检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
即协议返回码和后端返回码一致; ELB和后端主机连接异常或者超时等,ELB会填充后端返回码为502或者504,然后转发给客户端; 监听器配置异常或者客户端请求格式和内容异常时,ELB会直接返回4xx或者502返回码,不继续向后端主机转发请求,即有协议返回码,无后端返回码。 父主题:
的权限,与各个接口所对应的授权项相对应,只有发起请求的用户被授予授权项所对应的策略,该用户才能成功调用该接口。例如,用户要调用接口来查询云服务器列表,那么这个IAM用户被授予的策略中必须包含允许“elb:servers:list”的授权项,该接口才能调用成功。 支持的授权项 策略
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
"expire_time": "2045-11-17 13:25:47", "description": "description for certificate", "domain": "www.elb.com",
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
"name": "https_certificate", "domain": "www.elb.com", "description": "description for certificate", "tenant_id": "0d0bf0e8fb564cc9abbe526dbdca9248"
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
务监控资源的使用情况,确定成本偏高的原因,然后采取针对性的优化措施。 监控资源利用率,评估当前配置是否过高。例如:实例新建连接数使用率。 监控闲置的资源,避免浪费。例如:未绑定的EIP等。 计费模式优化 不同类型的业务对资源使用周期有不同的要求,为每一类业务确定合适的计费模式,灵活组合以达到最优效果。
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
应用型监听器 添加HTTP监听器 添加HTTPS监听器 添加QUIC监听器 转发策略 高级转发策略 配置HTTP/HTTPS头字段 开启HTTP/2提升通信效率 父主题: 监听器
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
访问控制 访问控制策略 访问控制IP地址组 父主题: 安全管理
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted