检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
实例的配置项差异。 检查应用程序读取/写入地址 主从切换和故障转移不会切换实例的读写地址,需要检查应用程序的读写地址是否符合预期。 故障转移期间,可以配置应用程序使用新的主实例的读写地址,等待故障实例重建完成后重新配置应用程序的读写地址。 检查从实例写转发配置,请参考步骤3:开启写转发。
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
具体可参考设置TaurusDB安全组规则完成配置。 图4 数据库代理配置 表4 数据库代理 参数 描述 数据库代理 默认开启。开启代理后您可以使用代理地址连接到数据库。 说明: 购买实例时如需开通数据库代理功能,请在管理控制台右上角,选择“工单 > 新建工单”,提交申请。 实例创建成功后也可
具体可参考设置GaussDB(for MySQL)安全组规则完成配置。 图4 数据库代理配置 表4 数据库代理 参数 描述 数据库代理 默认开启。开启代理后您可以使用代理地址连接到数据库。 说明: 购买实例时如需开通数据库代理功能,请在管理控制台右上角,选择“工单 > 新建工单”,提交申请。 实例创建成功后也可
完成设置。 具体可参考设置安全组规则完成配置。 图4 数据库代理 表4 数据库代理 参数 描述 数据库代理 开启数据库代理后您可以使用代理地址连接到数据库。 当节点数量等于1时,不支持开启数据库代理。 说明: 购买实例时如需开通数据库代理功能,请在管理控制台右上角,选择“工单 >
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted