检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
required command to extract the file is installed. Command \"/usr/bin/unzip\" could not handle archive. Command \"/usr/bin/gtar\" could not handle
> 云容器引擎”,进入“云容器引擎”页面,单击目标集群名称,单击公网地址的“绑定”,进行公网IP的绑定操作。 由于部署服务官方资源池与您的K8S集群不在同一个VPC,所以只能通过弹性IP访问。 单击“连接信息”中“kubectl”对应的“配置”,进入界面,在“下载kubectl配
击“确定”,完成目标主机的创建。 参数项 是否必填 说明 主机名 是 请输入自定义的目标主机名称,示例:目标主机B。 IP 是 请输入“目标主机-B”的私有IP地址。 操作系统 是 不可更改,默认为当前主机集群的操作系统。 认证方式 是 本场景使用密码进行认证,输入的是“目标主机-B”的用户名及密码。
编辑器,定位到以下路径: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters 在右侧窗口中,找到名为TcpTimedWaitDelay的DWORD值。如果该值不存在,则需要手动创建。 修改Tc
永久移动,请求的资源已被永久的移动到新的URI,返回信息会包括新的URI。 302 Found 资源被临时移动。 303 See Other 查看其它地址。 使用GET和POST请求查看。 304 Not Modified 所请求的资源未修改,服务器返回此状态码时,不会返回任何资源。 305 Use Proxy
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
Boolean 是否具有编辑权限 can_delete 是 Boolean 是否具有删除权限 can_view 是 Boolean 是否具有查看权限 can_execute 是 Boolean 是否具有执行权限 can_copy 是 Boolean 是否具有复制权限 can_manage
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
当前步骤执行失败后,应用是否继续执行后续的步骤。 配置是否使用sudo权限执行该步骤。 示例:通过shell命令步骤查看服务日志 应用部署完毕需要查看服务的启动或执行日志,可使用执行shell命令操作直接查看。 准备工作 您有查看服务启动或执行日志的权限。 需要确定服务启动日志的全路径。 以安装Tomcat服务为例:
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted