检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
使用指导 DCS数据安全 DCS使用规范 发现和处理Redis大Key热Key 配置Redis Pipeline 优化Jedis连接池
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
dcs_instance_id String 参数解释: 测量对象ID,即节点的ID。 取值范围: 不涉及。 name String 参数解释: 测量对象名称,即节点IP。 取值范围: 不涉及。 dcs_cluster_redis_node String 参数解释: 维度dcs_cluster_redis_node的测量对象的ID。
分片与副本 设置备节点优先级 域名摘除IP 查询分片信息 批量查询实例节点信息 查询实例节点信息 获取副本状态 父主题: API V2(推荐)
String Key名称。 type String Key类型。 shard String 大key所在的分片,仅在实例类型为集群时支持,格式为ip:port。 db Integer 大key所在的DB。 size Long Key的value大小。 unit String 表示key
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
力,否则在变更规格后可能需要重启客户端应用。 垂直扩容(分片数不变,分片容量增加): 如果节点所在的虚拟机内存容量不足,会发生节点迁移,迁移时业务连接会有闪断和只读。 如果虚拟机内存容量充足,则直接扩大节点容量,对业务无影响。 说明: Redis 3.0版本集群实例不支持垂直扩缩容。
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted