检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
zh-cn 表3 请求Body参数 参数 是否必选 参数类型 描述 flavor_ref 是 String 数据库代理规格码,获取方法请参见查询数据库代理规格信息返回的spec_code字段。 node_num 是 Integer 数据库代理节点数,取值整数2-16。 proxy_name
zh-cn 表3 请求Body参数 参数 是否必选 参数类型 描述 flavor_ref 是 String 数据库代理规格码,获取方法请参见查询数据库代理规格信息返回的spec_code字段。 node_num 是 Integer 数据库代理节点数,取值整数2-16。 proxy_name
动加入设置。如果需要新节点自动加入代理,请在“数据库代理”页面进行设置。 由于变配涉及到删减只读节点,为避免业务受影响,建议不要使用读内网地址连接应用。 增删只读节点功能打开后会将代理实例的路由模式调整为负载均衡,请谨慎操作。 手动创建的只读节点会受到设置的自动策略影响。比如:当
动加入设置。如果需要新节点自动加入代理,请在“数据库代理”页面进行设置。 由于变配涉及到删减只读节点,为避免业务受影响,建议不要使用读内网地址连接应用。 增删只读节点功能打开后会将代理实例的路由模式调整为负载均衡,请谨慎操作。 手动创建的只读节点会受到设置的自动策略影响。比如:当
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted