检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Elasticsearch集群词库介绍 背景信息 云搜索服务的词库用于对文本进行分词,使得一些特殊词语在分词的时候能够被识别出来,便于根据关键词搜索文本数据。例如,根据公司名称来查询,如“华为”;或者根据网络流行词来查询,如“喜大普奔”。也支持基于同义词词库,根据同义词搜索文本数据。
OpenSearch集群词库介绍 背景信息 云搜索服务的词库用于对文本进行分词,使得一些特殊词语在分词的时候能够被识别出来,便于根据关键词搜索文本数据。例如,根据公司名称来查询,如“华为”;或者根据网络流行词来查询,如“喜大普奔”。也支持基于同义词词库,根据同义词搜索文本数据。
0, "current" : { "files_count" : 0, "finished_files_count" : 0, "bytes" : 0,
管理和分析。 服务迁移上云:企业可以将自建的Elasticsearch服务迁移至云平台,以利用云服务的弹性扩展、简化维护和成本效益。 变更服务提供商:对于当前使用第三方Elasticsearch服务的企业,若出于成本、性能或其他战略考量,希望更换至华为云等其他服务提供商,Reindex
recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure security
小或文档数等信息的变化来自动触发周期性的管理操作。通过ISM插件可以自定义索引策略,实现自动处理索引的滚动或删除,以优化集群搜索性能或降低存储成本。ISM的使用流程: 创建生命周期策略:在Kibana创建索引的生命周期策略Policy。 索引关联生命周期策略:将索引关联上创建的生命周期策略,生成索引策略。
为大规格,常用于如下场景: 当现有的Logstash节点处理能力达到瓶颈,无法满足日益增长的数据量时,升级节点规格可以提供更多的计算资源和存储空间,从而提高整体的处理性能。 在流量高峰期,为了及时处理增加的数据,可以通过升级Logstash节点规格来提高处理能力。 变更节点规格 前提条件
recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure security
recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure security
recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure security
recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure security
如果集群长期处于高负载状态,则集群会存在写入、查询缓慢等情形,建议根据业务需要升级节点规格或者对集群节点的数量和存储容量进行扩容,使集群更好的满足业务需求。升级节点规格、扩容节点数量和节点存储容量的指导请参见扩容Elasticsearch集群。 查询集群是否存在任务堆积。 方式一:在Kibana的“Dev
recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure security
recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure security
recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure security
recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure security
recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure security
recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure security
recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure security
recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure security