Halaman ini belum tersedia dalam bahasa lokal Anda. Kami berusaha keras untuk menambahkan lebih banyak versi bahasa. Terima kasih atas dukungan Anda.
A-E
- A
A record
See Address record
AAD
ABAP Central Services
ASCS instance includes the Enqueue and Message servers. An SAP NetWeaver system contains only one ASCS instance.
Abnormal Traffic Inspection & Control System
The Abnormal Traffic Inspection & Control System (ATIC) consists of a detection center, a cleaning center, and a management center. The detection center detects optical splitting or mirroring traffic. When it detects a traffic abnormality in a defended IP address, it immediately notifies the management center which in turn requests the cleaning center to divert the abnormal traffic.
access control list
A group of IP addresses or IPv4 CIDR blocks from which users are allowed to access HUAWEI CLOUD.
access frequency control
Frequency of access to an interface is limited by an access control policy.
access key
Comprises an access key ID (AK) and secret access key (SK) and is used as a long-term identity credential to sign your requests for HUAWEI CLOUD APIs. AK is used together with SK to sign requests cryptographically, ensuring that the requests are secret, complete, and correct. You can create and manage access keys on the My Credentials > Access Keys page. Alternatively, you can create an access key by calling an API. For account security purposes, do not share your access keys with anyone.
account
Created automatically upon successful registration with HUAWEI CLOUD. The account has full access permissions for all of its cloud services and resources.
account cracking
Account cracking refers to the intruder behavior of guessing or cracking the password of a system account.
Accurate Access Protection
Detection policies can be customized for common fields (such as URL, IP, Params, Cookie, Referer, User-Agent and Header) in HTTP requests. In addition, multi-logic detection policies are supported.
ACK flood
See ACK flood attack
ACK flood attack
In an ACK flood attack, the attacker sends a large number of ACK packets to the target server through a botnet. As a result, the packets cause link congestion with an excessive load, or requests with changing source addresses or destination ports sent at extremely high rates cause an abnormality in the forwarding device and then lead to network breakdown, or processing capability of the target server is exhausted and the server fails to provide services normally.
ACL
Address record
Address records (A records) are used to specify IP addresses for host names (or domain names). You can use A records to make different domain names point to different IP addresses.
Advanced Anti-DDoS
Advanced Anti-DDoS is an advanced defense service based on anti-DDoS traffic cleaning devices and a big data operation platform. It hides and protects users' source sites by forwarding traffic.
Advanced Encryption Standard
The AES algorithm is a symmetric grouped password algorithm and one of the most popular symmetric key encryption algorithms released by the U.S. National Institute of Standards and Technology (NIST) on November 26, 2001.
AES
See Advanced Encryption Standard
AI Engine
An AI engine is a framework that allows you to develop machine learning and deep learning model training jobs, such as TensorFlow and MXNet.
AK/SK
See access key
Alarm
An alarm is triggered based on an alarm rule. The alarm rule defines the actions that the system takes if a parameter value hits the specified threshold.
AM
anti-crawler
WAF has a big crawler characteristics database used to detect crawlers (such as engine crawlers, script crawlers, and scanners).
AOS
See Application Orchestration Service
Apdex
Apdex is an open standard developed by the Apdex alliance. It defines a standard method to measure application performance. The Apdex standard converts the application response time into user satisfaction with application performance in the range of 0 to 1.
Application
You can put services of the same type into the same application for better performance management. For example, you can put accounts, products, and payment services into the Mall application.
Application
See Application
Application
An application is a service system with functions and consists of one or more application components.
Application Component
Application Component
An application component implements a service feature of an application. It is in the form of code or software packages and can be deployed independently.
Application Orchestration Service
Application Orchestration Service (AOS) enables enterprises to automate application cloudification. By orchestrating mainstream cloud services of HUAWEI CLOUD, you can create, replicate, and migrate your applications and provision required cloud resources with a few clicks.
Application Service Mesh
HUAWEI CLOUD Application Service Mesh (ASM) is a high-performance, high-reliability, and easy-to-use service mesh in infrastructure mode. It enables you to manage and monitor service traffic, ensure secure access, and perform grayscale releases for stable service iteration. In addition, ASM has excellent compatibility. Its control plane and data plane are fully compatible with the open-source Istio. ASM also seamlessly interconnects with HUAWEI CLOUD Cloud Container Engine (CCE), an enterprise-class Kubernetes cluster service, to provide you with out-of-the-box features.
ApplicationMaster
Manages the life cycle of applications.
AS
See Auto Scaling
AS configuration
An AS configuration is a template listing specifications for the instances to be added to an AS group.
AS group
An AS group consists of a collection of instances that apply to the same scenario. It is the basis for enabling or disabling AS policies and performing scaling actions.
AS policy
An AS policy defines the condition to trigger a scaling action and the operation to be performed in a scaling action. When the trigger condition is met, the system automatically triggers a scaling action.
ASCS
ASM
ASR
See Automatic Speech Recognition
ASRC
See Automatic Speech Recognition Customization
asynchronous replication
After an application initiates a data update (including insert, delete, and modify data) request, Master commits data and returns a response to the application immediately. With asynchronous replication, Master does not need to wait for Slave and data is asynchronously replicated from Master to Slave. Therefore, the performance is high, but data may be inconsistent.
ATIC
See Abnormal Traffic Inspection & Control System
Attaching a replication pair to a protected instance
Indicates to attach the two disks in a replication pair to the two servers in a protected instance.
Auto Scaling
Auto Scaling automatically adjusts resources to keep up with changes in demand based on pre-configured AS policies.
automated backup
RDS automatically creates full backups for DB instances. You can set the automated backup start time and backup retention period.
Automatic Speech Recognition
ASR converts audio recordings whose duration is within 1 minute and whose size is less than 4 MB into text.
Automatic Speech Recognition Customization
ASRC provides the Sentence Transcription and Long Audio Transcription functions. Sentence Transcription recognizes audio recordings with a shorter duration at a faster speed, and Long Audio Transcription performs well in recognizing audio recordings with a longer duration.
availability priority
During a primary/standby failover, if data is inconsistent between primary and standby DB instances and the synchronization delay is no more than 5 minutes, a failover is still performed to ensure service availability. If the delay is longer than five minutes, the failover is not performed and database services are stopped to prevent data loss.
availability zone
An AZ contains one or more physical data centers. Each AZ has independent cooling, fire extinguishing, moisture-proof, and electricity facilities. Within an AZ, computing, network, storage, and other resources are logically divided into multiple clusters. AZs within a region are interconnected using high-speed optical fibers to support cross-AZ high-availability systems.
AZ
- B
backup
A process of creating data copies on backup media. If the source data is damaged or lost, the data copies can be used to restore the source data.
backup consistency
There are three types of backup consistency: Inconsistent backup: backs up files and disks in different points in time. Crash-consistent backup: captures data existing on disks upon backup and backs up files and disks at the same point in time, without backing up memory data and quiescing application systems. In such a manner, backup consistency of application systems is ensured. Though the application consistency is not ensured, disks, such as chkdsk, will be checked upon operating system re-startup to restore damaged data and log rollback will be performed on databases to keep data consistent. Application-consistent backup: backs up files and disks at the same point in time, including memory data, to ensure application system consistency.
Backup migration
Backup migration refers to one-time database migration or migration with minimal service interruption by uploading and restoring full and incremental database backups.
backup policy
A policy used to automatically back up data by specifying the backup time, backup period, retention rules, and other items. After a backup target is associated with a backup policy, the system will automatically back up data and delete expired backups according to the policy.
backup retention period
Retention period for automated backups. After the retention period expires, automated backups will be deleted automatically.
backup storage
The underlying storage resources used for storing backup data and logs of a database persistently.
Bandwidth
The bandwidth represents network usage, facilitating service charging.
bandwidth scaling
AS automatically adjusts the EIP bandwidth based on the configured bandwidth scaling policy.
Bare Metal Server
A Bare Metal Server (BMS) is a physical server that is dedicated for you on the cloud. It provides the excellent computing performance and data security needed for core databases, key application systems, high-performance computing (HPC), and Big Data services. With the high scalability offered by cloud resources, you can apply for and use BMSs flexibly.
Batch
Batch Service (Batch)
Batch Service (Batch) lets you to run large-scale batch computing jobs. Using Batch, you can manage your resources, schedule your jobs, and export the task run logs with ease.
Batch Service (ModelArts)
The batch services are used to process batch data stored in OBS buckets at a time.
BCS
BGP
bidirectional audit
Both requests to and responses from the database are audited.
black hole
A black hole is a status where a server detects zero access traffic from the Internet because Internet access to the server has been blocked.
Blacklist and Whitelist
The IP address whitelist is a list of trusted IP addresses and traffic from these IP addresses is not subject to attack detection. The IP address blacklist is a list of malicious IP addresses and traffic from these IP addresses is subject to actions specified in detection policies.
Block
The smallest logical unit of storage in HDFS. Each HDFS file is stored as one or more blocks. All blocks are stored on DataNodes.
Blockchain
In a narrow sense, a blockchain is a list of data records (called blocks) linked in chronological order using cryptography and a distributed ledger to prevent data tampering and forging. In a broad sense, the blockchain technology is a new distributed infrastructure and computing paradigm. Blockchain verifies and stores data using the special blockchain data structure, generates and updates data using distributed node consensus algorithms, secures data transmission and access using cryptography, and implements programming and data operation using smart contracts formed by automated scripts.
Blockchain Service
Blockchain Service (BCS) is a highly available and secure blockchain platform allowing enterprises and developers to conveniently create, deploy, and manage applications with the superb performance and cost-effectiveness of HUAWEI CLOUD.
Blue-Green Deployment
Blue-green deployment is a zero-downtime deployment mode. A new version of an application is deployed and tested in a production environment while the live environment continues to serve all production traffic. When you confirm that the new version is functioning properly, traffic is then distributed to the new version. At the same time, the old version is upgraded to the new version. Blue-green deployment allows you to quickly switch between the two versions to effectively prevent service disruption during deployment.
BMS
Boot File
A training job may have multiple code files. A boot file specifies the file from which the training job starts to run.
Border Gateway Protocol
The Border Gateway Protocol (BGP) is an inter-autonomous system routing protocol running over TCP. A BGP system is used to exchange routing information with another BGP system.
Bring Your Own License
If you have an OS or a software license (a license whose certified items include number of physical sockets and physical cores), you can migrate your services to the cloud platform using the BYOL feature. Then, you can continue to use your existing licenses without additional charges.
bucket
Buckets are containers for storing objects. A bucket name must be unique.
bucket policy
A group of control policies that accept or reject requests to access buckets, and control the permissions of one or more users to access buckets and objects in buckets.
Built-in Algorithms
Built-in algorithms are training code built in ModelArts that can be directly reused.
Business Warehouse on HANA
An SAP HANA application scenario where SAP HANA provides data analysis.
BWoH
See Business Warehouse on HANA
BYOL
- C
CA
Canary Release
A certain proportion of production traffic on the live network is distributed to a new version of the application to test the version's performance and detect faults while ensuring stable running of the system.
CBR
CBS
See Conversational Bot Service
CC attack
See challenge collapsar attack
CCE
CDM
CDM Cluster
See Cloud Data Migration Cluster
Cell
A {row, column} tuple exactly specifies a cell in HBase. Cell content is uninterpreted bytes.
Certificate Authority
As a trusted third party in e-commerce transactions, a CA is responsible for validity verification of a public key in a public key system.
Certificate Signing Request
A CSR is a file that needs to be submitted to a CA in order to get an SSL certificate. A CSR contains a public key and a distinguished name (DN). Typically, a CSR is generated by a web server, during which a pair of public and private keys is also created for encryption and decryption purposes.
challenge collapsar attack
A Challenge Collapsar (CC) attack is targeted at web servers or application programs by means of standard GET or POST requests used for obtaining information. If the requests involve Universal Resource Identifiers (URIs) of database operations or URIs consuming other system resources, server resources are exhausted and the target servers will be unable to respond normally.
Channel
A channel isolates the ledger data of a transaction from other transaction data in a consortium blockchain to ensure confidentiality. Each channel can be considered as a sub-blockchain and corresponds to a specific ledger. The ledger in a channel is invisible to other channels.
checkpoint
Checkpoints are criteria you define. CPTS uses them to check whether the content returned by servers is correct.
CLI
Cloud Backup and Recovery
Cloud Backup and Recovery allows users to back up cloud servers, disks, SFS Turbo file systems, and on-premises VMware virtual environments with ease. In case of a virus attack, accidental deletion, or software or hardware fault, data can be restored to any backup point.
Cloud Container Engine
Cloud Container Engine (CCE) is a highly reliable and high-performance service that allows enterprises to manage containerized applications. With support for Kubernetes-native applications and tools, CCE makes it simple to set up an environment for running containers on the cloud.
Cloud Data Migration
Cloud Data Migration (CDM) enables data migration among various data sources. It allows you to migrate data between public cloud services or between the public cloud and local service systems.
Cloud Data Migration Cluster
A CDM cluster is a CDM instance that you have purchased. It consists of one or multiple VMs. Data of different CDM clusters is isolated. You can purchase multiple CDM clusters to isolate data access permissions among different departments.
cloud database
Service-oriented database services such as Relational Database Service (RDS) and Document Database Service (DDS) provided by cloud service providers.
Cloud Eye
Cloud Eye is a multi-dimensional resource monitoring platform. You can use Cloud Eye to monitor the utilization of service resources, track the running status of cloud services, configure alarm rules and notifications, and quickly respond to resource changes.
Cloud Performance Test Service
Cloud Performance Test Service (CPTS) provides performance tests on cloud applications built based on HTTP, HTTPS, TCP, or UDP.
Cloud Search Service
Cloud Search Service is a fully managed, distributed search service. It is fully compatible with open-source Elasticsearch and provides users with structured and unstructured data search, statistics, and report capabilities.
Cloud Server Backup Service
Cloud Server Backup Service (CSBS) enables backup of entire Elastic Cloud Servers (ECSs), including VM specifications, system disks, and data disks. When an ECS becomes faulty, data can be restored from consistency backups of multiple Elastic Volume Service (EVS) disks to ensure maximum data security and accuracy.
cloud service provider
A company or an organization that provides cloud computing services.
Cluster
See Cluster
Cluster
A cluster is a group of nodes that can be physical servers or virtual machines with Kubernetes installed.
cluster (CSS)
Cloud Search Service provides functions on a per cluster basis. A cluster represents an independent search service that consists of multiple instances.
CMDI
CMK
code injection
Code injection is an attack that exploits logic defects of web applications in input validation or code execution vulnerabilities of some script functions.
CODEI
See code injection
cold backup
A cold backup is performed when a system is stopped or being maintained. The backup data is completely the same as the data in the system at the point in time.
Column (MRS)
A column is one of HBase table dimensions. A column name has the form "family:label" where family and label can be arbitrary byte arrays. A table enforces its set of families (called "column families"). Each column in an HBase table belongs to a column family.
Column Family
A column family is a predefined arbitrary set of columns and stored in HBase Schema. To create some columns in a column family, you should create the column family first. A column family regroups data of a same nature in HBase and has no constraint on the type. Every row of data in a column family is physically stored on the same server. Each column family is as an attribute, such as a compression package, a timestamp, block cache, and so on.
command injection
Exploiting web application interfaces allowed to invoke system commands, attackers use commands generated at the server end by command splicing and blacklist bypassing to attack services.
Command Line Interface
A means of communication between a program and its user, based solely on textual input and output.
Common Vulnerabilities and Exposures
Common Vulnerabilities and Exposures (CVE) is a list of common identifiers for publicly known cyber security vulnerabilities. Use of CVE Identifiers, or "CVE IDs" which are assigned by CVE Numbering Authorities (CNAs) from around the world, ensures confidence among parties when used to discuss or share information about a unique software or firmware vulnerability, provides a baseline for tool evaluation, and enables data exchange for cybersecurity automation.
component
A component is a carrier of user data.
Computation Unit
Measurement unit of computing resources. A CU includes a 1-core CPU and 4 GB memory.
compute resource
A compute resource is the cloud service resource required for running node tasks such as Spark, MRS, and Hive node tasks in a job. Compute resources can be created on demand for cost saving.
config
config is a special mongod that stores metadata of a DB instance. config is deployed as a replica set. To create a DB instance or modify metadata of a DB instance, config must be available.
Connection Address
An IP address, which is used for the DAS service to connect to the database.
Connector
A connector is a built-in object template used for connecting to a data source. Currently, CDM uses OBS, MRS, and databases as connectors. New connectors can be added to CDM as well.
Consulting Services
Consulting services are offered on the Marketplace as products. This type of products is not traded on the Marketplace. The Marketplace only provides links to access the products on sellers' official websites.
Consumer Group
A consumer group is a group of consumer clients with certain characteristics. Messages in a queue can be retrieved by multiple consumer groups.
Container
See Container
Container
A container is a running instance created from a container image. Multiple containers can run on one node.
Containerized Application
A containerized application can be created using a container image or a template. Each containerized application contains one or multiple containers.
Content Moderation
Content Moderation uses the deep learning technology to automatically detects illegal content in images, videos, and text files, making content legality reviews more efficient and labor-saving.
Conversational Bot Service
Conversational Bot Service (CBS) is a cloud service developed based on artificial intelligence (AI) technologies for enterprise application scenarios.
cooldown period
Cooldown period specifies how long any alarm-triggered scaling action will be disallowed after a previous scaling action is complete. This cooldown period does not apply to scheduled or periodic scaling actions.
Copyrighted Image Search
ImageSearch can quickly locate images being used in large-scale galleries that infringe on copyrights, helping protect your rights and interests
Core Node
A core node in a MapReduce Service cluster processes data and stores process data in the HDFS.
CORS
See cross-origin resource sharing
CPTS
See Cloud Performance Test Service
crawler
A crawler is a program or script used for automatically obtaining information from World Wide Web.
Creating an Instance
ImageSearch allows you to create an image search instance based on your needs
CRM
See Customer Relationship Management
cross-origin resource sharing
Cross-origin resource sharing (CORS) is a mechanism that allows many resources (such as, fonts and JavaScript) on a web page to be requested from another domain.
cross-site request forgery
Cross-site request forgery is another common web attack. Attackers forge data for targets to access. If the browsers of the targets maintain the authentication sessions with the destination sites, the targets unknowingly send requests forged by attackers to the destination sites when accessing the attacker-forged pages or URLs.
cross-site scripting
XSS is a type of web security vulnerability used by attackers to steal user information. Using the vulnerability, attackers inject malicious code into web pages. The code is executed to steal user information when users browse the web pages.
CSP
CSR
See Certificate Signing Request
CSRF/XSRF
See cross-site request forgery
CSS
CU
See Computation Unit
Customer
A customer, also called an end user, is a natural person, legal person, or an organization that purchases Marketplace products or HUAWEI CLOUD services.
Customer Master Key
A CMK is a key created with KMS and used to encrypt and protect DEKs.
Customer Relationship Management
To improve core competitiveness, CRM uses information technologies and Internet technologies to coordinate the interaction between enterprises and customers on sales, marketing, and services, thereby improving enterprise management methods and providing personalized customer interactions and services.
CVE
- D
DAS
Data Admin Service
Data Admin Service (DAS) enables you to manage DB instances on a web console, making your database management easy, efficient, and secure. It supports functions such as basic SQL operations, advanced database management, and intelligent SQL tuning, meeting your service requirements for daily R&D, database O&M, database management, and security.
data connection
A data connection is a collection of information required for accessing data storage (computing) space, including the connection type, name, and login information.
Data Control Language
Statement used for setting or modifying the permission of a database user or role.
Data Definition Language (MRS)
A language used to define the data structure and database objects in the HiveQL set. It consists of three types of syntax: CREATE, ALTER, and DROP. Derived from the Conference on Data Systems Languages (Codasyl) model, the DDL has become a subset of SQL.
Data disk image
A data disk image contains service data. It can be used to create EVS disks during ECS creation, or be used to create EVS disks that are attached to ECSs. Through data disk images, you can migrate your service data to the cloud.
Data Encryption Key
A DEK is used to encrypt users' data.
Data Encryption Workshop
Data encryption Workshop (DEW) is a full-stack data encryption service in the cloud. It covers Key Management Service (KMS), Key Pair Service (KPS), and Dedicated HSM. DEW uses hardware security modules (HSMs) to protect the security of your keys, and can be integrated with other services to meet even the most demanding scenarios.
Data Express Service
Data Express Service is a massive data transmission solution. It allows a large amount of data to be transmitted from physical storage media, including Teleports and hard disks (such as external USB flash drives, SATA disks, and SAS disks) to HUAWEI CLOUD.
Data Ingestion Service
Data Ingestion Service (DIS) addresses the challenge of transmitting data within the cloud and from outside the cloud to inside the cloud. With DIS, you can build custom applications to process or analyze streaming data for specific needs.
Data Lake Factory
DLF is a cloud service that provides one-stop Big Data development environment and has full-hosting Big Data scheduling capabilities. In the Big Data development environment, users can complete an entire data processing and analysis procedure from data modeling, data integration, script development, workflow orchestration, to O&M monitoring, greatly reducing the threshold for using Big Data.
Data Lake Insight Service
Data Lake Insight (DLI) is a serverless big data compute and analysis service that is fully compatible with Apache Spark and Apache Flink ecosystems and supports batch streaming. With multi-model engines, enterprises can use SQL statements or programs to easily complete batch processing, stream processing, in-memory computing, and machine learning of heterogeneous data sources.
Data Lake Visualization
Data Lake Visualization (DLV) is a one-stop data visualization platform that adapts to various data sources in the cloud or on-premises. By dragging and dropping 2D and 3D visual components on DLV, you can quickly customize and create a data screen of your own.
Data Manipulation Language (MRS)
An instruction set for accessing objects in databases. The core instructions in this set are INSERT, UPDATE, and DELETE, which respectively mean inserting, updating, and deleting. These instructions are indispensable for developing data-centered applications.
Data Manipulation Language (DLI)
An instruction set used for accessing data for database objects.
Data Plane Development Kit
A collection of development platforms and interfaces for quickly processing data packets. DPDK runs on Intel x86 platforms.
data record
A data record is the unit of data stored in a DIS stream. A data record is composed of a sequence number, partition key, and data blob. Data blobs are key data added by data producers to DIS streams. The payload of a data blob can be up to 1 MB before Base64 encoding.
data replication
In an HA architecture, data committed to a primary instance will be replicated to a standby instance. Data replications come in three types: fully synchronous replication, semi-synchronous replication, and asynchronous replication.
Data Replication Service
Data Replication Service (DRS) is a stable, efficient, and easy-to-use cloud service for database online migration and synchronization. It simplifies data transmission processes and reduces transmission costs.
data screen
A data screen serves as a dashboard generated to present data on DLV. It is also called a visualization project, visual application, or screen project. On this screen, data is converted to various charts or maps and presented to users in real time.
Data Warehouse (DLF)
A data warehouse is a collection of data that is topic oriented, integrated, and stable, and can reflect historical changes. It is used for management decision-making. A DIS data warehouse refers to a data warehouse on the Huawei cloud, such as DWS, DLI, and MRS Hive.
Data Warehouse (SAP HANA)
An integration center that stores a large amount of data. DWH is a core component of business intelligence (BI), which allows carriers to perform intelligent business analysis on users based on the massive user data stored in the data warehouse.
Database
A database is a collection of related data. Serving various applications, the data is structured and has no harmful or unnecessary redundancy. The data is stored separately from the relevant programs. You can use a common and controllable method to insert new data into the database in addition to modifying and searching the data in the database.
database administrator
A person who is responsible for managing databases. A DBA uses dedicated software to store and organize data. Their responsibilities include but are not limited to capacity planning, installation, configuration, database design, migration, performance monitoring, security, troubleshooting, and data backup and restoration.
database administrator account
A database administrator account is different from a user cloud account and used only within the RDS system to control access to RDS DB instances. You can use the database administrator account to access DB instances. For example, when you are creating a MySQL DB instance, the administrator account root is created by default and you can specify the root password. After the DB instance is created, you can connect to it using the root account. You can also create additional database accounts as needed.
database master password
A string that defines the password for the database master user. The database master password is a string of 8 to 32 characters. It must contain uppercase letters, lowercase letters, digits, and special characters. You can use the following special characters: ~!@#%^*-_=+?
database migration
Database operation and maintenance (O&M) activities aiming to change the database platform, including migration to a new server or a new DB engine. Migration from on-premises databases to the cloud is common.
Database Security Service
The Database Security Service (DBSS) is a security service that protects databases on clouds. Based on the reverse proxy and machine learning technologies, it provides functions such as data masking, database auditing, sensitive data discovery, and injection attack prevention.
database storage
The underlying storage resources used for storing data and logs of a database permanently.
database synchronization
A process of establishing consistency among data from a source database to a target, automatically copying changes back and forth.
database type
Database types are classified into relational databases and non-relational databases.
database user
A user that accesses DDS. Currently, the default username is rwuser.
DataNode
DataNodes, usually one per node in the HDFS cluster, manage storage attached to the nodes that they run on.
Dataset
A dataset is sample data stored in an OBS bucket and used for training models. ModelArts can manage the versions of datasets and switch different versions in different scenarios.
DB
See Database
DB connections
The number of client sessions that are connected to a DB instance.
DB engine
A DB engine is vital for storing, processing, and protecting data. It can be used to control access permissions and process transactions rapidly. Each DB instance runs a DB engine.
DB instance
A DB instance is an isolated database environment in the cloud. It is a basic building block of RDS. A DB instance can contain multiple user-created databases. You can access your DB instance by using the same tools and applications that you use with a standalone DB instance.
DB instance class
The DB instance class determines the compute and memory capacity of a DB instance. You can change the CPU or memory of an available DB instance by changing its DB instance class.
DB instance ID
A DB instance ID uniquely identifies a DB instance in a region.
DB instance lifecycle
A DB instance lifecycle starts from the time when the DB instance is created to the time when the DB instance is deleted. During a DB instance lifecycle, you can back up and restore data, change instance classes, scale up storage space, and reboot or delete the instance.
DB parameter group
A database parameter group functions as a container for engine configuration values that can be applied to one or more DB instances. If users create a DB instance without specifying a DB parameter group, the default parameter group is used. The default parameter group contains the default values of the engine and database system optimized for the running DB instances. If users want their DB instances to run with their self-defined engine configuration values, they can simply create a new database parameter group, modify certain parameters, and associate the new DB parameter group to a DB instance. Once associated, all DB instances that use this particular DB parameter group get all the parameter updates to that DB parameter group.
DB parameter template
A database parameter template functions as a container for engine configuration values that can be applied to one or more DB instances. If you create a DB instance without specifying a parameter template, the default parameter template is used. Each default parameter template contains database engine defaults and RDS system defaults. You can also create your own parameter template where you choose your own parameter settings and apply the parameter template to DB instances. If you update parameters in a parameter template, the changes apply to all DB instances that are applied with the template.
DBA
DBSS
DCL
DDL (MRS)
See Data Definition Language (MRS)
DDM
See Distributed Database Middleware
DDM instance
A DDM instance is the minimum resource unit of DDM, which runs on an ECS. DDM instances currently support three types of specifications, including 8 vCPUs | 16 GB, 16 vCPUs | 32 GB, and 32 vCPUs | 64 GB. You can apply for suitable DDM instances according to service requirements.
DDoS attack
See distributed denial of service attack
DDS
Dedicated Computing Cluster
Dedicated Computing Cluster (DCC) provides dedicated, physically isolated computing resource pools on HUAWEI CLOUD, allowing you to use physical computing devices and resources exclusively.
Dedicated Host
A Dedicated Host (DeH) is a physical server fully dedicated for your own services. DeH allows you to ensure security and performance by keeping compute resources isolated.
DeH
See Dedicated Host
DEK
Delivery Method
Method of delivering Marketplace products, such as images, software as a service (SaaS), consulting services, licenses.
DES
Destination job configuration
During job creation, a destination link specifies the data source where the data is to be loaded, for example, a table or directory. The destination job parameter settings vary with destination links. You can set related parameters in the destination job configuration.
Destination server
A destination server refers to the destination server to which a source server is migrated in a server migration task. In SMS, a destination server is an ECS on HUAWEI CLOUD.
Detaching a replication pair from a protected instance
Indicates to detach the two disks in a replication pair from the two servers in a protected instance.
detection based on semantic analysis
A syntax tree is built based on the semantic context to determine whether a load is an attack load.
DEV
See Development
Development
A HANA development scenario where development engineers configure and verify the compatibility between application software and SAP HANA and continuously optimize the application software.
Development Environment
A development environment is an editor required for developing AI training jobs.
DEW
Direct Connect
A service that allows users to establish a high-speed, stable, secure, and dedicated network connection from data centers to the public cloud. It enables users to take full advantage of strengths of public cloud services while continue to use existing IT facilities, establishing a scalable and hybrid cloud computing environment.
DIS
Disabling protection
Can be performed after the data synchronization is complete. Once the protection is disabled, the data synchronization stops, and the protection status of the protection group changes to Stopped.
Disaster Recovery
The recovery of data, access to data and associated processing through a comprehensive process of setting up a redundant site (equipment and work space) with recovery of operational data to continue business operations after a loss of use of all or part of a data center. This involves not only an essential set of data but also an essential set of all the hardware and software to continue processing of that data and business. Any disaster recovery may involve some amount of down time.
Distributed Consensus
A majority of independent participants in a system need to achieve consensus on a transaction or operation, for example, verification of double-spending transactions, verification of transaction validity, and the decision on whether to write verified data to the existing ledger.
Distributed Database Middleware
Distributed Database Middleware (DDM) is designed to solve distributed expansion issues of databases. It breaks the capacity and performance bottlenecks of traditional databases to achieve high concurrent access to mass data.DDM uses the Huawei Relational Database Service (RDS) as the storage engine and provides full-lifecycle O&M management capabilities, such as automatic deployment, sharding, flexible scaling, and high availability.
distributed denial of service attack
A denial-of-service (DoS) attack (a flood attack) is an attempt to use up the network or system resources of a computer to temporarily interrupt or stop services on the computer, thereby causing users unable to access the services normally. A DDoS attack is one in which two or more compromised computers are used to attack a single target, thereby causing denial of service for users of the targeted computer.
Distributed Ledger
A distributed ledger is a database shared, replicated, and synchronized among network participants. It records transactions such as exchange of assets and data between network participants. Use of a distributed ledger eliminates the need for reconciliation, saving time and costs.
Distributed Message Service
Distributed Message Service (DMS) is a reliable, scalable, fully managed message queuing service that provides concurrent access at scale using the distributed, highly available cluster technology. DMS decouples components of a cloud application, delivering substantial cost benefits.
Distributed Message Service for Kafka
Distributed Message Service (DMS) for Kafka is a message queuing service based on Apache Kafka. This service provides Kafka premium instances. The computing, storage, and bandwidth resources used by an instance are exclusively occupied by the user. You can apply for instances as required and customize partitions and replicas for the topics in the instances. The instances can be used right out of the box, taking off the deployment and O&M pressure for you so that you can focus on developing your services.
Distributed Message Service for RabbitMQ
Distributed Message Service (DMS) for Kafka is a message queuing service based on Apache Kafka. This service provides Kafka premium instances. The compute, storage, and bandwidth resources used by your instances are exclusively occupied by you. You can apply for instances as required and customize partitions and replicas for the topics in the instances. The instances can be used right out of the box, taking off the deployment and O&M pressure for you so that you can focus on developing your services.
DLF
DLI
DLI Table
Table that stores data of DLI.
DLV
DML (MRS)
See Data Manipulation Language (MRS)
DML (DLI)
See Data Manipulation Language (DLI)
DMS
See Distributed Message Service
DMS for Kafka
See Distributed Message Service for Kafka
DMS for RabbitMQ
See Distributed Message Service for RabbitMQ
DN (MRS)
See DataNode
DNS
DN (VSS)
See Domain Name
document
An entity for Elasticsearch storage. Equivalent to the row in the RDB, the document is the basic unit that can be indexed.
Document Database Service
DDS is a database service compatible with the MongoDB protocol and is secure, highly available, reliable, scalable, and easy to use. It provides DB instance creation, scaling, redundancy, backup, restoration, monitoring, and alarm reporting functions with just a few clicks on the DDS console.
document type
Similar to the table in the RDB, the document type is used to distinguish between different data. One index can contain multiple document types. A document actually must be indexed to a document type inside an index.
Domain Name
Domain names refer to the names that are registered to domain name registrars by individuals or organizations, such as enterprises, governments, or non-governmental organizations. Domain names serve as the network addresses for the communication between enterprises or organizations on the Internet. Each domain name corresponds to an IP address.
domain name server
A domain name server (DNS) is a functional entity in the TCP/IP network. With deployment of the DNS, subscribers can access related servers using corresponding domain names. In the TCP/IP network, a domain name maps an IP address. Domain names are easier to remember but servers in the network communicate with each other using IP addresses. Therefore the DNS is used to convert domain names to corresponding IP addresses.
Domain Verification
Users' identity and other relevant information are verified.
DR
DR direction
Indicates the data replication direction. The data replication is from the source AZ to the target AZ when users create a protection group. After users perform a planned failover, the data replication is from the target AZ to the source AZ.
DR drill
Is to verify that a target server can take over services from a source server once a failover is performed.
DR site
A DR site is the data center that does not carry services when the production site works properly. It is used to back up data in real time. When the production site fails (planned or unexpected), the DR site can take over the services after a failover. It can reside in the same city as the service management center or in another city.
Driving License OCR
Driving License OCR automatically recognizes all information on the original page of driving licenses, and accurately extracts structured information such as name, gender, issue date, driving class, and validity period under complex conditions such as dark light, tilt, overexposure, anti-counterfeit watermarks, and shadow.
DRS
DWH
- E
Edge
Edges represent relationships in data models, such as friend relationships in the social network, user rating and purchase behavior in the e-commerce transaction network, cooperation relationships between authors of a paper, and index relationships between articles.
Edge Service
A model can be deployed as a service on an edge server, then the edge server provides the service to peripheral devices.
Elastic Cloud Server
An Elastic Cloud Server (ECS) is a computing server consisting of vCPUs, memory, image, and Elastic Volume Service (EVS) disks that allow on-demand allocation and elastic scaling. ECSs integrate Virtual Private Cloud (VPC), virtual firewalls, and multi-data-copy capabilities to create an efficient, reliable, and secure computing environment. This ensures stable and uninterrupted operation of services.
Elastic IP
An elastic IP address (EIP) can be bound to any ECSs in your account rather than a specified ECS. Different from a static IP address, when an ECS or its AZ is unavailable, its EIP can quickly redirect to the Internet IP address of any ECS in your account.
Elastic IP
An elastic IP address (EIP) can be bound to any ECSs in your account rather than a specified ECS. Different from a static IP address, when an ECS or its AZ is unavailable, its EIP can quickly redirect to the Internet IP address of any ECS in your account.
Elastic Load Balance
Elastic Load Balance (ELB) is a service that automatically distributes incoming traffic across multiple Elastic Cloud Servers (ECSs) to balance their service load. It enables you to increase service capabilities and fault tolerance of your applications.
Elastic Volume Service
The Elastic Volume Service (EVS) offers scalable block storage for servers. With high reliability, high performance, and rich specifications, EVS disks can be used for distributed file systems, development and test environments, data warehouse applications, and high-performance computing (HPC) scenarios to meet diverse service requirements. EVS disks are sometimes just referred to as disks.
Elasticsearch
Elasticsearch is an open-source system that provides both the search engine and NoSQL database functions. It is built based on Lucene and can be used for full-text search, structured search, and near real-time analysis.
Enabling protection
Can be performed after a protection group is created, data synchronization stops, or a failover is performed. Once the protection is enabled, the data synchronization starts, and the synchronization progress is displayed on the web page. This action affects all the protected instances in the protection group.
English Customs Form OCR
English Customs Form OCR coverts English text and digits from customs document images into editable text. English Customs Form OCR uses automatic locating and segmentation algorithms, distributed algorithm architecture, and deep learning method to correct errors. After large-scale training on characters and images, English Customs Form OCR can accurately recognize text.
enhanced backup
Enhanced backups support Instant Restore. Common backups do not support Instant Restore.
Enqueue Replication Server
ERS ensures high availability for ASCS instance and protects Message server and Enqueue server on ASCS instance.
Enqueue Server
Enqueue server is a special lock mechanism in the SAP system, which prevents a line of data from being simultaneously changed by two processes and ensures consistency in updating databases.
Enterprise Resource Planning
A company-wide computer software system that is used to manage and coordinate all the resources, information, and functions of a business from shared data stores.
Envelope Encryption
Envelope encryption is an encryption method that enables data encryption keys to be stored, transmitted, and used in "envelopes", unlike the CMK method that directly encrypts and decrypts data.
Environment
See Environment
Environment
Environment is a collection of infrastructures, covering computing, storage, and networks, used for application deployment and running. ServiceStage combines basic resources, such as Cloud Container Engine (CCE) and Elastic Cloud Server (ECS) and optional resources, such as Elastic Load Balance (ELB), Relational Database Service (RDS), and Distributed Cache Service (DCS) in the same VPC into an environment, such as the development environment, testing environment, pre-production environment, and production environment. Networks in an environment can communicate with each other. You can manage resources and deploy services by environment, simplifying infrastructure O&M.
ERP
See Enterprise Resource Planning
ERS
See Enqueue Replication Server
Event
An event is an input parameter for executing a function. For example, the parameter for pulling messages from a Distributed Message Service (DMS) queue, for calling an API, or for receiving messages from a Simple Message Notification (SMN) topic.
EVS
Executor
A process launched for an application on a worker node, that runs tasks and keeps data in memory or disk storage across them. Each application has its own executors.
Exeml
Auto Learning is the process of automating model design, parameter tuning and training, and model compression and deployment with the labeled data. The process is free of coding and does not require developers' experience in model development.
F-J
- F
Face Detection
Face Detection accurately locates faces in an image and identifies the size of each face. With Face Detection, you can detect front faces and side faces with different tilts in the image.
Face Label
Face Label clusters and labels faces with the combined functions of face detection, facial gesture recognition, facial and figure feature recognition, and face retrieval algorithms. Users benefit from the ability to retrieve faces by label in real time.
Face LiveDetect
Face LiveDetect detects the living figure in a video and the sequence of the figure's actions.
Face Recognition
Face Recognition is an intelligent service that uses computers to process, analyze, and understand facial images based on human facial features. It provides services through open Application Programming Interfaces (APIs). You can obtain the face recognition results by accessing and calling APIs in real time. It recognizes and compares faces automatically and provides you with the similarity degrees, thereby improving service efficiency.
Face Retrieval
Face Retrieval returns top N facial images that are most similar to the imported one.
Face Verification
Face Verification returns the similarity degree between two faces in two images by comparing the facial features.
failover priority
You can determine whether reliability or availability is given priority during a failover. By default, reliability is given priority.
failover (rds)
If an unexpected interruption occurs on a primary DB instance, RDS automatically switches to the standby DB instance to restore database operations quickly without manual intervention. The time required for completing a failover depends on the database activities and conditions when the primary DB instance became unavailable. The duration is usually from seconds to minutes. Large transactions or long restoration process may increase the failover duration.
Failover (SDRS)
The system forcibly sets services in the source AZ to the unavailable state and sets services in the target AZ ready-to-start. This action affects all the protected instances in the protection group. After the failover, you need to start the servers in the target AZ. In addition, data synchronization of the protection group stops after the failover. You need to enable protection to restore data synchronization.
fault retry
If a migration task fails, users can troubleshoot the issues and retry the migration task. In full migration, this function can reset and restart the full migration process. In incremental migration, this function can attempt to restore the synchronization between the source and target databases.
Feature Vectorization
ImageSearch extracts and vectorizes image features with deep learning algorithms to accelerate computing
federated identity authentication
A method to establish trust between an identity provider and HUAWEI CLOUD. Federated identity authentication enables users to access HUAWEI CLOUD through single sign-on (SSO).
federated user
Users who access HUAWEI CLOUD through federated identity authentication.
field
Minimum unit of a document. The field is similar to the column in the database.
Field Programmable Gate Array
A gate-level programmable component that implements complex combination or timing logic by using Verilog- or VHDL-based circuit design, synthesis, and placing and routing.
File System
A file system provides users with shared file storage service through NFS. It can be used to access network files remotely. After users create shared directories in the management console, the file system can be mounted to multiple ECSs and is accessible through the standard POSIX interface.
FPGA Accelerated Cloud Server
An elastic cloud server that is accelerated by field programmable gate arrays (FPGAs). It provides a tool and environment for developing and using FPGAs. With it, you can easily develop FPGA accelerators and deploy FPGA-based services, and provide easy-to-use, cost-effective, agile, and secure FPGA cloud services.
FRS
See Face Recognition
FS
See File System
full backup
A backup method used to back up all data space of Elastic Volume Service (EVS) disks used by a specific user.
full data migration
All data is migrated from a source database to a target during the database running process. If any changes occur on the source database during or after the migration, such as new data inserted to the source database, the changes will not be synchronized to the target database.
Full table scan
If a sharding column is not specified in SQL for a sharded table, SQL will be performed on all shards. Such a process is called a full table scan. You are advised to optimize SQL statements and specify a sharding column to avoid full table scans.
Full-ECS image
A full-ECS image is an image created from an entire Elastic Cloud Server (ECS), including its system disk and data disks, or an image created from a Cloud Server Backup Service (CSBS) backup. A full-ECS image contains the OS of the ECS, applications installed on the ECS, and all the data in the ECS disks.
fully synchronous replication
After an application initiates a data update (including insert, delete, and modify data) request, Master replicates the updated data to Slave and Slave writes the received data to relay logs and flushes it to disks. After Slave replays logs and commits transactions, it returns a successful message to Master. Master responds to the application only after receiving the message from Slave. Since data is synchronously replicated from Master to Slave, unavailability of Slave will affect operations on Master, and unavailability of Master will not cause data inconsistency.
Function
Function is a basic unit for resource scheduling and code running. It runs in response to specific conditions to achieve expected results. A group of functions can implement complex service functions by integrating event triggering and result output.
FunctionGraph
FunctionGraph hosts and computes functions in a serverless context. It automatically scales to suit fluctuations in resource demands during peaks and spikes while requiring no reservation of dedicated servers or capacities.
- G
GaussDB NoSQL
GaussDB NoSQL is a distributed, non-relational, multi-model NoSQL database service with decoupled compute and storage architecture from Huawei. This high availability database is secure and scalable, can be deployed, backed up, or restored quickly, and includes monitoring and alarm management.
GaussDB(for MySQL)
GaussDB(for MySQL) is a latest generation MySQL-compatible, enterprise-class distributed database service. It uses a decoupled compute and storage architecture and supports up to 128 TB of storage. With GaussDB(for MySQL), there is no need to deal with sharding, and no need to worry about data loss. It combines the performance and availability of commercial databases with the cost-effectiveness of open source databases.
General Image Search
ImageSearch allows you to search for exact/fuzzy match images from the specified library
General Table OCR
General Table OCR can extract text and the information about rows and columns in various tables, as well as the information in areas outside tables. It is used to restore structured information in electronic documents and reports.
GES
Global sequence
In a distributed database, data is stored in each sharded table, and the primary key constraints in a relational database are unavailable. For this reason, the global sequence number is used for DDM to ensure that data retains the uniqueness after sharded tables are aggregated.
Global table
In a distributed database, data is stored in each sharded table, and the primary key constraints in a relational database are unavailable. For this reason, the global sequence number is used for DDM to ensure that data retains the uniqueness after sharded tables are aggregated.
Graph
A graph is a data model composed of edges and vertices.
Graph Engine Service
GES provides distributed, at-scale, and integrated graph search and analysis capabilities. Its high-performance kernel supports high-concurrency, multi-hop, real-time queries in seconds. It also has extensive built-in graph analysis algorithm libraries to meet the application requirements of various fields.
Graph Size
Graph size indicates the graph scale, which is based on the number of edges. Its value is not an accurate one
Gremlin
Gremlin is a graph traversal language in the open source graph calculation framework of Apache TinkerPop. You can use Gremlin to create, read, update, and delete (CRUD) data, for example, adding vertices or edges, updating properties, and performing complex traversing.
- H
HA
Hadoop Distributed File System
HDFS provides high-throughput data access and is applicable to the processing of large data sets. MRS cluster data is stored in HDFS.
HAE
See High Availability Extension
HAF
HANA
See High-Performance Analytic Appliance
Handwriting Letters & Digits OCR
Handwriting Letters & Digits OCR can extract handwriting letters and digits and the information about rows and columns in various tables, as well as the information in areas outside tables.
Hardware Security Module
An HSM is a hardware device that produces, stores, manages, and uses keys in a secure manner. An HSM also provides encryption processing services.
Hash Algorithm
A hash value of a digital content segment can be used to verify data integrity. Any minor modification to the digital content leads to a significant change in the hash value. A qualified hash algorithm can be used to easily calculate a hash value from a digital content, but it is almost impossible to reverse calculate the original digital content from a hash value.
HBase
HBase is a column-oriented distributed cloud storage system that features enhanced reliability, excellent performance, and elastic scalability. It applies to the storage of massive data and distributed computing. Users can use HBase to build a storage system capable of storing TB- or even PB-level data. With HBase, users can filter and analyze data with ease and get responses in milliseconds, rapidly mining data value.
HDFS
See Hadoop Distributed File System
Healthy Threshold
Healthy threshold is the number of consecutive successful health checks necessary for an ECS to be considered healthy.
Heat
Heat is the main project in the OpenStack Orchestration program. It implements an orchestration engine to launch multiple composite cloud applications based on templates in the form of text files that can be treated like code.
Heat Orchestration Template
Heat Orchestration Template (HOT) is a template format supported by the heat, along with the other template format, i.e. the Heat CloudFormation-compatible format (CFN).
HFile
File format for HBase. A file of sorted key/value pairs. Both keys and values are byte arrays.
high availability
A system availability that keeps a service running properly without interruption.
High Availability Extension
A software package from SUSE for automatic active-standby failover control.
High-Performance Analytic Appliance
A high-performance real-time data computing platform based on in-memory computing technologies.
High-Speed Network
A high-speed network is an internal network among BMSs and provides high bandwidth for connecting BMSs in the same AZ. If you want to deploy services requiring high throughput and low latency, you can create high-speed networks. Currently, the BMS service supports high-speed networks with a maximum bandwidth of 10 Gbit/s.
HiLens Kit
HiLens Kit is a multimodal AI development suite that supports device-cloud synergy, and analysis and inference computing for data like images, videos, and speech. It can be widely used in intelligent surveillance, smart homes, robots, drones, smart industries, and smart stores.
Hive
A data warehouse tool running on Hadoop. Hive maps structured data files to a database table and provides simple SQL search function that converts SQL statements into MapReduce tasks.
Hive Query Language
Hive Query Language, a standard data query language used for Hive data warehouses.
HiveQL
HMaster
Also known as Master. HMaster manages the RegionServer in the HBase, including the load balancing of the RegionServer, and the split, distribution, and migration of Regions. In an HA mode, HMaster includes a primary HMaster and a secondary HMaster.
Horizontal sharding
Data tables are sharded into multiple sharded tables based on sharding rules. After the sharding, data is stored in the sharded tables based on sharding rules. Horizontal sharding raises the capacity limit of a table in a single-node database and improves access performance.
Host Auto-Failover
HAF is a specific SAP HANA scenario. When a worker node in the cluster becomes faulty, the SAP HANA system automatically switches services from the faulty node to the standby node for cluster HA.
Host Security Service
Host Security Service (HSS) is designed to offer overall protection for your host. It provides complete functions such as login protection, system protection, and application protection, allowing you more time to focus on your services.
HOT
See Heat Orchestration Template
hot backup
A hot backup is performed when a system is properly running. The backup data may be different from the actual data of the system because the data in the system keeps being updated.
hot update
WAF policies are delivered in real time without affecting ongoing services.
Hot Word
When using Sentence Transcription, Long Audio Transcription, and RASR, if your field has some special words, you can use the hot word management function and add these words to a word table to improve recognition effect.
HSM
HSS
HTTPS
See Hyper Text Transfer Protocol over Secure Socket Layer
HUAWEI CLOUD Marketplace
HUAWEI CLOUD Marketplace, or the Marketplace for short, is a reliable platform for transacting and delivering software and services. In the cloud service ecosystem, this platform helps its partners to conveniently provide customers with high-quality cloud computing and big data software, services, and solutions, satisfying customers' needs of fast cloud migration and service development.
HUAWEI CLOUD Service
Cloud computing infrastructure, platforms, or applications provided by HUAWEI CLOUD, including but not limited to elastic cloud computing, cloud hosting, object storage, and workspace services.
Huawei HiLens
Huawei HiLens is a one-stop platform for the development, distribution, deployment, and management of AI applications. It provides extensive device-cloud synergy capabilities such as large-scale device management, dynamic application deployment, online training, and device model optimization.
HXE
Hyper Text Transfer Protocol over Secure Socket Layer
HTTPS is an SSL-based encrypted transmission protocol designed for websites. Simply put, it is the secure version of Hyper Text Transfer Protocol (HTTP).
- I
IAM
See Identity and Access Management
IAM user
Created by the administrator for an employee, system, or application to use cloud services. Each IAM user can use their own identity credentials (password and access keys) to log in to the console or call APIs.
IB Network
The IB network features low latency and high bandwidth and is used in a number of High Performance Computing (HPC) projects. It uses the 100 Gbit/s mallenox IB NIC, dedicated IB switch, and controller software UFM to ensure network communication and management, and uses the Partition Key to isolate IB networks of different tenants (similar to the VLAN in the Ethernet).
ICAgent
ICAgent is a collection agent of APM. It runs on the server where applications are deployed and collects probe data in real time. For data collection scope and usage, see APM Service AgreementAPM Service Agreement.
ID Card OCR
ID Card OCR can automatically recognize all information on both sides of ID cards. After an ID card is scanned, information like ID number, name, and address can be recognized accurately even under complex conditions such as dark, tilted, overexposure, and shadowed scenarios.
IDC
Identity and Access Management
A security management service that provides identity authentication, permissions management, and access control.
identity provider
A system that provides identity authentication. For example, IAM is the identity provider of HUAWEI CLOUD. In federated identity authentication, the identity provider refers to the identity authentication system of an enterprise.
IdP
Image
Image file
An image file is a template that can be used to create ECSs. It contains an OS and preinstalled applications.
Image Management Service
Image Management Service (IMS) allows you to manage the lifecycle of images. You can create ECSs or BMSs from a public, private, or shared image. You can also create a private image from a cloud server or an external image file to easily migrate workloads to the cloud or on the cloud.
Image recognition
Image recognition is the technology that uses computers to process, analyze, and understand images to identify targets and objects in different modes.
Image Tagging
Image Tagging can recognize more than 3,000 objects and 20,000 scenarios and tags in natural images, which have extensive semantic meanings because one image contains a wide variety of tags. It can intelligently and precisely understand image content and make intelligent album management, picture retrieval and classification, and scenario- or object-based advertising more intuitive.
Images
Images are created by sellers based on the HUAWEI CLOUD public system. Customers can use an image to create an elastic cloud server (ECS) with the same system environment as that in the image.
ImageSearch
See ImageSearch
ImageSearch
ImageSearch leverages deep learning and image recognition technologies to deliver service- and industry-specific feature vectorization and search capabilities to help your search of exact/fuzzy match images from the specified library
IMDB
IMS
In-memory Database
An in-memory database (IMDB, also main memory database system or MMDB or memory resident database) is a database management system that primarily relies on main memory for computer data storage. It is contrasted with database management systems that employ a disk storage mechanism.
incremental backup (CSBS&VBS)
A backup method used to back up only data space modified since the last backup. The last backup can be either full backup or incremental backup. Incremental backup can be implemented only on a target that has been fully backed up.
incremental backup (RDS)
RDS automatically backs up data updated after the last automated or incremental backup every five minutes.
incremental data migration
Includes full migration by default. After full migration initializes the target database, incremental migration collects and analyzes logs to establish data consistency between the source and target databases, minimizing downtime.
index (CSS)
Index, similar to "Database" in the relational database (RDB), stores Elasticsearch data. It refers to a logical space that consists of one or more shards.
Index (MRS)
A data structure that improves the speed of data retrieval operations on a database table at the cost of slower writes and increased storage space. Indices can be created using one or more columns of a database table, providing the basis for both rapid random lookups and efficient access of ordered records.
Infrastructure
See Infrastructure
Infrastructure
In ServiceStage, infrastructure refers to the basic services that are required or optional to microservice application hosting and O&M, such as Cloud Container Engine (CCE).
input/output operations per second
The number of I/O operations completed per second. This metric is reported as the average IOPS for a given time interval. RDS reports read and write IOPS separately at one minute intervals. Total IOPS is the sum of the read and write IOPS. Typical values for IOPS range from zero to tens of thousands per second.
Instant Restore
Instant Restore is a feature that provides the instant restoration function for restoring data and creating images using backups. With Instant Restore enabled, the time required for restoring data and creating images can be reduced to minutes, which is much faster than the normal restoration function.
intelligent decoding
WAF intelligently identifies multi-layer obfuscation of multiple types of code and performs in-depth decoding to obtain the deep-rooted intents of attackers.
Internet Data Center
The telecommunications sector uses available Internet communication lines and bandwidth resources to establish a standard and carrier-class equipment environment in which comprehensive services such as server hosting, renting, and other value-added services are provided for enterprises and governments.
IOPS
See input/output operations per second
IP Address Group
An IP address group is a collection of IP addresses that use the same security group rule. You can use an IP address group to manage IP addresses that have the same security requirements or whose security requirements change frequently. An IP address group frees you from repeatedly modifying security group rules and simplifies rule management.
IPsec VPN
IPsec VPN is an encrypted tunneling technology that uses encrypted security services to establish confidential and secure communication tunnels between different networks.
- J
job
A job includes one or more task groups. Users submit jobs using APIs or via the Batch console. Job details include the job name and information about the pools associated with the job. Users can set dependencies between the task groups in a job.
Job (MRS)
MRS provides users with an application execution platform, which enables users to submit applications they have developed to a MRS cluster, execute the applications, and obtain results. MRS also enables users to submit SQL statements online as well as query and resolve structured data.
Job (CDM)
A job is a data migration task that you have created to migrate data from a specific data source to another. To create a job, you must specify a source link, target link, and data mapping rule.
job (DLF)
A job is composed of one or more nodes that are performed collaboratively to complete data operations.
Job (DLI)
Execution entity of submitting SQL statements, and importing and exporting data in the system.
K-O
- K
key file
Key files refer to files that affect system running, for example, system files.
Key Management Service
Key Management Service (KMS) is a secure and reliable key management hosting service used for centrally managing and safeguarding users' keys.
Key Pair Service
Key Pair Service (KPS) is a secure, reliable, and easy-to-use cloud service designed to manage and protect your SSH key pairs.
Kibana
Kibana is an open-source analytics and visualization platform and works with Elasticsearch. You can use Kibana to search, view, and interact with data stored in Elasticsearch indices. You can also visualize your data in a variety of charts, tables, and maps.
KMS
KPS
See Key Pair Service
- L
Label
A label indicates the type of a vertex or an edge. For example, the label of a vertex can be "person" or "vehicle" and that of an edge can be "friend" or "family". A label describes the data formats of all properties about a vertex or an edge (defined in schema).
Layer 2 Connection Gateway
A Layer 2 connection gateway (L2CG) is a virtual tunnel gateway that can work with a Direct Connect or VPN connection to establish network communication between the cloud and on-premises networks. The gateway allows you to migrate data center or private cloud services to the cloud without changing subnets and IP addresses.
leeching
In leeching, the attacker uses a link to direct access requests to a file on your website instead of placing the file on their own server. Typically, the file is big and consumes a lot of bandwidth, for example, an image or video. In some sense, you are paying for the access traffic to the file. Therefore, you are not only unpaid for the occupied bandwidth, the access rate to your website is also affected seriously.
LFI
license model
License type associated with a DB engine.
Licenses
Licenses of commercial software (such as images and SaaS) are offered as products on the Marketplace. License products include licenses of commercial operating systems, database middleware, and application software.
lifecycle management
The lifecycle of an object spans from creation of the object to the deletion. Lifecycle management allows you to configure rules to automatically delete objects that meet specific conditions.
Link
A link is an object set up based on a connector and used to connect to a specific data source. To create a link, you must specify the link name, connector type, data source address, and authentication information. For example, to connect to a MySQL database, you must set the host IP address, port number, username, and password. After a link is set up, it can be used by multiple jobs as either a source or a target link.
Linux Virtual Server
The Linux Virtual Server (LVS) is a virtual server cluster used to balance loads among servers. Working in the network layer, it can be used to implement high-performance, high-availability server cluster technologies.
Local File Inclusion
Local File Inclusion is the process of including files on a server through the web browser. This vulnerability occurs when a page include is not properly sanitized, and allows directory traversal characters to be injected.
log group
A log group is the basic unit for log management in Log Tank Service (LTS). You need to create a log group before collecting, querying, and transferring logs.
log stream
A log stream is the basic unit for reading and writing logs. Each log group contains up to 100 log streams. If there are too many logs to collect, you are advised to separate logs into different log streams based on log types, and name log streams in an easily identifiable way.
logical backup
A procedure in which the structured query language (SQL) is used to abstract data from a database and store the data into a binary file. Logical backup is a technology that uses software to export data from a database and stores the data into a file which is in a format different from the file in the original database. Logical backup can only be used for logical restoration (data import) and cannot be used for physical restoration based on storage characters of the original database. Generally, logical backup is used for incremental backup and only backs up data that has changed since the last backup.
Long Audio Transcription
Long Audio Transcription is used to recognize audio files whose duration is within five hours. Because Long Audio Transcription takes a long time, the recognition process is asynchronous.
LVS
- M
malicious program
A malicious program, such as a backdoor, Trojan horse, worm, or virus, is developed with attack or illegal remote control intents.
manual backup
A user-initiated full backup of a DB instance. A manual backup is always retained until you explicitly delete it manually.
Map
A processing model function that processes a key-value pair to generate a set of intermediate key-value pairs.
Mapping (CDM)
During job creation, especially jobs of migrating data between heterogeneous data sources, you must configure the mapping between the source and target data sources, such as field mapping and field type mapping.
mapping (CSS)
A mapping is used to restrict the type of a field and can be automatically created based on data. It is similar to the schema in the database.
MapReduce
As a programming model that simplifies parallel computing, MapReduce gets its name from two key operations: Map and Reduce. Map divides one task into multiple tasks, and Reduce summarizes the processing results of these tasks and produces the final analysis result. MRS clusters allow users to submit self-developed MapReduce programs, execute the programs, and obtain the result.
MapReduce Service
MapReduce Service builds a reliable, secure, and easy-to-use operation and maintenance (O&M) platform and provides storage and analysis capabilities for massive data, helping address enterprise data storage and processing demands. Users can independently apply for and use the hosted Hadoop, Spark, HBase and Hive services to quickly create clusters on a host and provide storage and computing capabilities for massive data that has low requirements on realtime processing.
Marketplace
Marketplace Product
Software, images, consulting services, and solutions that service providers independently develop or obtain based on legitimate authorization by the rights holders, and sell in HUAWEI CLOUD Marketplace. Marketplace products include but are not limited to basic operating environment, databases and cache memories, cyber security, enterprise management, e-commerce, storage backups, website deployment systems, business intelligence, information security, industry software, data migration, troubleshooting, security O&M, and other products and services.
MASTER
An SAP HANA master node coordinates global transactions and stores the global metadata of the information about the computing node cluster. A cluster has three master nodes configured, but only one of them is activated.
Master Node
A master node in a MapReduce Service cluster manages the cluster, assigns MapReduce executable files to core nodes, traces the execution status of each job, and monitors DataNode running status.
match
If a specified audit object matches an audit rule, the audit engine records the risk severity and executes the response action.
MDX
See Multi Dimensional eXpressions
Merchandise Image Search
ImageSearch provides users with pairing and bundling recommendations, helping increase sales while improving UX
Mesh
The Istio mesh obtains input and output application data in non-intrusive mode. The ICAgent and Cloud Container Engine (CCE) Istio mixer obtain and process mesh data, and then report the data to APM. You can enable the Istio to collect mesh data.
Message
A message in a queue carries information in the .json format. Messages can contain up to 512 KB of text.
Message Consumer
A consumer is a client that calls DMS APIs to retrieve messages from queues. Messages will be deleted from queues after their retrieval is acknowledged. Consumers in the same consumer group can concurrently retrieve different messages from a queue.
Message Producer
A producer is a client that calls DMS APIs to send messages to specified queues.
Message Queue
A queue receives and stores messages as files in certain order. Messages in a queue can be retrieved by multiple consumers.
Message Server
Message server is used for communication among Dialog instances and provides information for Dispatcher for load balancing.
Message&SMS
Message&SMS is a communication service provided for global users by HUAWEI CLOUD and the finest worldwide carriers and channels. Enterprises can use the Group SMS Assistant to easily send group SMS notifications, or call APIs to provide two-factor verification or SMS notifications for users.
Metadata
Data that provides information about other data. Metadata describes the source, size, format, or other characteristics of data. In the database field, metadata helps to explain the content of a data warehouse.
Metadata Collection
DAS periodically collects DB instance metadata of databases, tables, and fields and stores the collected data in the DAS database. This reduces queries on user databases and the impact on the user database performance and improves the search performance for DB instances that contain a large number of tables and supports pagination queries. Note that only structural metadata is collected, which means that user's table data is not included. The following database types are supported: MySQL, PostgreSQL, GaussDB(for MySQL), GaussDB(for Cassandra), DDM, and DDS.
metadata file
Contains API addresses and certificate information in compliance with SAML 2.0. Each identity provider and service provider have their own metadata files, which can be exchanged to establish trust. HUAWEI CLOUD (service provider) communicates with an identity provider server by using the address and certificate in the identity provider's metadata file.
Metamodel
A metamodel is a model of a model.
Metric
A metric is used to measure resource performance of a specific dimension. For example, CPU usage of ECSs is one metric and memory usage of ECSs is another.
Microservice
See Microservice
Microservice
Microservice is defined by service. If a process provides a service, it is a microservice. Each service has its own service functions. APIs that are not restricted by languages are open to other systems (HTTP frequently used). Multiple microservices form an application. In ServiceStage, a microservice is relative to an application component.
Microservice instance
Microservice instance
An instance is the minimum running and deployment unit of a microservice. Generally, it corresponds to an application process.
Migration Agent
The migration Agent is an Agent installed on a source server, which is used to collect information about source servers, receive commands from SMS, and migrate data from source servers to destination servers.
migration comparison
Comparison of migration items between source and target databases, facilitating cloud users making decisions.
migration logs
Logs generated during database migration, which can be classified into the following levels: alarm, error, and info.
migration pre-check
Before a migration, DRS pre-checks migration items and generates results to ensure that all check items are successful, improving the migration success rate.
migration progress
Migration progress includes: Progress of an on-going full migration in percentage Synchronization latency between source and target databases of an on-going incremental migration
ModelArts
ModelArts is a one-stop development platform for AI developers. With data preprocessing, semi-automated data labeling, distributed training, automated model building, and model deployment on the device, edge, and cloud, ModelArts helps AI developers build models quickly and manage the lifecycle of AI development.
Moderation
mongod
A major process in DDS. mongod mainly processes data requests and manages data access.
mongos
A router for data read and write, providing a unified interface for accessing DB instances.
MPM
MRS
MSGSMS
See Message&SMS
Multi Dimensional eXpressions
A query language for online analytical processing (OLAP) databases, as Structured Query Language (SQL) is a query language for relational databases. It is also a calculation language, with its syntax similar to spreadsheet formulas.
multi-pattern matching
A highly efficient multi-mode matching algorithm is used for preorder characteristic detection of request traffic, which greatly improves the performance of the detection engine.
My Credential
Attributes and security information of a user, including the user ID, mobile number, email address, password, and access keys.
My Marketplace
Customers' operation and management center in the Marketplace where they can manage the Marketplace products they have purchased and saved to the list.
- N
NameNode
A master server that manages the file system namespace and regulates access to files by clients. In HA mode, both NameNode and Secondary NameNode are provided.
Namespace
A namespace is a logical grouping of tables analogous to a database in relational database systems.
NAS (SAP HANA)
See Network Attached Storage (SAP HANA)
NAS (SFS)
NAT
See Network Address Translation (AAD)
NetWeaver
SAP NetWeaver is the integration technology platform of SAP. It is the technical foundation of all SAP applications since SAP Business Suite.
NetWork ACL
A firewall consists of one or more access control lists (ACLs). Based on inbound and outbound network ACLs, the firewall determines whether data packets are allowed in or out of any associated subnet.
Network Address Translation (AAD)
By Network Address Translation (NAT), private IP addresses are translated into public ones to allow users who only have private IP addresses to access the Internet, thereby relieving the impact of lack of IPv4 addresses. A type of network connection in hosted networking that enables you to connect your virtual machines to an external network when you have only one IP network address and the host computer uses that address.
Network Attached Storage
NAS is a method of file sharing. With NAS, a storage system has its own file systems inside and provides the file access service through Network File System (NFS).
Network Attached Storage (SAP HANA)
NAS is a file-level computer data storage connected to a computer network providing data access to heterogeneous clients. An NAS server contains storage devices, such as disk arrays, CD/DVD drives, tape drives, or portable storage media. An NAS server provides an embedded operating system to share files across platforms.
Network File System
Network File System (NFS) is a distributed file system protocol that allows different computers and operating systems to share data over a network. Application programs on client computers use NFS to access data on server disks. NFS is a method for sharing disk files between UNIX-like systems. SFS supports NFS v3 currently.
Network Time Protocol
Defines the time synchronization mechanism and synchronizes the time between the distributed time server and the client.
network traffic
Network transmission throughput, indicating the rate of network traffic in and out of the DB instance in MB per second.
NFS
NM
See NodeManager
NN
See NameNode
Node
See Node (CCE 2.0)
Node (CCE 2.0)
A node is a physical or virtual machine that acts as a Kubernetes worker, used to be called Minion.
Node (DLF)
A node defines the operations performed on data. For example, use a data migration node to import data from OBS to MRS Hive.
Node (NoSQL)
Compute nodes in the GaussDB NoSQL cluster.
NodeManager
Launches and monitors the compute containers on machines in the cluster.
non-relational database
Data in a non-relational database is communicated and organized based on the non-relational data structure. Based on different data structures, non-relational databases can be classified as the following types: key-value, column-oriented, document-oriented, and graphic databases. Common non-relational databases include Memcached, Redis, MongoDB, Cassandra, HBase, MemcacheDB, and Berkeley DB.
non-standard port
A port that is not port 80 or 443 is a non-standard port.
non-system database
Databases excluding system databases. For example, a user-built database is a non-system database.
Notebook
Notebook is an online interactive code development and debugging tool powered on the open source Jupyter Notebook. It is widely used in the AI field.
NTP
number of concurrent users
The number of concurrent users refers to the number of users simultaneously performing operations on a system. In CPTS, it is the number of virtual users you set when you define test task phases.
NW
See NetWeaver
- O
object
A basic data unit in object storage service. It consists of object data and object metadata that describes object attributes.
Object Storage Service
Object Storage Service (OBS), a cloud storage service, provides data storage that features easy scalability, high security, proven reliability, and high cost-effectiveness. Users can manage and use objects through APIs over HTTP. It is applicable to large-scale data storage services.
OBS
OBS Archive
OBS Archive storage class is ideal for archiving data that is rarely accessed (once a year on average). Its application scenarios include data archiving and long-term data backups. The Archive storage class is secure, durable, and inexpensive, and can be used to replace tape libraries. However, it may take hours to restore data from the Archive storage class.
OBS Infrequent Access
OBS Infrequent Access storage class is ideal for storing data that is accessed infrequently (less than 12 times a year) and has quick response requirements. Its application scenarios include file synchronization, file sharing, and enterprise backup. It provides the same durability, access latency, and throughput as the Standard storage class but at a lower cost. However, the Infrequent Access storage class has lower availability than the Standard storage class.
OBS Standard
OBS Standard storage class features low access latency and high throughput. It is therefore ideal for storing a massive number of hot files (frequently accessed every month) or small files (less than 1 MB). Its application scenarios include big data analytics, mobile apps, hot videos, and social apps.
OBS Table
Table that stores data of OBS.
OCR
See Optical Character Recognition Service
ODBC
See Open Database Connectivity
Offline Import
ImageSearch allows you to import large-scale and offline images in batches to an instance
OLAP
See Online Analytical Processing
OLTP
See Online Transaction Processing
on-premise database
Self-built local databases on the premises.
Online Analytical Processing
A technology that uses multidimensional structures to provide rapid data access for analysis. OLAP source data is generally stored in data warehouses in a relational database.
Online database migration
Database migration without service interruption (or with service interruption at the minute level).
Online Service
A model can be deployed as a cloud service. You can directly access the service by calling the RESTful API, which is used for the inference of a single piece of data.
Online Transaction Processing
A transaction-oriented processing system, which immediately sends original user data to the computing center for processing and provides the processing result within a short period of time. OLTP is a main application of traditional relational databases. It processes basic and routine transactions, such as banking transactions.
Open Database Connectivity
A data access application programming interface (API) that supports access to any data source for which an ODBC driver is available. ODBC is aligned with the American National Standards Institute (ANSI) and International Organization for Standardization (ISO) standards for a database call-level interface (CLI).
Optical Character Recognition Service
OCR is used to convert characters in images of typed text into machine-encoded text. OCR provides English Customs Form OCR and VAT Invoice OCR.
Orchestration
See Orchestration
Orchestration
An orchestration template contains the definitions of a group of container services and their dependencies. Orchestration templates can be used to deploy and manage multi-container applications and non-containerized applications.
Orderer
Orderers are nodes that order transactions into a block.
origin server
An origin server is a server where users' services are running.
origin server IP address
An origin server IP address is a public IP address used by a user's server to provide services.
Overall Latency/Service Latency
Latency refers to the time-consuming invocation from initiating a request to getting a response. In APM, the overall latency refers to the total time consumed by a request, and the service latency refers to the time consumed by a service.
P-T
- P
packet
Packets are data blocks sent over the HTTP, HTTPS, TCP, or UDP protocol. The data blocks start with metadata texts describing packet content, followed by optional data. Packets are transmitted between clients, servers, and proxies.
PAM
See Product Availability Matrix
partition
Data records in DIS streams are distributed into partitions. Partitions are the base throughput unit of a DIS stream. The total capacity of a stream is the sum of the capacities of its partitions. One partition supports the data read rate of 2 MB/sec and the data write rate of 1,000 records/sec and 1 MB/sec. When creating a DIS stream, you are expected to specify the number of partitions needed within your stream.
partition key
A partition key is used to segregate and route records to different partitions of a DIS stream. A partition key is specified by your data producer while adding data to a DIS stream. For example, assuming you have a stream with two partitions (partition 1 and partition 2). You can configure your data producer to use two partition keys (key A and key B) so that all records with key A are added to partition 1 and all records with key B are added to partition 2.
payload
The payload is the portion of the malware which performs malicious action
Peer
Peers are network nodes that maintain ledgers. One or more peers form a peer organization.
performance metrics
Metrics of DB instance performance, including the CPU usage, memory usage, storage space usage, network traffic, database connections, transaction rate/database throughput, submit latency, storage latency, storage IOPS, storage throughput, and storage queue length.
permission
A statement in a policy that allows or denies access to specific resources.
physical backup
A backup mechanism, in which database files in the operating system are replicated from one place to another place, generally from a disk to a tape. Physical backup includes cold backup and hot backup.
PKI
Planned failover
Source servers and disks belong to the source AZ, and target servers and disks belong to the target AZ. When servers in the target AZ are running properly, you can stop the servers in the source AZ and perform a planned failover, specifically, to migrate services from the source AZ to the target AZ and enable the target servers and disks.
POC
See prove of concept
policy
A set of permissions that allow or deny specific operations on specific resources. You can create custom policies by configuring required permissions. A policy can contain permissions for one or more cloud services. IAM implements fine-grained permissions management based on the permissions defined by policies.
pool
A pool is a set of nodes that are used to run tasks. Users can start, manage, and end tasks running on specific nodes.
PRD
See Production
primary DB instance
A DB instance that provides read and write services.
Private image
A private image is created from an ECS or an external image file and is visible only to its creator. Each private image contains an OS, preinstalled public applications, and the creator's private applications. Creating ECSs using a private image frees you from repeatedly configuring ECSs.
private network address
The internal access address is accessible only to clients that are in the same subnet as the Cloud Search Service cluster.
Private Network Load Balancer
The private network load balancer provides load balancing for intranet users and automatically distributes access traffic to multiple ECSs in one VPC.
Probe
The probe uses the bytecode enhancement technology to set data points to generate data. The data will be collected by the ICAgent and then displayed on the GUI. If the memory detection mechanism is enabled and the instance memory usage is too high, the probe enters the hibernation state and stops data collection.
Product Access
Process in which service providers connect and release products to the Marketplace and the products are added to the catalog after being approved by HUAWEI CLOUD.
Product Availability Matrix
PAM bundles technical and release planning information on SAP software product versions for quick reference. There you can find information on product versions′ release, availability, and maintenance.
Production
A HANA production scenario where HANA officially applies in the production environment.
Production Interface Debugging
Before releasing SaaS products, sellers must debug production interfaces of the SaaS products on the Application Access Debugging page in the Seller Console to ensure that SaaS products can be accessed correctly from the Marketplace.
Production site
A production site is the data center that independently carries services in normal cases. For SDRS, it is the AZ where your servers locate. This parameter is specified when you create a protection group.
project
A collection of different cloud service resources that you can access. You can create multiple projects in a region and grant users permissions for specific projects.
Property
A property is used to describe the information about a vertex or an edge in a graph.
Protected instance
Indicates a server and its replication server (target server). A protected instance belongs to one protection group. Therefore, the source and target AZs of the protected instance are the same as those of the protected instance's protection group.
Protection group
Used to manage a group of servers to be replicated. One protection group is for servers in one VPC. If you have multiple VPCs, you need to create multiple protection groups.
Protection group status
Indicates the status of a protection group when users perform an operation on the protection group, such as creating or deleting a protection group, enabling or disabling protection, or performing a failover or planned failover.
prove of concept
A segment of code or program that proves the existence of a vulnerability
Public image
A public image is provided by the public cloud system. It contains a standard OS and preinstalled public applications, and is visible to all users. You can configure the application environment and required software based on your requirements.
Public Key Infrastructure
A public key infrastructure (PKI) is an online infrastructure that is built on an open key theory and technology and is used to provide security services. Using encryption techniques, digital signatures, and digital certificates, it protects the security of applications, communications, or transactions.
public network
A computer accesses the Internet through a public network. The IP address is not reserved on the Internet and can be used by the computer to communicate with other computers on the Internet.
Public Network Load Balancer
The public network load balancer provides load balancing for public network users and distributes access traffic from the public network to multiple ECSs.
- Q
QAS
See Quality Assure
Quality Assure
A quality assurance scenario where SAP HANA functions, performance, and reliability are fully verified.
Queue
A logical combination of resources in a cluster.
queue depth
The number of I/O requests in the queue waiting to be serviced. These are I/O requests that have been submitted by the application but have not been sent to the device because the device is busy servicing other I/O requests. Time spent waiting in the queue is a component of Latency and Service Time (not available as a metric). This metric is reported as the average queue depth for a given time interval. RDS reports queue depth at one minute intervals. Typical values for queue depth range from zero to several hundred.
- R
RASR
See Real-time Automatic Speech Recognition
RCE
RDD
See Resilient Distributed Datasets
RDP
RDS
See Relational Database Service
RDS DB instance
An RDS DB instance is the minimum RDS management unit. An RDS DB instance represents a relational database that runs independently. You can create and manage DB instances of various database engines in the RDS system. RDS DB instances come in three types: primary DB instances, standby DB instances, and read replicas.
read replica
An active copy of a DB instance. Any updates to the data on the source DB instance are replicated to the read replicas using the built-in replication feature of the DB engine.
Read/Write isolation
DDM redirects read and write requests of application services to different RDS DB instances. When the system has a heavy read load, read replicas are added to RDS DB instances. Data is read from read replicas, improving the concurrent database performance. Application codes do not need to be changed because the read/write isolation of DDM is open to applications.
read/write splitting
Primary DB instances process INSERT, UPDATE, and DELETE requests and standby DB instances process SELECT requests.
Real-time Automatic Speech Recognition
This is a WebSocket API provided by HUAWEI CLOUD, and is used for real-time speech recognition. An audio file is transmitted by fragments. The server can return the intermediate results during the recognition process and the final recognition result after the process is complete.
Recapture Detection
Recapture Detection, as a custom image recognition service, can recognize whether a barcode image is the original one or the one that is recaptured or printed for recapturing by using the deep learning technology and large-scale image detection training. It helps you build an intelligent business system and greatly reduce labor costs.
Recovery Point Objective (SAP HANA)
RPO is a service switchover policy, minimizing data loss during DR switchover. The data recovery point is used as the objective to ensure that the data used for DR switchover is the latest backup data.
recovery point objective (SDRS)
Indicates recovery time objective. It is the target time on the recovery of interrupted key businesses to an acceptable level. RTO is set to minimize an interruption's impacts on the services.
Recovery Time Objective (SAP HANA)
RTO defines the maximum duration of time within which data must be restored. When a disaster occurs, if you want the system to be available immediately and allow the loss of some data, the RTO is zero. If you allow an hour to recover the data, the RTO is one hour.
recovery time objective (SDRS)
Indicates recovery point objective. It is a service switchover policy, minimizing data loss during DR switchover. The data recovery point is used as the objective to ensure that the data used for DR switchover is the latest backup data.
Reduce
A processing model function that merges all intermediate values associated with the same intermediate key.
Region
Regions are divided from the dimensions of geographical location and network latency. Public services, such as Object Storage Service (OBS), Virtual Private Cloud (VPC), and Image Management Service (IMS), are shared within the same region. Users can select a region closest to them to reduce access latencies.
Region (MRS)
Similar to partitions in a traditional database, each RegionServer can have multiple regions.
RegionServer
RegionServer is a service of HBase on each working node. It manages Regions, uploads Region load information, and facilitates HMaster in distributed, coordinated management.
relational database
Tables in a relational database are communicated and organized based on the relational data structure. RDB simplifies complex data structures into simple binary relations (two-dimensional tables). A relational database contains multiple tables and each table is known as a relation. Data management is performed through data manipulation language (DML) statements, such as GROUP BY, JOIN, UNION, and SELECT * FROM. Common relational databases include Oracle, MySQL, MariaDB, Microsoft SQL Server, Access, DB2, PostgreSQL, Informix, and Sybase.
Relational Database Service
RDS is a managed service that makes it easy to create, configure, operate, and scale a relational database in the cloud.
reliability priority
During a primary/standby failover, if data is inconsistent between primary and standby DB instances, the failover is not performed and database services are stopped to ensure data consistency.
Remote Code Execution
Attackers attack or control communication devices by remote calling.
Remote Desktop Protocol
A proprietary protocol developed by Microsoft.
Remote Gateway
A remote gateway is the public IP address of the physical device on the peer end in an IPsec VPN tunnel. The remote gateway of each IPsec VPN tunnel must be unique.
remote login
In remote login attempts, a user tries to log in to an ECS from a location that is not a user-configured common login location.
Remote Subnet
A remote subnet is the destination IP addresses reachable through the tunnel. All IP packets destined for this subnet are sent along the IPsec VPN tunnel. Multiple remote subnets can be configured. However, the remote subnet cannot conflict with the subnet of the VPC where the VPN resides.
replica
A copy in a shard used for storing indices. It can be understood as a replica shard.
replica set
A replica set consists of a set of mongod processes and provides a collection of data nodes to ensure data redundancy and high availability (HA).
Replication factor
The number of copies of a file is called the replication factor of that file.
Replication pair
Indicates a disk and its replication disk (target disk). A replication pair belongs to one protection group and can be attached to a protected instance in this protection group.
report
After data transmission is complete, a report is generated for you to confirm that all data is transmitted.
Repository
Both image repositories and software repositories are called repositories. Images are used to create containerized applications; while software packages are used to create non-containerized applications. Before creating an application, ensure that the required image and software package has been uploaded to the repository.
Resilient Distributed Datasets
Resilient Distributed Datasets, a distributed memory abstraction that lets programmers perform in-memory computations on large clusters in a fault-tolerant manner.
resource
A resource is a self-defined code or text file that is uploaded by users and scheduled when a node task is executed.
Resource
A resource is an entity that users can use on HUAWEI CLOUD. A resource can be an Elastic Cloud Server (ECS), an Elastic Volume Service (EVS) disk, or a Virtual Private Cloud (VPC).
Resource Change Records
Resource change records contain resource changes in a specific period of time. A record will be generated upon any changes to the properties or relationships of a resource.
Resource Compliance
You can add assignments to evaluate the compliance of your resources.
Resource Management Service
Resource Management Service (RMS) enables you to centrally manage your cloud resources. You can dump and search for them, and evaluate their security compliance.
Resource Recorder
The resource recorder tracks resource changes on HUAWEI CLOUD. When a resource is created, modified, or deleted, or the resource relationship changes, RMS sends an SMN message to notify you of the change. In addition, RMS periodically dumps the resource change notifications and your resource snapshots into the configured OBS bucket.
Resource Relationship
A resource relationship indicates how your resources on HUAWEI CLOUD are associated, for example, EVS disks attached to ECSs and ECSs contained in VPCs.
Resource Template Service
Resource Template Service (RTS) helps you simplify cloud computing resource management and automate O&M. You can compile a template file and define a collection of cloud computing resources, dependencies between resources, and resource configurations based on the template specifications defined in the RTS service. Then you can automatically create and configure all resources in the template using the orchestration engine to simplify deployment and O&M.
ResourceManager
Manages the global assignment of compute resources to applications.
response extraction
If a transaction contains multiple packets, the response to a packet can be extracted by a regular expression and used in the subsequent packet.
retrieval IP address
In addition to protecting origin servers, Advanced Anti-DDoS provides proxy IP addresses for origin servers, which are called retrieval IP addresses. From origin servers' perspective, traffic returned to your users is all sent from the retrieval IP addresses.
RM
See ResourceManager
RMS
See Resource Management Service
Rollup
Rollup is the process in which Cloud Eye calculates the maximum, minimum, average, sum, and variance values based on sample raw data collected in different periods.
Route Table
A route table contains a set of rules that are used to determine where network traffic is directed. You can add routes to a route table to enable other ECSs in a VPC to access the Internet through the ECS that has a bound EIP.
Row
A row key is one of HBase table dimensions. It is an arbitrary array of bytes. Tables are sorted in lexicographical order by their row keys.
Row key
A row key is the HBase primary key. Tables in HBase are lexicographically sorted in ascending order based on row key.
RPO
See Recovery Point Objective (SAP HANA)
RS
See RegionServer
RTO
See Recovery Time Objective (SAP HANA)
RTS
Running Parameters
Running parameters are dynamic parameters specified when a training job is created. The dynamic parameters are received and processed by the code of the training job. You can specify the parameter values as required.
- S
SaaS
SaaS products are application software products provided by sellers to run on HUAWEI CLOUD infrastructure as a service (IaaS). After purchasing SaaS products, customers can log in to specific websites to use the SaaS products without a need to purchase the required cloud resources.
SAP HANA, express edition
SAP HANA, express edition is the R&D version of SAP HANA. It can be installed and run on a laptop or other hosts, such as Elastic Cloud Servers (ECSs) on public cloud. SAP HANA, express edition is free to use for up to 32 GB of memory capacity. Memory capacity beyond 32 GB is available for purchase at the SAP store.
SBD
Scalable File Service
Scalable File Service (SFS) is high-performance file storage that is scalable on demand. SFS file systems support standard file access protocols and can be mounted to Elastic Cloud Servers.
Scale Out
Scale-out mode is also called cluster system mode, in which an SAP HANA system contains multiple nodes. In scale-out mode, when the system requires expansion, add more nodes to the system.
Scale Up
Scale-up mode is also called single-node system mode, in which an SAP HANA system contains only one valid node. If HA is required, construct such an architecture using two single nodes through System Replication. In the scale-up mode, when the system requires expansion, add CPUs, memory capacity, and hard disks to the node.
scaling action
A scaling action triggered by an AS policy adds instances to or removes instances from an AS group.
scanner
A scanner is a program that automatically detects security weaknesses in local or remote hosts. It can discover vulnerabilities and provide scanning results quickly and accurately.
Schema
A schema is used to describe the property information about edges or vertices. A schema consists of multiple labels and each label consists of multiple properties.
schema migration
All structure object definition syntax, excluding database data, is migrated from a source database to a target.
SCM
SDRS
See Storage Disaster Recovery Service
Seamless scale-out
The database storage space is expanded by increasing RDS DB instances without service interruption. Capacity expansion breaks the storage capacity bottleneck and improves the database performance by enhancing the concurrent computing capability. The DDM console supports capacity expansion. During capacity expansion, applications are not reconstructed and the progress is visualized.
Secondary NameNode
Performs periodic checkpoints of the namespace and helps keep the size of file containing log of HDFS modifications within certain limits at the NameNode.
Secure Shell
A set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer.
Secure Sockets Layer
A security protocol that works at a socket layer. This layer exists between the TCP layer and the application layer to encrypt/decode data and authenticate concerned entities.
seller
Service providers, often enterprises, that are authorized by HUAWEI CLOUD to sell software, images, services, and solutions using cloud computing and big data technologies in the Marketplace.
Seller Console
Sellers' operation and management center on the Marketplace, where they can manage their own information, offerings and transactions, and perform commissioning for application access.
Seller Registration
Process that service providers follow to apply for and implement joining to the Marketplace.
semi-synchronous replication
After an application initiates a data update (including insert, delete, and modify data) request, Master replicates the updated data to Slave. When at least one Slave receives binlogs, writes data to relay logs and flushes it to disks, Slave returns a response to Master. Compared to fully synchronous replication, semi-synchronous replication is faster because Master does not wait for Slave to commit data. However, since Slave responds to Master before the commitment is done, data may be inconsistent.
sensitive file access
Sensitive files, such as configuration files and permission management files of operating systems and application service frameworks, should not be accessed on the Internet; otherwise, service security is compromised.
Sentence Transcription
Sentence Transcription API is used for real-time recognition of short sentences. The entire audio is uploaded at a time, and the recognition result is returned immediately.
sequence number
Each data record has a sequence number that is unique within its partition. The sequence number is assigned by DIS when a data producer calls PutRecord or PutRecords operation to add data to a DIS stream. Sequence numbers for the same partition key generally increase over time; the longer the time period between write requests (PutRecord or PutRecords requests), the larger the sequence numbers become.
server-side request forgery
SSRF is an attacker-made vulnerability that can be used to send requests from servers. Typically, targets of SSRF are internal systems inaccessible from the Internet. The causes of SSRF are that the server can obtain data from other servers and that users have not filtered and limited destination addresses when they can.
Service end
The service end refers to the management component of SMS on HUAWEI CLOUD, which is used to create migration tasks, manage the migration Agent, and monitor migration task progress.
Service Level Agreement
A service level agreement (SLA) is a commitment between a service provider and a customer on the types, quality, performance, and reliability of services.
Service Order
After applying for DES, a service order is generated to trace the service progress and status.
service provider
A system that provides services. In federated identity authentication, the service provider refers to HUAWEI CLOUD.
Service Supervision
Process in which sellers and customers follow up with the delivery and communicate with each other during the delivery after customers purchase license products.
ServiceComb
See ServiceComb
ServiceComb
Apache ServiceComb is an open-source microservice project. It is compatible with popular ecosystems and provides a one-stop open-source microservice solution, featuring out-of-the-box readiness, high performance, and multi-language programming. It aims to help enterprises, customers, and developers easily deploy enterprise applications on the cloud in the form of microservices and implement efficient O&M.
SFA
SFS
shard (CSS)
In Cloud Search Service, a shard is a logical partition. In the Elasticsearch search engine, an index consists of several shards. Each shard contains one or more replicas.
shard (DDS)
In Document Database Service, each shard is a mongod process that stores a subset of data for a DB instance. All shards store all data for a DB instance. Generally, each shard is deployed as a replica set to ensure data redundancy and HA.
Shard and sharded table
A DDM instance creates multiple physical databases in an RDS DB instance. Each physical database is a shard. A table that is created in a shard is a sharded table, which is neither a non-sharded table nor a global table. Data is distributed to shards based on sharding rules. The data supports distributed concurrent computing.
Shared Block Device
SBD is a voting disk in the active and standby systems that are used for automatic switchover.
Shuffle
A process of outputting data from a Map task to a Reduce task.
signature file
After you submit your DES order, the system generates a signature file. The signature file is the unique identifier for a Teleport or disk in the order.
Single Point Of Failure
SPOF is a part of a system or network that, if it fails, will stop the entire system or network from working.
SIS
See Speech Interaction Service
skill
A skill is an AI application running on a camera or other computing devices. It consists of a model and logic code. The logic code is the skill's framework, and is responsible for controlling skill running, including data reading, model import, model inference, and result output. The model is trained by AI algorithms based on big data and is responsible for inference in key scenarios during skill running.
SLA
SLAVE
An SAP HANA cluster can have one or multiple slave nodes configured in a distributed architecture to cache metadata and perform database operations assigned by the master node. A cluster has multiple slave nodes.
slow HTTP attack
In a slow HTTP attack, after managing to establish a connection with an HTTP server, the attacker specifies a large content-length and sends packets at very low rates, such as one byte per one to 10 seconds, and maintains the connection. If the client builds more such connections, available connections on the server will be exhausted bit by bit, causing the server unable to provide services.
Small Computer System Interface
An EVS disk type that supports transparent SCSI command transmission and allows the server OS to directly access the underlying storage media. In addition to basic SCSI read/write commands, SCSI EVS disks also support advanced SCSI commands, such as SCSI persistent reservations. SCSI EVS disks are suitable for cluster application scenarios that ensure data security using the lock mechanism.
Smart Contract
A smart contract, also called chaincode, is a code logic that runs on a blockchain and is automatically executed under a specific condition. It is an important method for a user to implement the service logic when using a blockchain. The nature of blockchain means that the execution results of smart contracts are reliable and cannot be forged or tampered with.
Software Development Kit
A collection of development tools that are used by software engineers to create application software for specific software packages, software frameworks, hardware platforms, and operating systems. Generally, the SDK is used for developing Windows applications. It simply provides some API files for a programming language, but may also include complex hardware that can communicate with an embedded system.
software vulnerability
A software vulnerability is a security defect in a piece of software that may allow unauthorized users to access or sabotage the host.
SoH
See Suite on HANA
solid-state drive
SSDs are built on solid electronic storage chip arrays. Each SSD consists of a control unit and a storage unit (a flash and a DRAM chip). The interface specifications, definition, functions, and usage of an SSD are the same as those of a common hard disk. SSDs are widely applied in fields such as military, vehicles, industrial control, video surveillance, network surveillance, network terminals, electricity, medical, aeronautics, and navigation equipment.
source DB instance
A source DB instance functions as the data source in data replication.
Source job configuration
During job creation, a source link specifies the data source where the data is to be extracted, for example, a table or directory. The source job parameter settings vary with source links. You can set related parameters in the source job configuration.
Source server
A source server refers to the server to be migrated in a server migration task. A source server can be an X86 physical server or a VM on a private or public cloud platform.
SP
See service provider
Spark
MRS deploys and hosts Apache Spark clusters in the cloud, and Spark is a distributed and parallel data processing framework.
Spark SQL
Spark SQL is an important component of Apache Spark and subsumes Shark. It helps engineers who understand conventional databases but do not know MapReduce quickly get started.
Speech Interaction Service
Speech Interaction Service provides a man-machine interaction mode by open Application Programming Interfaces (APIs). It is applicable to scenarios such as voice customer service inspection, conference records, voice SMS messages, audio books, and telephone follow-ups. You can obtain the speech interaction results by real-time access and API calling. For example, you can use Automatic Speech Recognition (ASR) to convert speech recordings in Mandarin or with certain dialects as editable text, and use Text To Speech (TTS) to convert text into lifelike voices.
SPOF
SQL
SQL injection
SQL injection is a common web attack. Attackers inject SQL statements into query character strings of background databases to deceive servers into executing the malicious SQL statements. Then, attackers can obtain sensitive information, add users, export files, or even gain the highest permissions on the databases or even the systems.
SQLi
See SQL injection
SR
SSD
SSH
See Secure Shell
SSL
SSL Certificate
An SSL certificate is a digital certificate that complies with the Secure Sockets Layer (SSL) protocol. Issued by a CA after verifying a server, an SSL certificate is used to authenticate servers and encrypt in-transit data.
SSL Certificate Manager
SSL Certificate Manager (SCM) is a service that provides one-stop lifecycle management of digital certificates, ensuring trusted authentication and secure connections.
SSRF
See server-side request forgery
Stack
See Stack (CCE 2.0)
Stack (AOS)
A stack is a collection of applications and cloud service resources. The applications and cloud services in a stack are treated as a whole when they are being created, upgraded, or deleted.
Stack (cce 2.0)
A stack is a deployment instance composed of applications, services, and resources. ServiceStage manages these elements by means of stacks.
Stage
Each job gets divided into smaller sets of tasks called stages that depend on each other.
STANDBY
An SAP HANA standby node takes over services of a faulty worker node. A cluster can have no or any number of standby nodes, and one standby node by default. In normal cases, software on the node is running, but the node's memory database has no data and cannot process services. The standby node takes over services of a faulty node automatically.
standby DB instance
A standby DB instance is a backup for a primary DB instance. If the primary instance fails, the standby instance automatically takes over services to improve database availability. When creating a primary DB instance, you can determine whether to create a synchronous standby DB instance with the same specifications as the primary one.
static website hosting
A function that allows you to host static website files using OBS buckets, and visit static websites by accessing the buckets.
Sticky Session
If sticky session is enabled, requests from the same client will be distributed to the same ECS for processing.
storage capacity
Size of the underlying storage resources that can be used to store indexes and logs.
Storage Disaster Recovery Service
Storage Disaster Recovery Service provides disaster recovery (DR) services for many public cloud services, such as Elastic Cloud Server, Elastic Volume Service, and Dedicated Storage Service.
storage space
The space of underlying storage resources for storing data and logs of a database.
storage type
Storage can be classified as different types based on the dimensions and attributes of storage resources. For example, storage can be classified into magnetic storage and SSD based on storage media, and can be classified into general, medium, and high performance I/O based on the I/O level.
Structured Query Language
A programming language widely used for accessing, querying, updating, and managing data in a relational database. It includes DDL, DML, and DCL.
submit latency
The elapsed time between the submission of a request and its completion. This metric is closely related with the storage write latency metric. A high storage write latency may cause a high submit latency.
Suite on HANA
An SAP HANA application scenario where SAP HANA is used as the database of the business suite (for example, ERP software).
SYN flood
See SYN flood attack
SYN flood attack
In a SYN flood attack, the malicious client (the attacker) uses forged SYN packets (the source addresses of which are fake or non-existent) to send connection requests to the target server. The target server acknowledges those requests by returning SYN-ACK. However, the client does not respond to the server with an expected ACK packet. As a result, the target server has a large number of half-open connections that last until timeout. Those connections exhaust server resources, causing the target server to fail to create normal TCP connections, as expected by the attacker.
Synchronization status
Indicates the status of the data replication between the source and target AZ.
system database
Stores system-level information used for database system running. It is created by default during the database system installation. For example, Microsoft SQL Server system databases include master, model, msdb, resource, and tempdb. MySQL system databases include information_schema, mysql, performance_schema, sakila, test, and world.
System disk image
A system disk image contains an OS for running services and application software. It can be used to create system disks, and can also be directly used to create ECSs. Through system disk images, you can migrate your service running environment to the cloud.
System Replication
System Replication is a function of SAP HANA. To implement System Replication, you need to create a secondary system, which continuously synchronizes data and transaction logs with the primary system. Due to the mirroring attribute of the primary and secondary systems, once the primary system is faulty, the secondary system takes over services of the primary system.
- T
Table (MRS)
An HBase table is a three dimensional sorted map. It maps from Cartesian product of row key, column key and timestamp to cell value. All HBase data is stored in cells of tables.
Table (DLI)
A combination of rows and columns. Each column is a field, and each field represents a type of data.
task
A task is the minimum unit for executing batch computing jobs. Tasks dynamically run on the servers allocated by the system.
task group
A task group is a collection of tasks. You can specify replicas to set the number of tasks in a task group. Other than the task name, all of the tasks in a task group have the same settings.
TCP
See Transmission Control Protocol
TCP attack
In Transmission Control Protocol (TCP) attacks, attackers send forged TCP packets to target servers, with abnormal flag settings intended to make the servers unresponsive to normal user requests.
Teleport
Teleport is a military-class chassis for securely transferring TB- or PB-scale data to HUAWEI CLOUD. It is dustproof, waterproof, vibration-resistant, and crush-resistant and provides safety lock, alarm recording, and GPS positioning functions. Customers can store data in Teleport and deliver it to Huawei for uploading the data to HUAWEI CLOUD.
Template
An RTS template is a user-readable, easy-to-write file that describes how to deploy a set of resources and install the required software. Templates specify the resources to use, the attributes to set, and the parameters required for automatic deployment of a specific application. Template files can be in the YAML or JSON format.
Test
A HANA test scenario where development engineers test application software and SAP HANA to verify the functions of application software after application software development is complete.
Text To Speech
TTS converts text into lifelike voices. Users can access and call APIs to synthesize the input text into audio and obtain the voice synthesis result in real time. TTS provides speech services with customizable timbres, speech volumes, and speeds for enterprises and individuals.
Text To Speech Customization
TTSC converts text into lifelike voices. Users can access and call APIs to synthesize the input text into audio and obtain the voice synthesis result in real time. TTSC provides speech services with customizable timbres, speech volumes, and speeds for enterprises and individuals.
think time
Think time is the time gap between two consecutive user actions. For example, when a user receives data from a server, the user may spend a few seconds checking the data before responding. Adding think time can better simulate user behaviour.
throughput
The number of bytes per second transferred to or from a disk. An average throughput is reported at a specified interval. RDS reports read and write throughput in MB/s separately every one minute. Typical values for throughput are from zero to the I/O channel's maximum bandwidth.
Timestamp
Different versions of the same data for the index, the timestamp type is 64-bit integer. Timestamp can be automatically assigned by the customer or by the explicit assignment when data is written to HBase.
token
An alpha-numeric string of text issued to a user for accessing APIs and resources. A token contains the identity and permission information about a user.
Topology
A topology graphically displays call and dependency relationships between applications. It is composed of circles, arrows, and resources. Each circle represents an application, and each section in the circle represents an instance. The fraction in each circle indicates number of active instances/total number of instances. The values below the fraction respectively indicate the service latency, calls, and errors. Each arrow represents a calling relationship. Thicker arrows indicate more calls. The values on arrows respectively indicate the throughput and overall latency. Throughput is the number of calls within the selected period. Application Performance Index (Apdex) indicates user satisfaction with application performance. Different colors indicate different Apdex value ranges, helping you quickly detect and locate performance problems.
TP99 Latency
TP99 latency is the minimum time meeting requirements of 99% requests. In APM, latency refers to TP99 latency.
TPS
TPS is a metric used to measure system throughput. It refers to the number of requests that receive responses from a tested server per second.
trace
A trace is a cloud service resource operation record generated and stored by Cloud Trace Service (CTS). You can view traces to see a history of operations performed by specific users on specific resources.
trace file
A trace file is a collection of traces. Usually, one trace file contains all traces generated in one transfer cycle. If there are too many operation records generated in one cycle, Cloud Trace Service (CTS) will adjust the number of traces contained in a trace file. Trace files are transferred to OBS buckets for archiving.
trace list
The trace list displays details about operations, such as creation, modification, and deletion of cloud service resources, in your account. The trace list contains traces generated during the last 7 days.
Tracing
Tracing and recording service calls help to visually restore the execution track and status of service requests in distributed systems, so that you can quickly demarcate performance bottlenecks and faults. The following figure shows how to trace an exception.
Tracing Analysis
The service calling relationships in large-scale and complex distributed systems are traced to facilitate quick location and demarcation of faults.
tracker
Before using Cloud Trace Service (CTS), you need to enable it. A management tracker is automatically created when CTS is enabled and is used to record management traces, which are logs of operations on all cloud resources, such as creation, login, and deletion. You can create data trackers to record data traces, which are logs of operations on data, such as upload and download.
traffic cleaning
Traffic cleaning is a network security service used to precisely identify and discard abnormal traffic on a network to ensure passing of normal traffic. Traffic cleaning is mainly used to protect computers against DDoS attacks.
Traffic Management
Traffic management provides you with visualized network statuses of cloud native applications and allows you to manage and configure network connections and security policies online. Currently, it supports routing rules, load balancing, session sticky, connection pool management, and RBAC for HTTP and TCP traffic.
Training
A HANA training scenario where the users are trained for the deployed SAP HANA or the deployed SAP HANA is demonstrated.
Training Job
A training job is a task submitted by you to train a model. You can edit and develop the code logic of the task in the development environment. After job running, a model is outputted.
Transaction
A transaction is usually an HTTP request (complete process: user request > web server > database > web server > user request). Transactions are one-off tasks, which are completed by using applications. For example, a commodity query in an e-commerce application is a transaction, and a payment is also a transaction.
transaction rate/database throughput
Number of completed transactions in a specified period, generally expressed in transactions per minute (TPM) or transactions per second (TPS). Another term for transaction rate is database throughput. Do not confuse it with the disk throughput. Databases have high transaction rates, so there is little or no disk throughput.
Transmission Control Protocol
According to the RFC 793 definition of the Internet Engineering Task Force (IETF), the Transmission Control Protocol (TCP) is a reliable transmission-layer protocol oriented to connections and based on byte streams.
Trigger
A trigger is a set of user-defined rules for triggering a function or workflow. When the rules are satisfied, an event is generated as an input to trigger the function or workflow.
TRN
See Training
TRNG
See True Random Number Generator
True Random Number Generator
A TRNG is a device that generates unpredictable random numbers by physical processes instead of computer programs.
TST
See Test
TTS
See Text To Speech
TTSC
U-Z
- U
UDP
UDP flood
See UDP flood attack
UDP flood attack
In a User Datagram Protocol (UDP) flood attack, the attacker sends a large number of typically large UDP packets over a botnet at very high rates, thereby exhausting server resources and causing servers unresponsive to normal user requests.
Unhealthy Threshold
Unhealthy threshold is the number of consecutive failed health checks necessary for an ECS to be considered unhealthy.
unidirectional audit
Only the requests to the database are audited.
Unsharded table
Tables that have a small data volume and do not need to be queried by connecting to sharded tables can be created to store data only in the default shards of DDM. These tables are called non-sharded tables. A non-sharded table can be created only by connecting to the schema through the MySQL client or application programs.
unsynchronized data
For primary/standby MySQL or PostgreSQL DB instances, when the failover priority is given to availability, the primary DB instance may have more data than the standby instance due to synchronization delay or other reasons. After a failover occurs, the primary DB instance is demoted to be standby and the standby DB instance is promoted to be primary. The data that has not been synchronized to the new primary DB instance (original standby) will be packaged and uploaded to OBS in SQL statements for download.
User Datagram Protocol
The User Datagram Protocol is a connectionless transmission-layer protocol that provides transaction-oriented transmission service of simple but unreliable information. IETF RFC 768 is the official specifications of UDP. The protocol ID of UDP in IP packets is 17.
user group
A group of users who have the same responsibilities. User groups facilitate centralized user management and permissions management. A user inherits permissions from the user groups to which the user belongs.
UVP
UVP (Unified Virtualization Platform) is a general and open virtualization platform to establish enterprise-class data center.
- V
VAT Invoice OCR
VAT Invoice OCR can recognize the text on the value-added tax (VAT) invoice image for further processing by using technologies, such as image preprocessing, table extraction, text extraction, text recognition, and structured information output, greatly saving labor costs.
Vehicle License OCR
Vehicle License OCR automatically recognizes all information on the original page of vehicle license, and accurately extracts structured information such as plate number, vehicle type, owner, use character, model, vehicle identification number (VIN), engine number, and register date under complex conditions such as dark light, tilt, overexposure, anti-counterfeit watermarks, and shadow.
Version Management
In ModelArts, multiple versions of data are generated when data (such as datasets, training jobs, and models) of jobs of different types is modified. ModelArts records version information and displays it on the management console for you to accurately trace and compare changes between versions.
versioning
Records and stores the versions of objects at different times in the system to trace and manage multiple object versions, so that data of a specific version can be recovered when an anomaly occurs.
Vertex
Vertices represent entities in data models, such as vehicles in the traffic network, stations in the communications network, users and commodities in the e-commerce transaction network, and web pages on the Internet.
Virtual Block Device
An EVS disk type that only supports basic SCSI read/write commands. VBD EVS disks are suitable for enterprise office applications and development and testing environments.
Virtual IP Address
A virtual IP address can be shared among multiple ECSs. An ECS can have both private and virtual IP addresses, and you can access the ECS through either IP address. A virtual IP address has the same network access capabilities as a private IP address, including layer 2 and layer 3 communication in VPCs, access between VPCs using VPC peering connections, as well as access through EIPs, VPN connections, and Direct Connect connections.
Virtual Network Console
VNC is an open-source software based on UNIX and Linux OSs. It provides powerful remote control capabilities.
virtual Network Interface Card
A NIC virtualized from a physical NIC by the virtualization software. A vNIC works like a physical NIC for a virtual machine.
Virtual Private Cloud
A Virtual Private Cloud (VPC) is a secure, isolated, and logical network environment. You can create virtual networks in a VPC. The virtual networks provide the same network functions as those provided by a physical network, as well as providing advanced network services, such as elastic IP addresses and security groups.
Virtual Private Network
The virtual private network (VPN) service establishes an encrypted communication tunnel between a remote user and a VPC, thereby enabling the remote user to use service resources in the VPC.
VNC
vNIC
See virtual Network Interface Card
Volume Backup Service
Volume Backup Service (VBS) backs up and restores Elastic Volume Service (EVS) disks. You can configure backup policies to implement periodic incremental backup of EVS disks and to store data across data centers so as to improve data reliability.
VPC
Indicates the VPC of the protection group. A VPC facilitates internal network management and configuration, allowing secure and quick modifications to networks. Servers in the same VPC can communicate with each other, but those in different VPCs cannot communicate with each other by default.
VPC Peering
A VPC peering connection is a networking connection between two VPCs that enables you to route traffic between them using private IP addresses. ECSs in either VPC can communicate with each other just as if they were in the same VPC. You can create a VPC peering connection between your own VPCs, or between your VPC and another tenant's VPC within the same region.
VSS
See Vulnerability Scan Service
VUL
See Vulnerability
Vulnerability Scan Service
VSS is a security detection service designed for servers and websites.
Vulnerability
A vulnerability is a defect of hardware, software, or protocol in specific implementation or system security policy. Such a defect enables an attacker to access or sabotage a system without being authorized.
- W
WAF
WAL (MRS)
See Write Ahead Log
weak password
A weak password can be easily guessed or cracked because it is simple or commonly used.
Web 2.0
Web 2.0 basically refers to the transition from static HTML Web pages to a dynamic Web that is more organized and based on serving Web applications.
Web Application Firewall
Web Application Firewall (WAF) is designed to keep web services stable and secure. It examines all HTTP and HTTPS requests to detect and block attacks such as Structure Query Language (SQL) injections, cross-site scripting (XSS), webshell upload, command or code injections, file inclusions, sensitive file access, third-party vulnerability exploits, CC attacks, malicious crawlers, and cross-site request forgery (CSRF).
Web Tamper Protection
Web Tamper Protection is a mode in which HSS is provided. This mode protects your files, such as web pages, documents, images, and databases, in specific directories against tampering and sabotage by hackers and viruses.
webshell
A webshell is an attack script. After intruding a website, an attacker mixes .asp, .php, .jsp, or .cgi files with normal web page files. Then, the attacker can access web backdoors using a browser. In other words, the attacker has obtained an environment to run his malicious commands to control the website server. For this reason, webshells are also called backdoor tools.
WORKER
An SAP HANA worker node runs and performs database operations.
world wide name
A World Wide Name (WWN) or World Wide Identifier (WWID) is a unique identifier used in storage technologies including Fiber Channel, Advanced Technology Attachment (ATA) or Serial Attached SCSI (SAS). A WWN may be employed in a variety of roles, such as a serial number or for addressability.
Write Ahead Log
An efficient database algorithm. For the same amount of data, when using WAL log, the database system during the transaction commits disk writes only about half of the traditional rollback log, greatly improving the efficiency of the database disk I/O operations, thereby improving the performance of the database. Each incremental data loads in HBase are written to WAL.
WTP
- X
XML External Entity attack
An XML External Entity attack is a type of attack against an application that parses XML input. This attack occurs when XML input containing a reference to an external entity is processed by a weakly configured XML parser. This attack may lead to the disclosure of confidential data, denial of service, port scanning from the perspective of the machine where the parser is located, and other system impacts.
XSS
XXE attack
- Z
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot