检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
测试执行机规格 通用计算增强型 | c6.xlarge.2 | 4vCPUs | 8GB 测试命令 redis-benchmark -h {IP} -p {Port} -a {password} -n {nreqs} -r {randomkeys} -c {connection} -d
String Key名称。 type String Key类型。 shard String 大key所在的分片,仅在实例类型为集群时支持,格式为ip:port。 db Integer 大key所在的DB。 size Long Key的value大小。 unit String 表示key
String Key名称。 type String Key类型。 shard String 大key所在的分片,仅在实例类型为集群时支持,格式为ip:port。 db Integer 大key所在的DB。 size Long Key的value大小。 unit String 表示key
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
Cluster集群实例配置 #redis cluster节点连接信息 spring.redis.cluster.nodes=<ip:port>,<ip:port>,<ip:port> #redis cluster密码 spring.redis.password=<password> #redis
r集群分片的主备节点,请在实例详情的“节点管理”(或“分片与副本”)页签中操作,具体操作可参考管理DCS实例分片与副本。 实例主备切换后,IP地址不变,不需要切换客户端连接地址。 约束与限制 只有当DCS缓存实例处于“运行中”状态,才能执行此操作。 主备节点切换期间,业务会发生少
"65382450e8f64ac0870cd180d14e684b", "name": "XXXXX", "description": "", "links": { "next": null,
如果实例与客户端的安全组不同,还需要修改安全组配置,放开端口访问。具体修改方法,请参考如何配置安全组。 自定义端口 创建Redis 4.0/5.0/6.0基础版实例时,可在"IP地址"配置项后输入指定的端口号,如不指定,则为默认的端口号6379。 修改端口 Redis 4.0/5.0/6.0基础版实例创建后,如需修改端口号,可按如下步骤操作:
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
String Key名称。 type String Key类型。 shard String 大key所在的分片,仅在实例类型为集群时支持,格式为ip:port。 db Integer 大key所在的DB。 size Long Key的value大小。 unit String 表示key
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted