检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
"c131886aec...", "name": "IAMUser", "description": "IAM User Description", "areacode": "", "phone": "",
复制已有负载均衡器 查询负载均衡器详情 更新负载均衡器 变更负载均衡器计费模式 删除负载均衡器 级联删除负载均衡器 级联删除负载均衡器及关联EIP 查询负载均衡器状态树 新增负载均衡器可用区 移除负载均衡器可用区 父主题: API(V3)
监控弹性负载均衡 使用场景 用户在使用ELB的过程中有了解业务负载详情的需求,为使用户更好地掌握ELB的流量负载情况,华为云提供了立体化监控平台云监控服务(CES)。通过云监控服务用户可以执行自动实时监控、告警和通知操作,帮助用户实时掌握通过ELB负载的运行情况。 云监控服务不需
}, { "feature" : "multi_eip", "value" : "true", "type" : "BOOL" }, { "feature" : "multi_vip", "value" : "true", "type"
监控弹性负载均衡 使用场景 用户在使用ELB的过程中有了解业务负载详情的需求,为使用户更好地掌握ELB的流量负载情况,华为云提供了立体化监控平台云监控服务(CES)。通过云监控服务用户可以执行自动实时监控、告警和通知操作,帮助用户实时掌握通过ELB负载的运行情况。 云监控服务不需
"name": "https_certificate", "domain": "www.elb.com", "description": "description for certificate", "tenant_id": "0d0bf0e8fb564cc9abbe526dbdca9248"
独享型负载均衡实例规格 独享型负载均衡支持按弹性规格和固定规格两种规格进行购买,两种规格对比项如表1,请您根据自身业务规划选择实例规格。 表1 独享型负载均衡规格对比 规格对比项 弹性规格 固定规格 适用场景 业务用量波动较大的场景 资源使用具有临时性和突发性 业务用量较为稳定的场景
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
enable_whitelist Boolean 是否开启访问控制开关。 true:打开 false:关闭 whitelist String 白名单IP的字符串。 请求示例 请求样例 查询白名单详情 GET https://{Endpoint}/v2.0/lbaas/whitelists/
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted