检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
在“基本信息”页签下,查看服务器组基本信息和健康检查配置,包括名称、ID、后端协议和健康检查的详细配置信息。 在“后端服务器”页签下,查看服务器组中已添加的后端服务器资源。 在“关联资源”页签下,查看服务器组已关联的资源,包括负载均衡器、监听器和转发策略。 删除后端服务器组 如果后端
您可以对后端服务器组开启修改保护功能,防止因误操作导致后端服务器组的配置被修改或后端服务器组被删除。 后端服务器组开始修改保护后,您将无法对后端服务器组执行编辑和配置健康检查,也无法管理组内的后端服务器。 进入后端服务器组列表页面。 在后端服务器组界面,单击需要配置修改保护的后端服务器组名称。 在后端
企业只有了解组织中哪些方面产生了成本,才能正确地控制和优化成本。成本中心支持使用“成本分析”的汇总和过滤机制可视化企业的原始成本和摊销成本,从而通过各种角度、范围分析成本和用量的趋势及驱动因素。 企业还可以通过成本中心的“成本监控”,及时发现计划外费用,做到成本的可监控、可分析和可追溯。 详细介绍请参见通
更换后端服务器组 操作场景 本章节指导用户更换在监听器下配置的默认转发后端服务器组。 ELB四层监听器(TCP/UDP/TLS)将客户端请求转发到默认后端服务器组。 ELB七层监听器(HTTP/HTTPS/QUIC)将客户端的请求按转发策略的优先级进行转发。若用户未自定义转发策略,客户端请求将被转发至默认后端服务器组。
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
project_id String 参数解释:项目ID。 type String 参数解释:规格类别。 取值范围: L4和L7 表示四层网络型和七层应用型flavor。 L4_elastic和L7_elastic 表示弹性扩缩容实例的下限规格。已废弃,请勿使用。 L4_elastic_max、L7_elastic_max
式。更多后端服务器分配权重设置,请见后端服务器的权重。 慢启动能够实现业务的平滑启动,完美避免业务抖动问题。 仅独享型负载均衡支持HTTP和HTTPS类型的后端服务器组开启慢启动功能。 后端服务器在以下两种状态会退出慢启动状态。 到达已设定的慢启动时间。 慢启动时间内后端服务器变为异常。
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
"lb_algorithm": "ROUND_ROBIN", "protocol": "HTTP", "description": "", "admin_state_up": true, "loadbalancers": [
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted