检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
步骤一:购买实例 购买 按需计费实例 购买包年/包月实例 购买Serverless实例
MySQL)可以有效地降低应用响应时间、节省公网流量费用。 虚拟私有云(VPC) 对您的GaussDB(for MySQL)数据库实例进行网络隔离和访问控制。 对象存储服务(OBS) 存储您的GaussDB(for MySQL)数据库实例的自动和手动备份数据。 云监控服务(Cloud Eye)
在“实例管理”页面,选择指定的实例,单击实例名称,进入实例概览页面。 在左侧导航栏中选择“参数修改”,在“参数”页签单击“导出”。在弹出框中,填写文件名称,单击“确定”。此操作将该实例对应的参数模板信息(参数名称,值,描述)导出到Excel文件中,方便用户查看并分析。 图1 导出实例参数模板 文件名称长
单击“备份恢复管理”,在“数据库同区域备份”页面查看目标实例的备份大小。 未开通跨区域备份白名单 单击“备份恢复管理”,查看目标实例的备份大小。 单击“备份恢复管理”,在“数据库跨区域备份”页面,单击“查看跨区域备份”,查看目标实例的备份大小。 父主题: 数据备份
只读节点 GaussDB(for MySQL)只读节点简介 GaussDB(for MySQL)实例添加只读节点 GaussDB(for MySQL)只读节点升主节点 删除GaussDB(for MySQL)只读节点 退订GaussDB(for MySQL)只读节点
(for MySQL)实例,同时假设ECS和GaussDB(for MySQL)实例在同一个VPC中。部署架构如图1所示。 如果自建MySQL和GaussDB(for MySQL)实例不在同一个VPC内,相比于相同VPC的情况,需要配置两个VPC的对等连接,部署架构图如图2所示。
复制当前实例的参数模板 登录管理控制台。 单击管理控制台左上角的,选择区域和项目。 在页面左上角单击,选择“数据库 > 云数据库 GaussDB(for MySQL)”。 在“实例管理”页面,选择指定的实例,单击实例名称,进入实例概览页面。 在左侧导航栏中选择“参数修改”,在“参数”页签单击“复制”,
备份过程会占用少量CPU内存资源。因此在备份期间,实例主节点的CPU使用率和内存使用率,会有一点升高,属于正常现象,存储层的备份用户侧不感知。最终的备份文件将以多个数据文件形式存储在对象存储服务(OBS)中,不会占用实例的磁盘空间。 父主题: 数据备份
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted