称。 type String Key类型。 shard String 大key所在的分片,仅在实例类型为集群时支持,格式为ip:port。 db Integer 大key所在的DB。 size Long Key的value大小。 unit String 表示key
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
Cluster集群实例配置 # redis cluster节点信息 spring.redis.cluster.nodes=<ip:port>,<ip:port>,<ip:port> # redis cluster 最大重定向次数 spring.redis.cluster.max-redirects=3
String Key名称。 type String Key类型。 shard String 热key所在的分片,仅在实例类型为集群时支持,格式为ip:port。 db Integer 热key所在的DB。 size Long Key的value大小。 unit String 表示key
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted