Bu sayfa henüz yerel dilinizde mevcut değildir. Daha fazla dil seçeneği eklemek için yoğun bir şekilde çalışıyoruz. Desteğiniz için teşekkür ederiz.

Compute
Elastic Cloud Server
Huawei Cloud Flexus
Bare Metal Server
Auto Scaling
Image Management Service
Dedicated Host
FunctionGraph
Cloud Phone Host
Huawei Cloud EulerOS
Networking
Virtual Private Cloud
Elastic IP
Elastic Load Balance
NAT Gateway
Direct Connect
Virtual Private Network
VPC Endpoint
Cloud Connect
Enterprise Router
Enterprise Switch
Global Accelerator
Management & Governance
Cloud Eye
Identity and Access Management
Cloud Trace Service
Resource Formation Service
Tag Management Service
Log Tank Service
Config
OneAccess
Resource Access Manager
Simple Message Notification
Application Performance Management
Application Operations Management
Organizations
Optimization Advisor
IAM Identity Center
Cloud Operations Center
Resource Governance Center
Migration
Server Migration Service
Object Storage Migration Service
Cloud Data Migration
Migration Center
Cloud Ecosystem
KooGallery
Partner Center
User Support
My Account
Billing Center
Cost Center
Resource Center
Enterprise Management
Service Tickets
HUAWEI CLOUD (International) FAQs
ICP Filing
Support Plans
My Credentials
Customer Operation Capabilities
Partner Support Plans
Professional Services
Analytics
MapReduce Service
Data Lake Insight
CloudTable Service
Cloud Search Service
Data Lake Visualization
Data Ingestion Service
GaussDB(DWS)
DataArts Studio
Data Lake Factory
DataArts Lake Formation
IoT
IoT Device Access
Others
Product Pricing Details
System Permissions
Console Quick Start
Common FAQs
Instructions for Associating with a HUAWEI CLOUD Partner
Message Center
Security & Compliance
Security Technologies and Applications
Web Application Firewall
Host Security Service
Cloud Firewall
SecMaster
Anti-DDoS Service
Data Encryption Workshop
Database Security Service
Cloud Bastion Host
Data Security Center
Cloud Certificate Manager
Edge Security
Managed Threat Detection
Blockchain
Blockchain Service
Web3 Node Engine Service
Media Services
Media Processing Center
Video On Demand
Live
SparkRTC
MetaStudio
Storage
Object Storage Service
Elastic Volume Service
Cloud Backup and Recovery
Storage Disaster Recovery Service
Scalable File Service Turbo
Scalable File Service
Volume Backup Service
Cloud Server Backup Service
Data Express Service
Dedicated Distributed Storage Service
Containers
Cloud Container Engine
SoftWare Repository for Container
Application Service Mesh
Ubiquitous Cloud Native Service
Cloud Container Instance
Databases
Relational Database Service
Document Database Service
Data Admin Service
Data Replication Service
GeminiDB
GaussDB
Distributed Database Middleware
Database and Application Migration UGO
TaurusDB
Middleware
Distributed Cache Service
API Gateway
Distributed Message Service for Kafka
Distributed Message Service for RabbitMQ
Distributed Message Service for RocketMQ
Cloud Service Engine
Multi-Site High Availability Service
EventGrid
Dedicated Cloud
Dedicated Computing Cluster
Business Applications
Workspace
ROMA Connect
Message & SMS
Domain Name Service
Edge Data Center Management
Meeting
AI
Face Recognition Service
Graph Engine Service
Content Moderation
Image Recognition
Optical Character Recognition
ModelArts
ImageSearch
Conversational Bot Service
Speech Interaction Service
Huawei HiLens
Video Intelligent Analysis Service
Developer Tools
SDK Developer Guide
API Request Signing Guide
Terraform
Koo Command Line Interface
Content Delivery & Edge Computing
Content Delivery Network
Intelligent EdgeFabric
CloudPond
Intelligent EdgeCloud
Solutions
SAP Cloud
High Performance Computing
Developer Services
ServiceStage
CodeArts
CodeArts PerfTest
CodeArts Req
CodeArts Pipeline
CodeArts Build
CodeArts Deploy
CodeArts Artifact
CodeArts TestPlan
CodeArts Check
CodeArts Repo
Cloud Application Engine
MacroVerse aPaaS
KooMessage
KooPhone
KooDrive
On this page

Show all

A-E

    • A
      A record

      See Address record

      AAD

      See Advanced Anti-DDoS

      ABAP Central Services

      ASCS instance includes the Enqueue and Message servers. An SAP NetWeaver system contains only one ASCS instance.

      Abnormal Traffic Inspection & Control System

      The Abnormal Traffic Inspection & Control System (ATIC) consists of a detection center, a cleaning center, and a management center. The detection center detects optical splitting or mirroring traffic. When it detects a traffic abnormality in a defended IP address, it immediately notifies the management center which in turn requests the cleaning center to divert the abnormal traffic.

      access control list

      A group of IP addresses or IPv4 CIDR blocks from which users are allowed to access HUAWEI CLOUD.

      access frequency control

      Frequency of access to an interface is limited by an access control policy.

      access key

      Comprises an access key ID (AK) and secret access key (SK) and is used as a long-term identity credential to sign your requests for HUAWEI CLOUD APIs. AK is used together with SK to sign requests cryptographically, ensuring that the requests are secret, complete, and correct. You can create and manage access keys on the My Credentials > Access Keys page. Alternatively, you can create an access key by calling an API. For account security purposes, do not share your access keys with anyone.

      account

      Created automatically upon successful registration with HUAWEI CLOUD. The account has full access permissions for all of its cloud services and resources.

      account cracking

      Account cracking refers to the intruder behavior of guessing or cracking the password of a system account.

      Accurate Access Protection

      Detection policies can be customized for common fields (such as URL, IP, Params, Cookie, Referer, User-Agent and Header) in HTTP requests. In addition, multi-logic detection policies are supported.

      ACK flood

      See ACK flood attack

      ACK flood attack

      In an ACK flood attack, the attacker sends a large number of ACK packets to the target server through a botnet. As a result, the packets cause link congestion with an excessive load, or requests with changing source addresses or destination ports sent at extremely high rates cause an abnormality in the forwarding device and then lead to network breakdown, or processing capability of the target server is exhausted and the server fails to provide services normally.

      ACL

      See access control list

      Address record

      Address records (A records) are used to specify IP addresses for host names (or domain names). You can use A records to make different domain names point to different IP addresses.

      Advanced Anti-DDoS

      Advanced Anti-DDoS is an advanced defense service based on anti-DDoS traffic cleaning devices and a big data operation platform. It hides and protects users' source sites by forwarding traffic.

      Advanced Encryption Standard

      The AES algorithm is a symmetric grouped password algorithm and one of the most popular symmetric key encryption algorithms released by the U.S. National Institute of Standards and Technology (NIST) on November 26, 2001.

      AES

      See Advanced Encryption Standard

      AI Engine

      An AI engine is a framework that allows you to develop machine learning and deep learning model training jobs, such as TensorFlow and MXNet.

      AK/SK

      See access key

      Alarm

      An alarm is triggered based on an alarm rule. The alarm rule defines the actions that the system takes if a parameter value hits the specified threshold.

      AM

      See ApplicationMaster

      anti-crawler

      WAF has a big crawler characteristics database used to detect crawlers (such as engine crawlers, script crawlers, and scanners).

      AOS

      See Application Orchestration Service

      Apdex

      Apdex is an open standard developed by the Apdex alliance. It defines a standard method to measure application performance. The Apdex standard converts the application response time into user satisfaction with application performance in the range of 0 to 1.

      Application

      You can put services of the same type into the same application for better performance management. For example, you can put accounts, products, and payment services into the Mall application.

      Application

      See Application

      Application

      An application is a service system with functions and consists of one or more application components.

      Application Component

      See Application Component

      Application Component

      An application component implements a service feature of an application. It is in the form of code or software packages and can be deployed independently.

      Application Orchestration Service

      Application Orchestration Service (AOS) enables enterprises to automate application cloudification. By orchestrating mainstream cloud services of HUAWEI CLOUD, you can create, replicate, and migrate your applications and provision required cloud resources with a few clicks.

      Application Service Mesh

      HUAWEI CLOUD Application Service Mesh (ASM) is a high-performance, high-reliability, and easy-to-use service mesh in infrastructure mode. It enables you to manage and monitor service traffic, ensure secure access, and perform grayscale releases for stable service iteration. In addition, ASM has excellent compatibility. Its control plane and data plane are fully compatible with the open-source Istio. ASM also seamlessly interconnects with HUAWEI CLOUD Cloud Container Engine (CCE), an enterprise-class Kubernetes cluster service, to provide you with out-of-the-box features.

      ApplicationMaster

      Manages the life cycle of applications.

      AS

      See Auto Scaling

      AS configuration

      An AS configuration is a template listing specifications for the instances to be added to an AS group.

      AS group

      An AS group consists of a collection of instances that apply to the same scenario. It is the basis for enabling or disabling AS policies and performing scaling actions.

      AS policy

      An AS policy defines the condition to trigger a scaling action and the operation to be performed in a scaling action. When the trigger condition is met, the system automatically triggers a scaling action.

      ASCS

      See ABAP Central Services

      ASM

      See Application Service Mesh

      ASR

      See Automatic Speech Recognition

      ASRC

      See Automatic Speech Recognition Customization

      asynchronous replication

      After an application initiates a data update (including insert, delete, and modify data) request, Master commits data and returns a response to the application immediately. With asynchronous replication, Master does not need to wait for Slave and data is asynchronously replicated from Master to Slave. Therefore, the performance is high, but data may be inconsistent.

      ATIC

      See Abnormal Traffic Inspection & Control System

      Attaching a replication pair to a protected instance

      Indicates to attach the two disks in a replication pair to the two servers in a protected instance.

      Auto Scaling

      Auto Scaling automatically adjusts resources to keep up with changes in demand based on pre-configured AS policies.

      automated backup

      RDS automatically creates full backups for DB instances. You can set the automated backup start time and backup retention period.

      Automatic Speech Recognition

      ASR converts audio recordings whose duration is within 1 minute and whose size is less than 4 MB into text.

      Automatic Speech Recognition Customization

      ASRC provides the Sentence Transcription and Long Audio Transcription functions. Sentence Transcription recognizes audio recordings with a shorter duration at a faster speed, and Long Audio Transcription performs well in recognizing audio recordings with a longer duration.

      availability priority

      During a primary/standby failover, if data is inconsistent between primary and standby DB instances and the synchronization delay is no more than 5 minutes, a failover is still performed to ensure service availability. If the delay is longer than five minutes, the failover is not performed and database services are stopped to prevent data loss.

      availability zone

      An AZ contains one or more physical data centers. Each AZ has independent cooling, fire extinguishing, moisture-proof, and electricity facilities. Within an AZ, computing, network, storage, and other resources are logically divided into multiple clusters. AZs within a region are interconnected using high-speed optical fibers to support cross-AZ high-availability systems.

      AZ

      See availability zone

    • B
      backup

      A process of creating data copies on backup media. If the source data is damaged or lost, the data copies can be used to restore the source data.

      backup consistency

      There are three types of backup consistency: Inconsistent backup: backs up files and disks in different points in time. Crash-consistent backup: captures data existing on disks upon backup and backs up files and disks at the same point in time, without backing up memory data and quiescing application systems. In such a manner, backup consistency of application systems is ensured. Though the application consistency is not ensured, disks, such as chkdsk, will be checked upon operating system re-startup to restore damaged data and log rollback will be performed on databases to keep data consistent. Application-consistent backup: backs up files and disks at the same point in time, including memory data, to ensure application system consistency.

      Backup migration

      Backup migration refers to one-time database migration or migration with minimal service interruption by uploading and restoring full and incremental database backups.

      backup policy

      A policy used to automatically back up data by specifying the backup time, backup period, retention rules, and other items. After a backup target is associated with a backup policy, the system will automatically back up data and delete expired backups according to the policy.

      backup retention period

      Retention period for automated backups. After the retention period expires, automated backups will be deleted automatically.

      backup storage

      The underlying storage resources used for storing backup data and logs of a database persistently.

      Bandwidth

      The bandwidth represents network usage, facilitating service charging.

      bandwidth scaling

      AS automatically adjusts the EIP bandwidth based on the configured bandwidth scaling policy.

      Bare Metal Server

      A Bare Metal Server (BMS) is a physical server that is dedicated for you on the cloud. It provides the excellent computing performance and data security needed for core databases, key application systems, high-performance computing (HPC), and Big Data services. With the high scalability offered by cloud resources, you can apply for and use BMSs flexibly.

      Batch

      See Batch Service (Batch)

      Batch Service (Batch)

      Batch Service (Batch) lets you to run large-scale batch computing jobs. Using Batch, you can manage your resources, schedule your jobs, and export the task run logs with ease.

      Batch Service (ModelArts)

      The batch services are used to process batch data stored in OBS buckets at a time.

      BCS

      See Blockchain Service

      BGP

      See Border Gateway Protocol

      bidirectional audit

      Both requests to and responses from the database are audited.

      black hole

      A black hole is a status where a server detects zero access traffic from the Internet because Internet access to the server has been blocked.

      Blacklist and Whitelist

      The IP address whitelist is a list of trusted IP addresses and traffic from these IP addresses is not subject to attack detection. The IP address blacklist is a list of malicious IP addresses and traffic from these IP addresses is subject to actions specified in detection policies.

      Block

      The smallest logical unit of storage in HDFS. Each HDFS file is stored as one or more blocks. All blocks are stored on DataNodes.

      Blockchain

      In a narrow sense, a blockchain is a list of data records (called blocks) linked in chronological order using cryptography and a distributed ledger to prevent data tampering and forging. In a broad sense, the blockchain technology is a new distributed infrastructure and computing paradigm. Blockchain verifies and stores data using the special blockchain data structure, generates and updates data using distributed node consensus algorithms, secures data transmission and access using cryptography, and implements programming and data operation using smart contracts formed by automated scripts.

      Blockchain Service

      Blockchain Service (BCS) is a highly available and secure blockchain platform allowing enterprises and developers to conveniently create, deploy, and manage applications with the superb performance and cost-effectiveness of HUAWEI CLOUD.

      Blue-Green Deployment

      Blue-green deployment is a zero-downtime deployment mode. A new version of an application is deployed and tested in a production environment while the live environment continues to serve all production traffic. When you confirm that the new version is functioning properly, traffic is then distributed to the new version. At the same time, the old version is upgraded to the new version. Blue-green deployment allows you to quickly switch between the two versions to effectively prevent service disruption during deployment.

      BMS

      See Bare Metal Server

      Boot File

      A training job may have multiple code files. A boot file specifies the file from which the training job starts to run.

      Border Gateway Protocol

      The Border Gateway Protocol (BGP) is an inter-autonomous system routing protocol running over TCP. A BGP system is used to exchange routing information with another BGP system.

      Bring Your Own License

      If you have an OS or a software license (a license whose certified items include number of physical sockets and physical cores), you can migrate your services to the cloud platform using the BYOL feature. Then, you can continue to use your existing licenses without additional charges.

      bucket

      Buckets are containers for storing objects. A bucket name must be unique.

      bucket policy

      A group of control policies that accept or reject requests to access buckets, and control the permissions of one or more users to access buckets and objects in buckets.

      Built-in Algorithms

      Built-in algorithms are training code built in ModelArts that can be directly reused.

      Business Warehouse on HANA

      An SAP HANA application scenario where SAP HANA provides data analysis.

      BWoH

      See Business Warehouse on HANA

      BYOL

      See Bring Your Own License

    • C
      CA

      See Certificate Authority

      Canary Release

      A certain proportion of production traffic on the live network is distributed to a new version of the application to test the version's performance and detect faults while ensuring stable running of the system.

      CBR

      See Cloud Backup and Recovery

      CBS

      See Conversational Bot Service

      CC attack

      See challenge collapsar attack

      CCE

      See Cloud Container Engine

      CDM

      See Cloud Data Migration

      CDM Cluster

      See Cloud Data Migration Cluster

      Cell

      A {row, column} tuple exactly specifies a cell in HBase. Cell content is uninterpreted bytes.

      Certificate Authority

      As a trusted third party in e-commerce transactions, a CA is responsible for validity verification of a public key in a public key system.

      Certificate Signing Request

      A CSR is a file that needs to be submitted to a CA in order to get an SSL certificate. A CSR contains a public key and a distinguished name (DN). Typically, a CSR is generated by a web server, during which a pair of public and private keys is also created for encryption and decryption purposes.

      challenge collapsar attack

      A Challenge Collapsar (CC) attack is targeted at web servers or application programs by means of standard GET or POST requests used for obtaining information. If the requests involve Universal Resource Identifiers (URIs) of database operations or URIs consuming other system resources, server resources are exhausted and the target servers will be unable to respond normally.

      Channel

      A channel isolates the ledger data of a transaction from other transaction data in a consortium blockchain to ensure confidentiality. Each channel can be considered as a sub-blockchain and corresponds to a specific ledger. The ledger in a channel is invisible to other channels.

      checkpoint

      Checkpoints are criteria you define. CPTS uses them to check whether the content returned by servers is correct.

      CLI

      See Command Line Interface

      Cloud Backup and Recovery

      Cloud Backup and Recovery allows users to back up cloud servers, disks, SFS Turbo file systems, and on-premises VMware virtual environments with ease. In case of a virus attack, accidental deletion, or software or hardware fault, data can be restored to any backup point.

      Cloud Container Engine

      Cloud Container Engine (CCE) is a highly reliable and high-performance service that allows enterprises to manage containerized applications. With support for Kubernetes-native applications and tools, CCE makes it simple to set up an environment for running containers on the cloud.

      Cloud Data Migration

      Cloud Data Migration (CDM) enables data migration among various data sources. It allows you to migrate data between public cloud services or between the public cloud and local service systems.

      Cloud Data Migration Cluster

      A CDM cluster is a CDM instance that you have purchased. It consists of one or multiple VMs. Data of different CDM clusters is isolated. You can purchase multiple CDM clusters to isolate data access permissions among different departments.

      cloud database

      Service-oriented database services such as Relational Database Service (RDS) and Document Database Service (DDS) provided by cloud service providers.

      Cloud Eye

      Cloud Eye is a multi-dimensional resource monitoring platform. You can use Cloud Eye to monitor the utilization of service resources, track the running status of cloud services, configure alarm rules and notifications, and quickly respond to resource changes.

      Cloud Performance Test Service

      Cloud Performance Test Service (CPTS) provides performance tests on cloud applications built based on HTTP, HTTPS, TCP, or UDP.

      Cloud Search Service

      Cloud Search Service is a fully managed, distributed search service. It is fully compatible with open-source Elasticsearch and provides users with structured and unstructured data search, statistics, and report capabilities.

      Cloud Server Backup Service

      Cloud Server Backup Service (CSBS) enables backup of entire Elastic Cloud Servers (ECSs), including VM specifications, system disks, and data disks. When an ECS becomes faulty, data can be restored from consistency backups of multiple Elastic Volume Service (EVS) disks to ensure maximum data security and accuracy.

      cloud service provider

      A company or an organization that provides cloud computing services.

      Cluster

      See Cluster

      Cluster

      A cluster is a group of nodes that can be physical servers or virtual machines with Kubernetes installed.

      cluster (CSS)

      Cloud Search Service provides functions on a per cluster basis. A cluster represents an independent search service that consists of multiple instances.

      CMDI

      See command injection

      CMK

      See Customer Master Key

      code injection

      Code injection is an attack that exploits logic defects of web applications in input validation or code execution vulnerabilities of some script functions.

      CODEI

      See code injection

      cold backup

      A cold backup is performed when a system is stopped or being maintained. The backup data is completely the same as the data in the system at the point in time.

      Column (MRS)

      A column is one of HBase table dimensions. A column name has the form "family:label" where family and label can be arbitrary byte arrays. A table enforces its set of families (called "column families"). Each column in an HBase table belongs to a column family.

      Column Family

      A column family is a predefined arbitrary set of columns and stored in HBase Schema. To create some columns in a column family, you should create the column family first. A column family regroups data of a same nature in HBase and has no constraint on the type. Every row of data in a column family is physically stored on the same server. Each column family is as an attribute, such as a compression package, a timestamp, block cache, and so on.

      command injection

      Exploiting web application interfaces allowed to invoke system commands, attackers use commands generated at the server end by command splicing and blacklist bypassing to attack services.

      Command Line Interface

      A means of communication between a program and its user, based solely on textual input and output.

      Common Vulnerabilities and Exposures

      Common Vulnerabilities and Exposures (CVE) is a list of common identifiers for publicly known cyber security vulnerabilities. Use of CVE Identifiers, or "CVE IDs" which are assigned by CVE Numbering Authorities (CNAs) from around the world, ensures confidence among parties when used to discuss or share information about a unique software or firmware vulnerability, provides a baseline for tool evaluation, and enables data exchange for cybersecurity automation.

      component

      A component is a carrier of user data.

      Computation Unit

      Measurement unit of computing resources. A CU includes a 1-core CPU and 4 GB memory.

      compute resource

      A compute resource is the cloud service resource required for running node tasks such as Spark, MRS, and Hive node tasks in a job. Compute resources can be created on demand for cost saving.

      config

      config is a special mongod that stores metadata of a DB instance. config is deployed as a replica set. To create a DB instance or modify metadata of a DB instance, config must be available.

      Connection Address

      An IP address, which is used for the DAS service to connect to the database.

      Connector

      A connector is a built-in object template used for connecting to a data source. Currently, CDM uses OBS, MRS, and databases as connectors. New connectors can be added to CDM as well.

      Consulting Services

      Consulting services are offered on the Marketplace as products. This type of products is not traded on the Marketplace. The Marketplace only provides links to access the products on sellers' official websites.

      Consumer Group

      A consumer group is a group of consumer clients with certain characteristics. Messages in a queue can be retrieved by multiple consumer groups.

      Container

      See Container

      Container

      A container is a running instance created from a container image. Multiple containers can run on one node.

      Containerized Application

      A containerized application can be created using a container image or a template. Each containerized application contains one or multiple containers.

      Content Moderation

      Content Moderation uses the deep learning technology to automatically detects illegal content in images, videos, and text files, making content legality reviews more efficient and labor-saving.

      Conversational Bot Service

      Conversational Bot Service (CBS) is a cloud service developed based on artificial intelligence (AI) technologies for enterprise application scenarios.

      cooldown period

      Cooldown period specifies how long any alarm-triggered scaling action will be disallowed after a previous scaling action is complete. This cooldown period does not apply to scheduled or periodic scaling actions.

      Copyrighted Image Search

      ImageSearch can quickly locate images being used in large-scale galleries that infringe on copyrights, helping protect your rights and interests

      Core Node

      A core node in a MapReduce Service cluster processes data and stores process data in the HDFS.

      CORS

      See cross-origin resource sharing

      CPTS

      See Cloud Performance Test Service

      crawler

      A crawler is a program or script used for automatically obtaining information from World Wide Web.

      Creating an Instance

      ImageSearch allows you to create an image search instance based on your needs

      CRM

      See Customer Relationship Management

      cross-origin resource sharing

      Cross-origin resource sharing (CORS) is a mechanism that allows many resources (such as, fonts and JavaScript) on a web page to be requested from another domain.

      cross-site request forgery

      Cross-site request forgery is another common web attack. Attackers forge data for targets to access. If the browsers of the targets maintain the authentication sessions with the destination sites, the targets unknowingly send requests forged by attackers to the destination sites when accessing the attacker-forged pages or URLs.

      cross-site scripting

      XSS is a type of web security vulnerability used by attackers to steal user information. Using the vulnerability, attackers inject malicious code into web pages. The code is executed to steal user information when users browse the web pages.

      CSP

      See cloud service provider

      CSR

      See Certificate Signing Request

      CSRF/XSRF

      See cross-site request forgery

      CSS

      See Cloud Search Service

      CU

      See Computation Unit

      Customer

      A customer, also called an end user, is a natural person, legal person, or an organization that purchases Marketplace products or HUAWEI CLOUD services.

      Customer Master Key

      A CMK is a key created with KMS and used to encrypt and protect DEKs.

      Customer Relationship Management

      To improve core competitiveness, CRM uses information technologies and Internet technologies to coordinate the interaction between enterprises and customers on sales, marketing, and services, thereby improving enterprise management methods and providing personalized customer interactions and services.

      CVE

      See Common Vulnerabilities and Exposures

    • D
      DAS

      See Data Admin Service

      Data Admin Service

      Data Admin Service (DAS) enables you to manage DB instances on a web console, making your database management easy, efficient, and secure. It supports functions such as basic SQL operations, advanced database management, and intelligent SQL tuning, meeting your service requirements for daily R&D, database O&M, database management, and security.

      data connection

      A data connection is a collection of information required for accessing data storage (computing) space, including the connection type, name, and login information.

      Data Control Language

      Statement used for setting or modifying the permission of a database user or role.

      Data Definition Language (MRS)

      A language used to define the data structure and database objects in the HiveQL set. It consists of three types of syntax: CREATE, ALTER, and DROP. Derived from the Conference on Data Systems Languages (Codasyl) model, the DDL has become a subset of SQL.

      Data disk image

      A data disk image contains service data. It can be used to create EVS disks during ECS creation, or be used to create EVS disks that are attached to ECSs. Through data disk images, you can migrate your service data to the cloud.

      Data Encryption Key

      A DEK is used to encrypt users' data.

      Data Encryption Workshop

      Data encryption Workshop (DEW) is a full-stack data encryption service in the cloud. It covers Key Management Service (KMS), Key Pair Service (KPS), and Dedicated HSM. DEW uses hardware security modules (HSMs) to protect the security of your keys, and can be integrated with other services to meet even the most demanding scenarios.

      Data Express Service

      Data Express Service is a massive data transmission solution. It allows a large amount of data to be transmitted from physical storage media, including Teleports and hard disks (such as external USB flash drives, SATA disks, and SAS disks) to HUAWEI CLOUD.

      Data Ingestion Service

      Data Ingestion Service (DIS) addresses the challenge of transmitting data within the cloud and from outside the cloud to inside the cloud. With DIS, you can build custom applications to process or analyze streaming data for specific needs.

      Data Lake Factory

      DLF is a cloud service that provides one-stop Big Data development environment and has full-hosting Big Data scheduling capabilities. In the Big Data development environment, users can complete an entire data processing and analysis procedure from data modeling, data integration, script development, workflow orchestration, to O&M monitoring, greatly reducing the threshold for using Big Data.

      Data Lake Insight Service

      Data Lake Insight (DLI) is a serverless big data compute and analysis service that is fully compatible with Apache Spark and Apache Flink ecosystems and supports batch streaming. With multi-model engines, enterprises can use SQL statements or programs to easily complete batch processing, stream processing, in-memory computing, and machine learning of heterogeneous data sources.

      Data Lake Visualization

      Data Lake Visualization (DLV) is a one-stop data visualization platform that adapts to various data sources in the cloud or on-premises. By dragging and dropping 2D and 3D visual components on DLV, you can quickly customize and create a data screen of your own.

      Data Manipulation Language (MRS)

      An instruction set for accessing objects in databases. The core instructions in this set are INSERT, UPDATE, and DELETE, which respectively mean inserting, updating, and deleting. These instructions are indispensable for developing data-centered applications.

      Data Manipulation Language (DLI)

      An instruction set used for accessing data for database objects.

      Data Plane Development Kit

      A collection of development platforms and interfaces for quickly processing data packets. DPDK runs on Intel x86 platforms.

      data record

      A data record is the unit of data stored in a DIS stream. A data record is composed of a sequence number, partition key, and data blob. Data blobs are key data added by data producers to DIS streams. The payload of a data blob can be up to 1 MB before Base64 encoding.

      data replication

      In an HA architecture, data committed to a primary instance will be replicated to a standby instance. Data replications come in three types: fully synchronous replication, semi-synchronous replication, and asynchronous replication.

      Data Replication Service

      Data Replication Service (DRS) is a stable, efficient, and easy-to-use cloud service for database online migration and synchronization. It simplifies data transmission processes and reduces transmission costs.

      data screen

      A data screen serves as a dashboard generated to present data on DLV. It is also called a visualization project, visual application, or screen project. On this screen, data is converted to various charts or maps and presented to users in real time.

      Data Warehouse (DLF)

      A data warehouse is a collection of data that is topic oriented, integrated, and stable, and can reflect historical changes. It is used for management decision-making. A DIS data warehouse refers to a data warehouse on the Huawei cloud, such as DWS, DLI, and MRS Hive.

      Data Warehouse (SAP HANA)

      An integration center that stores a large amount of data. DWH is a core component of business intelligence (BI), which allows carriers to perform intelligent business analysis on users based on the massive user data stored in the data warehouse.

      Database

      A database is a collection of related data. Serving various applications, the data is structured and has no harmful or unnecessary redundancy. The data is stored separately from the relevant programs. You can use a common and controllable method to insert new data into the database in addition to modifying and searching the data in the database.

      database administrator

      A person who is responsible for managing databases. A DBA uses dedicated software to store and organize data. Their responsibilities include but are not limited to capacity planning, installation, configuration, database design, migration, performance monitoring, security, troubleshooting, and data backup and restoration.

      database administrator account

      A database administrator account is different from a user cloud account and used only within the RDS system to control access to RDS DB instances. You can use the database administrator account to access DB instances. For example, when you are creating a MySQL DB instance, the administrator account root is created by default and you can specify the root password. After the DB instance is created, you can connect to it using the root account. You can also create additional database accounts as needed.

      database master password

      A string that defines the password for the database master user. The database master password is a string of 8 to 32 characters. It must contain uppercase letters, lowercase letters, digits, and special characters. You can use the following special characters: ~!@#%^*-_=+?

      database migration

      Database operation and maintenance (O&M) activities aiming to change the database platform, including migration to a new server or a new DB engine. Migration from on-premises databases to the cloud is common.

      Database Security Service

      The Database Security Service (DBSS) is a security service that protects databases on clouds. Based on the reverse proxy and machine learning technologies, it provides functions such as data masking, database auditing, sensitive data discovery, and injection attack prevention.

      database storage

      The underlying storage resources used for storing data and logs of a database permanently.

      database synchronization

      A process of establishing consistency among data from a source database to a target, automatically copying changes back and forth.

      database type

      Database types are classified into relational databases and non-relational databases.

      database user

      A user that accesses DDS. Currently, the default username is rwuser.

      DataNode

      DataNodes, usually one per node in the HDFS cluster, manage storage attached to the nodes that they run on.

      Dataset

      A dataset is sample data stored in an OBS bucket and used for training models. ModelArts can manage the versions of datasets and switch different versions in different scenarios.

      DB

      See Database

      DB connections

      The number of client sessions that are connected to a DB instance.

      DB engine

      A DB engine is vital for storing, processing, and protecting data. It can be used to control access permissions and process transactions rapidly. Each DB instance runs a DB engine.

      DB instance

      A DB instance is an isolated database environment in the cloud. It is a basic building block of RDS. A DB instance can contain multiple user-created databases. You can access your DB instance by using the same tools and applications that you use with a standalone DB instance.

      DB instance class

      The DB instance class determines the compute and memory capacity of a DB instance. You can change the CPU or memory of an available DB instance by changing its DB instance class.

      DB instance ID

      A DB instance ID uniquely identifies a DB instance in a region.

      DB instance lifecycle

      A DB instance lifecycle starts from the time when the DB instance is created to the time when the DB instance is deleted. During a DB instance lifecycle, you can back up and restore data, change instance classes, scale up storage space, and reboot or delete the instance.

      DB parameter group

      A database parameter group functions as a container for engine configuration values that can be applied to one or more DB instances. If users create a DB instance without specifying a DB parameter group, the default parameter group is used. The default parameter group contains the default values of the engine and database system optimized for the running DB instances. If users want their DB instances to run with their self-defined engine configuration values, they can simply create a new database parameter group, modify certain parameters, and associate the new DB parameter group to a DB instance. Once associated, all DB instances that use this particular DB parameter group get all the parameter updates to that DB parameter group.

      DB parameter template

      A database parameter template functions as a container for engine configuration values that can be applied to one or more DB instances. If you create a DB instance without specifying a parameter template, the default parameter template is used. Each default parameter template contains database engine defaults and RDS system defaults. You can also create your own parameter template where you choose your own parameter settings and apply the parameter template to DB instances. If you update parameters in a parameter template, the changes apply to all DB instances that are applied with the template.

      DBA

      See database administrator

      DBSS

      See Database Security Service

      DCL

      See Data Control Language

      DDL (MRS)

      See Data Definition Language (MRS)

      DDM

      See Distributed Database Middleware

      DDM instance

      A DDM instance is the minimum resource unit of DDM, which runs on an ECS. DDM instances currently support three types of specifications, including 8 vCPUs | 16 GB, 16 vCPUs | 32 GB, and 32 vCPUs | 64 GB. You can apply for suitable DDM instances according to service requirements.

      DDoS attack

      See distributed denial of service attack

      DDS

      See Document Database Service

      Dedicated Computing Cluster

      Dedicated Computing Cluster (DCC) provides dedicated, physically isolated computing resource pools on HUAWEI CLOUD, allowing you to use physical computing devices and resources exclusively.

      Dedicated Host

      A Dedicated Host (DeH) is a physical server fully dedicated for your own services. DeH allows you to ensure security and performance by keeping compute resources isolated.

      DeH

      See Dedicated Host

      DEK

      See Data Encryption Key

      Delivery Method

      Method of delivering Marketplace products, such as images, software as a service (SaaS), consulting services, licenses.

      DES

      See Data Express Service

      Destination job configuration

      During job creation, a destination link specifies the data source where the data is to be loaded, for example, a table or directory. The destination job parameter settings vary with destination links. You can set related parameters in the destination job configuration.

      Destination server

      A destination server refers to the destination server to which a source server is migrated in a server migration task. In SMS, a destination server is an ECS on HUAWEI CLOUD.

      Detaching a replication pair from a protected instance

      Indicates to detach the two disks in a replication pair from the two servers in a protected instance.

      detection based on semantic analysis

      A syntax tree is built based on the semantic context to determine whether a load is an attack load.

      DEV

      See Development

      Development

      A HANA development scenario where development engineers configure and verify the compatibility between application software and SAP HANA and continuously optimize the application software.

      Development Environment

      A development environment is an editor required for developing AI training jobs.

      DEW

      See Data Encryption Workshop

      Direct Connect

      A service that allows users to establish a high-speed, stable, secure, and dedicated network connection from data centers to the public cloud. It enables users to take full advantage of strengths of public cloud services while continue to use existing IT facilities, establishing a scalable and hybrid cloud computing environment.

      DIS

      See Data Ingestion Service

      Disabling protection

      Can be performed after the data synchronization is complete. Once the protection is disabled, the data synchronization stops, and the protection status of the protection group changes to Stopped.

      Disaster Recovery

      The recovery of data, access to data and associated processing through a comprehensive process of setting up a redundant site (equipment and work space) with recovery of operational data to continue business operations after a loss of use of all or part of a data center. This involves not only an essential set of data but also an essential set of all the hardware and software to continue processing of that data and business. Any disaster recovery may involve some amount of down time.

      Distributed Consensus

      A majority of independent participants in a system need to achieve consensus on a transaction or operation, for example, verification of double-spending transactions, verification of transaction validity, and the decision on whether to write verified data to the existing ledger.

      Distributed Database Middleware

      Distributed Database Middleware (DDM) is designed to solve distributed expansion issues of databases. It breaks the capacity and performance bottlenecks of traditional databases to achieve high concurrent access to mass data.DDM uses the Huawei Relational Database Service (RDS) as the storage engine and provides full-lifecycle O&M management capabilities, such as automatic deployment, sharding, flexible scaling, and high availability.

      distributed denial of service attack

      A denial-of-service (DoS) attack (a flood attack) is an attempt to use up the network or system resources of a computer to temporarily interrupt or stop services on the computer, thereby causing users unable to access the services normally. A DDoS attack is one in which two or more compromised computers are used to attack a single target, thereby causing denial of service for users of the targeted computer.

      Distributed Ledger

      A distributed ledger is a database shared, replicated, and synchronized among network participants. It records transactions such as exchange of assets and data between network participants. Use of a distributed ledger eliminates the need for reconciliation, saving time and costs.

      Distributed Message Service

      Distributed Message Service (DMS) is a reliable, scalable, fully managed message queuing service that provides concurrent access at scale using the distributed, highly available cluster technology. DMS decouples components of a cloud application, delivering substantial cost benefits.

      Distributed Message Service for Kafka

      Distributed Message Service (DMS) for Kafka is a message queuing service based on Apache Kafka. This service provides Kafka premium instances. The computing, storage, and bandwidth resources used by an instance are exclusively occupied by the user. You can apply for instances as required and customize partitions and replicas for the topics in the instances. The instances can be used right out of the box, taking off the deployment and O&M pressure for you so that you can focus on developing your services.

      Distributed Message Service for RabbitMQ

      Distributed Message Service (DMS) for Kafka is a message queuing service based on Apache Kafka. This service provides Kafka premium instances. The compute, storage, and bandwidth resources used by your instances are exclusively occupied by you. You can apply for instances as required and customize partitions and replicas for the topics in the instances. The instances can be used right out of the box, taking off the deployment and O&M pressure for you so that you can focus on developing your services.

      DLF

      See Data Lake Factory

      DLI

      See Data Lake Insight Service

      DLI Table

      Table that stores data of DLI.

      DLV

      See Data Lake Visualization

      DML (MRS)

      See Data Manipulation Language (MRS)

      DML (DLI)

      See Data Manipulation Language (DLI)

      DMS

      See Distributed Message Service

      DMS for Kafka

      See Distributed Message Service for Kafka

      DMS for RabbitMQ

      See Distributed Message Service for RabbitMQ

      DN (MRS)

      See DataNode

      DNS

      See domain name server

      DN (VSS)

      See Domain Name

      document

      An entity for Elasticsearch storage. Equivalent to the row in the RDB, the document is the basic unit that can be indexed.

      Document Database Service

      DDS is a database service compatible with the MongoDB protocol and is secure, highly available, reliable, scalable, and easy to use. It provides DB instance creation, scaling, redundancy, backup, restoration, monitoring, and alarm reporting functions with just a few clicks on the DDS console.

      document type

      Similar to the table in the RDB, the document type is used to distinguish between different data. One index can contain multiple document types. A document actually must be indexed to a document type inside an index.

      Domain Name

      Domain names refer to the names that are registered to domain name registrars by individuals or organizations, such as enterprises, governments, or non-governmental organizations. Domain names serve as the network addresses for the communication between enterprises or organizations on the Internet. Each domain name corresponds to an IP address.

      domain name server

      A domain name server (DNS) is a functional entity in the TCP/IP network. With deployment of the DNS, subscribers can access related servers using corresponding domain names. In the TCP/IP network, a domain name maps an IP address. Domain names are easier to remember but servers in the network communicate with each other using IP addresses. Therefore the DNS is used to convert domain names to corresponding IP addresses.

      Domain Verification

      Users' identity and other relevant information are verified.

      DR

      See Disaster Recovery

      DR direction

      Indicates the data replication direction. The data replication is from the source AZ to the target AZ when users create a protection group. After users perform a planned failover, the data replication is from the target AZ to the source AZ.

      DR drill

      Is to verify that a target server can take over services from a source server once a failover is performed.

      DR site

      A DR site is the data center that does not carry services when the production site works properly. It is used to back up data in real time. When the production site fails (planned or unexpected), the DR site can take over the services after a failover. It can reside in the same city as the service management center or in another city.

      Driving License OCR

      Driving License OCR automatically recognizes all information on the original page of driving licenses, and accurately extracts structured information such as name, gender, issue date, driving class, and validity period under complex conditions such as dark light, tilt, overexposure, anti-counterfeit watermarks, and shadow.

      DRS

      See Data Replication Service

      DWH

      See Data Warehouse (SAP HANA)

    • E
      Edge

      Edges represent relationships in data models, such as friend relationships in the social network, user rating and purchase behavior in the e-commerce transaction network, cooperation relationships between authors of a paper, and index relationships between articles.

      Edge Service

      A model can be deployed as a service on an edge server, then the edge server provides the service to peripheral devices.

      Elastic Cloud Server

      An Elastic Cloud Server (ECS) is a computing server consisting of vCPUs, memory, image, and Elastic Volume Service (EVS) disks that allow on-demand allocation and elastic scaling. ECSs integrate Virtual Private Cloud (VPC), virtual firewalls, and multi-data-copy capabilities to create an efficient, reliable, and secure computing environment. This ensures stable and uninterrupted operation of services.

      Elastic IP

      An elastic IP address (EIP) can be bound to any ECSs in your account rather than a specified ECS. Different from a static IP address, when an ECS or its AZ is unavailable, its EIP can quickly redirect to the Internet IP address of any ECS in your account.

      Elastic IP

      An elastic IP address (EIP) can be bound to any ECSs in your account rather than a specified ECS. Different from a static IP address, when an ECS or its AZ is unavailable, its EIP can quickly redirect to the Internet IP address of any ECS in your account.

      Elastic Load Balance

      Elastic Load Balance (ELB) is a service that automatically distributes incoming traffic across multiple Elastic Cloud Servers (ECSs) to balance their service load. It enables you to increase service capabilities and fault tolerance of your applications.

      Elastic Volume Service

      The Elastic Volume Service (EVS) offers scalable block storage for servers. With high reliability, high performance, and rich specifications, EVS disks can be used for distributed file systems, development and test environments, data warehouse applications, and high-performance computing (HPC) scenarios to meet diverse service requirements. EVS disks are sometimes just referred to as disks.

      Elasticsearch

      Elasticsearch is an open-source system that provides both the search engine and NoSQL database functions. It is built based on Lucene and can be used for full-text search, structured search, and near real-time analysis.

      Enabling protection

      Can be performed after a protection group is created, data synchronization stops, or a failover is performed. Once the protection is enabled, the data synchronization starts, and the synchronization progress is displayed on the web page. This action affects all the protected instances in the protection group.

      English Customs Form OCR

      English Customs Form OCR coverts English text and digits from customs document images into editable text. English Customs Form OCR uses automatic locating and segmentation algorithms, distributed algorithm architecture, and deep learning method to correct errors. After large-scale training on characters and images, English Customs Form OCR can accurately recognize text.

      enhanced backup

      Enhanced backups support Instant Restore. Common backups do not support Instant Restore.

      Enqueue Replication Server

      ERS ensures high availability for ASCS instance and protects Message server and Enqueue server on ASCS instance.

      Enqueue Server

      Enqueue server is a special lock mechanism in the SAP system, which prevents a line of data from being simultaneously changed by two processes and ensures consistency in updating databases.

      Enterprise Resource Planning

      A company-wide computer software system that is used to manage and coordinate all the resources, information, and functions of a business from shared data stores.

      Envelope Encryption

      Envelope encryption is an encryption method that enables data encryption keys to be stored, transmitted, and used in "envelopes", unlike the CMK method that directly encrypts and decrypts data.

      Environment

      See Environment

      Environment

      Environment is a collection of infrastructures, covering computing, storage, and networks, used for application deployment and running. ServiceStage combines basic resources, such as Cloud Container Engine (CCE) and Elastic Cloud Server (ECS) and optional resources, such as Elastic Load Balance (ELB), Relational Database Service (RDS), and Distributed Cache Service (DCS) in the same VPC into an environment, such as the development environment, testing environment, pre-production environment, and production environment. Networks in an environment can communicate with each other. You can manage resources and deploy services by environment, simplifying infrastructure O&M.

      ERP

      See Enterprise Resource Planning

      ERS

      See Enqueue Replication Server

      Event

      An event is an input parameter for executing a function. For example, the parameter for pulling messages from a Distributed Message Service (DMS) queue, for calling an API, or for receiving messages from a Simple Message Notification (SMN) topic.

      EVS

      See Elastic Volume Service

      Executor

      A process launched for an application on a worker node, that runs tasks and keeps data in memory or disk storage across them. Each application has its own executors.

      Exeml

      Auto Learning is the process of automating model design, parameter tuning and training, and model compression and deployment with the labeled data. The process is free of coding and does not require developers' experience in model development.

    F-J

      • F
        Face Detection

        Face Detection accurately locates faces in an image and identifies the size of each face. With Face Detection, you can detect front faces and side faces with different tilts in the image.

        Face Label

        Face Label clusters and labels faces with the combined functions of face detection, facial gesture recognition, facial and figure feature recognition, and face retrieval algorithms. Users benefit from the ability to retrieve faces by label in real time.

        Face LiveDetect

        Face LiveDetect detects the living figure in a video and the sequence of the figure's actions.

        Face Recognition

        Face Recognition is an intelligent service that uses computers to process, analyze, and understand facial images based on human facial features. It provides services through open Application Programming Interfaces (APIs). You can obtain the face recognition results by accessing and calling APIs in real time. It recognizes and compares faces automatically and provides you with the similarity degrees, thereby improving service efficiency.

        Face Retrieval

        Face Retrieval returns top N facial images that are most similar to the imported one.

        Face Verification

        Face Verification returns the similarity degree between two faces in two images by comparing the facial features.

        failover priority

        You can determine whether reliability or availability is given priority during a failover. By default, reliability is given priority.

        failover (rds)

        If an unexpected interruption occurs on a primary DB instance, RDS automatically switches to the standby DB instance to restore database operations quickly without manual intervention. The time required for completing a failover depends on the database activities and conditions when the primary DB instance became unavailable. The duration is usually from seconds to minutes. Large transactions or long restoration process may increase the failover duration.

        Failover (SDRS)

        The system forcibly sets services in the source AZ to the unavailable state and sets services in the target AZ ready-to-start. This action affects all the protected instances in the protection group. After the failover, you need to start the servers in the target AZ. In addition, data synchronization of the protection group stops after the failover. You need to enable protection to restore data synchronization.

        fault retry

        If a migration task fails, users can troubleshoot the issues and retry the migration task. In full migration, this function can reset and restart the full migration process. In incremental migration, this function can attempt to restore the synchronization between the source and target databases.

        Feature Vectorization

        ImageSearch extracts and vectorizes image features with deep learning algorithms to accelerate computing

        federated identity authentication

        A method to establish trust between an identity provider and HUAWEI CLOUD. Federated identity authentication enables users to access HUAWEI CLOUD through single sign-on (SSO).

        federated user

        Users who access HUAWEI CLOUD through federated identity authentication.

        field

        Minimum unit of a document. The field is similar to the column in the database.

        Field Programmable Gate Array

        A gate-level programmable component that implements complex combination or timing logic by using Verilog- or VHDL-based circuit design, synthesis, and placing and routing.

        File System

        A file system provides users with shared file storage service through NFS. It can be used to access network files remotely. After users create shared directories in the management console, the file system can be mounted to multiple ECSs and is accessible through the standard POSIX interface.

        FPGA Accelerated Cloud Server

        An elastic cloud server that is accelerated by field programmable gate arrays (FPGAs). It provides a tool and environment for developing and using FPGAs. With it, you can easily develop FPGA accelerators and deploy FPGA-based services, and provide easy-to-use, cost-effective, agile, and secure FPGA cloud services.

        FRS

        See Face Recognition

        FS

        See File System

        full backup

        A backup method used to back up all data space of Elastic Volume Service (EVS) disks used by a specific user.

        full data migration

        All data is migrated from a source database to a target during the database running process. If any changes occur on the source database during or after the migration, such as new data inserted to the source database, the changes will not be synchronized to the target database.

        Full table scan

        If a sharding column is not specified in SQL for a sharded table, SQL will be performed on all shards. Such a process is called a full table scan. You are advised to optimize SQL statements and specify a sharding column to avoid full table scans.

        Full-ECS image

        A full-ECS image is an image created from an entire Elastic Cloud Server (ECS), including its system disk and data disks, or an image created from a Cloud Server Backup Service (CSBS) backup. A full-ECS image contains the OS of the ECS, applications installed on the ECS, and all the data in the ECS disks.

        fully synchronous replication

        After an application initiates a data update (including insert, delete, and modify data) request, Master replicates the updated data to Slave and Slave writes the received data to relay logs and flushes it to disks. After Slave replays logs and commits transactions, it returns a successful message to Master. Master responds to the application only after receiving the message from Slave. Since data is synchronously replicated from Master to Slave, unavailability of Slave will affect operations on Master, and unavailability of Master will not cause data inconsistency.

        Function

        Function is a basic unit for resource scheduling and code running. It runs in response to specific conditions to achieve expected results. A group of functions can implement complex service functions by integrating event triggering and result output.

        FunctionGraph

        FunctionGraph hosts and computes functions in a serverless context. It automatically scales to suit fluctuations in resource demands during peaks and spikes while requiring no reservation of dedicated servers or capacities.

      • G
        GaussDB NoSQL

        GaussDB NoSQL is a distributed, non-relational, multi-model NoSQL database service with decoupled compute and storage architecture from Huawei. This high availability database is secure and scalable, can be deployed, backed up, or restored quickly, and includes monitoring and alarm management.

        GaussDB(for MySQL)

        GaussDB(for MySQL) is a latest generation MySQL-compatible, enterprise-class distributed database service. It uses a decoupled compute and storage architecture and supports up to 128 TB of storage. With GaussDB(for MySQL), there is no need to deal with sharding, and no need to worry about data loss. It combines the performance and availability of commercial databases with the cost-effectiveness of open source databases.

        General Image Search

        ImageSearch allows you to search for exact/fuzzy match images from the specified library

        General Table OCR

        General Table OCR can extract text and the information about rows and columns in various tables, as well as the information in areas outside tables. It is used to restore structured information in electronic documents and reports.

        GES

        See Graph Engine Service

        Global sequence

        In a distributed database, data is stored in each sharded table, and the primary key constraints in a relational database are unavailable. For this reason, the global sequence number is used for DDM to ensure that data retains the uniqueness after sharded tables are aggregated.

        Global table

        In a distributed database, data is stored in each sharded table, and the primary key constraints in a relational database are unavailable. For this reason, the global sequence number is used for DDM to ensure that data retains the uniqueness after sharded tables are aggregated.

        Graph

        A graph is a data model composed of edges and vertices.

        Graph Engine Service

        GES provides distributed, at-scale, and integrated graph search and analysis capabilities. Its high-performance kernel supports high-concurrency, multi-hop, real-time queries in seconds. It also has extensive built-in graph analysis algorithm libraries to meet the application requirements of various fields.

        Graph Size

        Graph size indicates the graph scale, which is based on the number of edges. Its value is not an accurate one

        Gremlin

        Gremlin is a graph traversal language in the open source graph calculation framework of Apache TinkerPop. You can use Gremlin to create, read, update, and delete (CRUD) data, for example, adding vertices or edges, updating properties, and performing complex traversing.

      • H
        HA

        See high availability

        Hadoop Distributed File System

        HDFS provides high-throughput data access and is applicable to the processing of large data sets. MRS cluster data is stored in HDFS.

        HAE

        See High Availability Extension

        HAF

        See Host Auto-Failover

        HANA

        See High-Performance Analytic Appliance

        Handwriting Letters & Digits OCR

        Handwriting Letters & Digits OCR can extract handwriting letters and digits and the information about rows and columns in various tables, as well as the information in areas outside tables.

        Hardware Security Module

        An HSM is a hardware device that produces, stores, manages, and uses keys in a secure manner. An HSM also provides encryption processing services.

        Hash Algorithm

        A hash value of a digital content segment can be used to verify data integrity. Any minor modification to the digital content leads to a significant change in the hash value. A qualified hash algorithm can be used to easily calculate a hash value from a digital content, but it is almost impossible to reverse calculate the original digital content from a hash value.

        HBase

        HBase is a column-oriented distributed cloud storage system that features enhanced reliability, excellent performance, and elastic scalability. It applies to the storage of massive data and distributed computing. Users can use HBase to build a storage system capable of storing TB- or even PB-level data. With HBase, users can filter and analyze data with ease and get responses in milliseconds, rapidly mining data value.

        HDFS

        See Hadoop Distributed File System

        Healthy Threshold

        Healthy threshold is the number of consecutive successful health checks necessary for an ECS to be considered healthy.

        Heat

        Heat is the main project in the OpenStack Orchestration program. It implements an orchestration engine to launch multiple composite cloud applications based on templates in the form of text files that can be treated like code.

        Heat Orchestration Template

        Heat Orchestration Template (HOT) is a template format supported by the heat, along with the other template format, i.e. the Heat CloudFormation-compatible format (CFN).

        HFile

        File format for HBase. A file of sorted key/value pairs. Both keys and values are byte arrays.

        high availability

        A system availability that keeps a service running properly without interruption.

        High Availability Extension

        A software package from SUSE for automatic active-standby failover control.

        High-Performance Analytic Appliance

        A high-performance real-time data computing platform based on in-memory computing technologies.

        High-Speed Network

        A high-speed network is an internal network among BMSs and provides high bandwidth for connecting BMSs in the same AZ. If you want to deploy services requiring high throughput and low latency, you can create high-speed networks. Currently, the BMS service supports high-speed networks with a maximum bandwidth of 10 Gbit/s.

        HiLens Kit

        HiLens Kit is a multimodal AI development suite that supports device-cloud synergy, and analysis and inference computing for data like images, videos, and speech. It can be widely used in intelligent surveillance, smart homes, robots, drones, smart industries, and smart stores.

        Hive

        A data warehouse tool running on Hadoop. Hive maps structured data files to a database table and provides simple SQL search function that converts SQL statements into MapReduce tasks.

        Hive Query Language

        Hive Query Language, a standard data query language used for Hive data warehouses.

        HiveQL

        See Hive Query Language

        HMaster

        Also known as Master. HMaster manages the RegionServer in the HBase, including the load balancing of the RegionServer, and the split, distribution, and migration of Regions. In an HA mode, HMaster includes a primary HMaster and a secondary HMaster.

        Horizontal sharding

        Data tables are sharded into multiple sharded tables based on sharding rules. After the sharding, data is stored in the sharded tables based on sharding rules. Horizontal sharding raises the capacity limit of a table in a single-node database and improves access performance.

        Host Auto-Failover

        HAF is a specific SAP HANA scenario. When a worker node in the cluster becomes faulty, the SAP HANA system automatically switches services from the faulty node to the standby node for cluster HA.

        Host Security Service

        Host Security Service (HSS) is designed to offer overall protection for your host. It provides complete functions such as login protection, system protection, and application protection, allowing you more time to focus on your services.

        HOT

        See Heat Orchestration Template

        hot backup

        A hot backup is performed when a system is properly running. The backup data may be different from the actual data of the system because the data in the system keeps being updated.

        hot update

        WAF policies are delivered in real time without affecting ongoing services.

        Hot Word

        When using Sentence Transcription, Long Audio Transcription, and RASR, if your field has some special words, you can use the hot word management function and add these words to a word table to improve recognition effect.

        HSM

        See Hardware Security Module

        HSS

        See Host Security Service

        HTTPS

        See Hyper Text Transfer Protocol over Secure Socket Layer

        HUAWEI CLOUD Marketplace

        HUAWEI CLOUD Marketplace, or the Marketplace for short, is a reliable platform for transacting and delivering software and services. In the cloud service ecosystem, this platform helps its partners to conveniently provide customers with high-quality cloud computing and big data software, services, and solutions, satisfying customers' needs of fast cloud migration and service development.

        HUAWEI CLOUD Service

        Cloud computing infrastructure, platforms, or applications provided by HUAWEI CLOUD, including but not limited to elastic cloud computing, cloud hosting, object storage, and workspace services.

        Huawei HiLens

        Huawei HiLens is a one-stop platform for the development, distribution, deployment, and management of AI applications. It provides extensive device-cloud synergy capabilities such as large-scale device management, dynamic application deployment, online training, and device model optimization.

        HXE

        See SAP HANA, express edition

        Hyper Text Transfer Protocol over Secure Socket Layer

        HTTPS is an SSL-based encrypted transmission protocol designed for websites. Simply put, it is the secure version of Hyper Text Transfer Protocol (HTTP).

      • I
        IAM

        See Identity and Access Management

        IAM user

        Created by the administrator for an employee, system, or application to use cloud services. Each IAM user can use their own identity credentials (password and access keys) to log in to the console or call APIs.

        IB Network

        The IB network features low latency and high bandwidth and is used in a number of High Performance Computing (HPC) projects. It uses the 100 Gbit/s mallenox IB NIC, dedicated IB switch, and controller software UFM to ensure network communication and management, and uses the Partition Key to isolate IB networks of different tenants (similar to the VLAN in the Ethernet).

        ICAgent

        ICAgent is a collection agent of APM. It runs on the server where applications are deployed and collects probe data in real time. For data collection scope and usage, see APM Service AgreementAPM Service Agreement.

        ID Card OCR

        ID Card OCR can automatically recognize all information on both sides of ID cards. After an ID card is scanned, information like ID number, name, and address can be recognized accurately even under complex conditions such as dark, tilted, overexposure, and shadowed scenarios.

        IDC

        See Internet Data Center

        Identity and Access Management

        A security management service that provides identity authentication, permissions management, and access control.

        identity provider

        A system that provides identity authentication. For example, IAM is the identity provider of HUAWEI CLOUD. In federated identity authentication, the identity provider refers to the identity authentication system of an enterprise.

        IdP

        See identity provider

        Image

        See Image recognition

        Image file

        An image file is a template that can be used to create ECSs. It contains an OS and preinstalled applications.

        Image Management Service

        Image Management Service (IMS) allows you to manage the lifecycle of images. You can create ECSs or BMSs from a public, private, or shared image. You can also create a private image from a cloud server or an external image file to easily migrate workloads to the cloud or on the cloud.

        Image recognition

        Image recognition is the technology that uses computers to process, analyze, and understand images to identify targets and objects in different modes.

        Image Tagging

        Image Tagging can recognize more than 3,000 objects and 20,000 scenarios and tags in natural images, which have extensive semantic meanings because one image contains a wide variety of tags. It can intelligently and precisely understand image content and make intelligent album management, picture retrieval and classification, and scenario- or object-based advertising more intuitive.

        Images

        Images are created by sellers based on the HUAWEI CLOUD public system. Customers can use an image to create an elastic cloud server (ECS) with the same system environment as that in the image.

        ImageSearch

        See ImageSearch

        ImageSearch

        ImageSearch leverages deep learning and image recognition technologies to deliver service- and industry-specific feature vectorization and search capabilities to help your search of exact/fuzzy match images from the specified library

        IMDB

        See In-memory Database

        IMS

        See Image Management Service

        In-memory Database

        An in-memory database (IMDB, also main memory database system or MMDB or memory resident database) is a database management system that primarily relies on main memory for computer data storage. It is contrasted with database management systems that employ a disk storage mechanism.

        incremental backup (CSBS&VBS)

        A backup method used to back up only data space modified since the last backup. The last backup can be either full backup or incremental backup. Incremental backup can be implemented only on a target that has been fully backed up.

        incremental backup (RDS)

        RDS automatically backs up data updated after the last automated or incremental backup every five minutes.

        incremental data migration

        Includes full migration by default. After full migration initializes the target database, incremental migration collects and analyzes logs to establish data consistency between the source and target databases, minimizing downtime.

        index (CSS)

        Index, similar to "Database" in the relational database (RDB), stores Elasticsearch data. It refers to a logical space that consists of one or more shards.

        Index (MRS)

        A data structure that improves the speed of data retrieval operations on a database table at the cost of slower writes and increased storage space. Indices can be created using one or more columns of a database table, providing the basis for both rapid random lookups and efficient access of ordered records.

        Infrastructure

        See Infrastructure

        Infrastructure

        In ServiceStage, infrastructure refers to the basic services that are required or optional to microservice application hosting and O&M, such as Cloud Container Engine (CCE).

        input/output operations per second

        The number of I/O operations completed per second. This metric is reported as the average IOPS for a given time interval. RDS reports read and write IOPS separately at one minute intervals. Total IOPS is the sum of the read and write IOPS. Typical values for IOPS range from zero to tens of thousands per second.

        Instant Restore

        Instant Restore is a feature that provides the instant restoration function for restoring data and creating images using backups. With Instant Restore enabled, the time required for restoring data and creating images can be reduced to minutes, which is much faster than the normal restoration function.

        intelligent decoding

        WAF intelligently identifies multi-layer obfuscation of multiple types of code and performs in-depth decoding to obtain the deep-rooted intents of attackers.

        Internet Data Center

        The telecommunications sector uses available Internet communication lines and bandwidth resources to establish a standard and carrier-class equipment environment in which comprehensive services such as server hosting, renting, and other value-added services are provided for enterprises and governments.

        IOPS

        See input/output operations per second

        IP Address Group

        An IP address group is a collection of IP addresses that use the same security group rule. You can use an IP address group to manage IP addresses that have the same security requirements or whose security requirements change frequently. An IP address group frees you from repeatedly modifying security group rules and simplifies rule management.

        IPsec VPN

        IPsec VPN is an encrypted tunneling technology that uses encrypted security services to establish confidential and secure communication tunnels between different networks.

      • J
        job

        A job includes one or more task groups. Users submit jobs using APIs or via the Batch console. Job details include the job name and information about the pools associated with the job. Users can set dependencies between the task groups in a job.

        Job (MRS)

        MRS provides users with an application execution platform, which enables users to submit applications they have developed to a MRS cluster, execute the applications, and obtain results. MRS also enables users to submit SQL statements online as well as query and resolve structured data.

        Job (CDM)

        A job is a data migration task that you have created to migrate data from a specific data source to another. To create a job, you must specify a source link, target link, and data mapping rule.

        job (DLF)

        A job is composed of one or more nodes that are performed collaboratively to complete data operations.

        Job (DLI)

        Execution entity of submitting SQL statements, and importing and exporting data in the system.

      K-O

        • K
          key file

          Key files refer to files that affect system running, for example, system files.

          Key Management Service

          Key Management Service (KMS) is a secure and reliable key management hosting service used for centrally managing and safeguarding users' keys.

          Key Pair Service

          Key Pair Service (KPS) is a secure, reliable, and easy-to-use cloud service designed to manage and protect your SSH key pairs.

          Kibana

          Kibana is an open-source analytics and visualization platform and works with Elasticsearch. You can use Kibana to search, view, and interact with data stored in Elasticsearch indices. You can also visualize your data in a variety of charts, tables, and maps.

          KMS

          See Key Management Service

          KPS

          See Key Pair Service

        • L
          Label

          A label indicates the type of a vertex or an edge. For example, the label of a vertex can be "person" or "vehicle" and that of an edge can be "friend" or "family". A label describes the data formats of all properties about a vertex or an edge (defined in schema).

          Layer 2 Connection Gateway

          A Layer 2 connection gateway (L2CG) is a virtual tunnel gateway that can work with a Direct Connect or VPN connection to establish network communication between the cloud and on-premises networks. The gateway allows you to migrate data center or private cloud services to the cloud without changing subnets and IP addresses.

          leeching

          In leeching, the attacker uses a link to direct access requests to a file on your website instead of placing the file on their own server. Typically, the file is big and consumes a lot of bandwidth, for example, an image or video. In some sense, you are paying for the access traffic to the file. Therefore, you are not only unpaid for the occupied bandwidth, the access rate to your website is also affected seriously.

          LFI

          See Local File Inclusion

          license model

          License type associated with a DB engine.

          Licenses

          Licenses of commercial software (such as images and SaaS) are offered as products on the Marketplace. License products include licenses of commercial operating systems, database middleware, and application software.

          lifecycle management

          The lifecycle of an object spans from creation of the object to the deletion. Lifecycle management allows you to configure rules to automatically delete objects that meet specific conditions.

          Link

          A link is an object set up based on a connector and used to connect to a specific data source. To create a link, you must specify the link name, connector type, data source address, and authentication information. For example, to connect to a MySQL database, you must set the host IP address, port number, username, and password. After a link is set up, it can be used by multiple jobs as either a source or a target link.

          Linux Virtual Server

          The Linux Virtual Server (LVS) is a virtual server cluster used to balance loads among servers. Working in the network layer, it can be used to implement high-performance, high-availability server cluster technologies.

          Local File Inclusion

          Local File Inclusion is the process of including files on a server through the web browser. This vulnerability occurs when a page include is not properly sanitized, and allows directory traversal characters to be injected.

          log group

          A log group is the basic unit for log management in Log Tank Service (LTS). You need to create a log group before collecting, querying, and transferring logs.

          log stream

          A log stream is the basic unit for reading and writing logs. Each log group contains up to 100 log streams. If there are too many logs to collect, you are advised to separate logs into different log streams based on log types, and name log streams in an easily identifiable way.

          logical backup

          A procedure in which the structured query language (SQL) is used to abstract data from a database and store the data into a binary file. Logical backup is a technology that uses software to export data from a database and stores the data into a file which is in a format different from the file in the original database. Logical backup can only be used for logical restoration (data import) and cannot be used for physical restoration based on storage characters of the original database. Generally, logical backup is used for incremental backup and only backs up data that has changed since the last backup.

          Long Audio Transcription

          Long Audio Transcription is used to recognize audio files whose duration is within five hours. Because Long Audio Transcription takes a long time, the recognition process is asynchronous.

          LVS

          See Linux Virtual Server

        • M
          malicious program

          A malicious program, such as a backdoor, Trojan horse, worm, or virus, is developed with attack or illegal remote control intents.

          manual backup

          A user-initiated full backup of a DB instance. A manual backup is always retained until you explicitly delete it manually.

          Map

          A processing model function that processes a key-value pair to generate a set of intermediate key-value pairs.

          Mapping (CDM)

          During job creation, especially jobs of migrating data between heterogeneous data sources, you must configure the mapping between the source and target data sources, such as field mapping and field type mapping.

          mapping (CSS)

          A mapping is used to restrict the type of a field and can be automatically created based on data. It is similar to the schema in the database.

          MapReduce

          As a programming model that simplifies parallel computing, MapReduce gets its name from two key operations: Map and Reduce. Map divides one task into multiple tasks, and Reduce summarizes the processing results of these tasks and produces the final analysis result. MRS clusters allow users to submit self-developed MapReduce programs, execute the programs, and obtain the result.

          MapReduce Service

          MapReduce Service builds a reliable, secure, and easy-to-use operation and maintenance (O&M) platform and provides storage and analysis capabilities for massive data, helping address enterprise data storage and processing demands. Users can independently apply for and use the hosted Hadoop, Spark, HBase and Hive services to quickly create clusters on a host and provide storage and computing capabilities for massive data that has low requirements on realtime processing.

          Marketplace

          See HUAWEI CLOUD Marketplace

          Marketplace Product

          Software, images, consulting services, and solutions that service providers independently develop or obtain based on legitimate authorization by the rights holders, and sell in HUAWEI CLOUD Marketplace. Marketplace products include but are not limited to basic operating environment, databases and cache memories, cyber security, enterprise management, e-commerce, storage backups, website deployment systems, business intelligence, information security, industry software, data migration, troubleshooting, security O&M, and other products and services.

          MASTER

          An SAP HANA master node coordinates global transactions and stores the global metadata of the information about the computing node cluster. A cluster has three master nodes configured, but only one of them is activated.

          Master Node

          A master node in a MapReduce Service cluster manages the cluster, assigns MapReduce executable files to core nodes, traces the execution status of each job, and monitors DataNode running status.

          match

          If a specified audit object matches an audit rule, the audit engine records the risk severity and executes the response action.

          MDX

          See Multi Dimensional eXpressions

          Merchandise Image Search

          ImageSearch provides users with pairing and bundling recommendations, helping increase sales while improving UX

          Mesh

          The Istio mesh obtains input and output application data in non-intrusive mode. The ICAgent and Cloud Container Engine (CCE) Istio mixer obtain and process mesh data, and then report the data to APM. You can enable the Istio to collect mesh data.

          Message

          A message in a queue carries information in the .json format. Messages can contain up to 512 KB of text.

          Message Consumer

          A consumer is a client that calls DMS APIs to retrieve messages from queues. Messages will be deleted from queues after their retrieval is acknowledged. Consumers in the same consumer group can concurrently retrieve different messages from a queue.

          Message Producer

          A producer is a client that calls DMS APIs to send messages to specified queues.

          Message Queue

          A queue receives and stores messages as files in certain order. Messages in a queue can be retrieved by multiple consumers.

          Message Server

          Message server is used for communication among Dialog instances and provides information for Dispatcher for load balancing.

          Message&SMS

          Message&SMS is a communication service provided for global users by HUAWEI CLOUD and the finest worldwide carriers and channels. Enterprises can use the Group SMS Assistant to easily send group SMS notifications, or call APIs to provide two-factor verification or SMS notifications for users.

          Metadata

          Data that provides information about other data. Metadata describes the source, size, format, or other characteristics of data. In the database field, metadata helps to explain the content of a data warehouse.

          Metadata Collection

          DAS periodically collects DB instance metadata of databases, tables, and fields and stores the collected data in the DAS database. This reduces queries on user databases and the impact on the user database performance and improves the search performance for DB instances that contain a large number of tables and supports pagination queries. Note that only structural metadata is collected, which means that user's table data is not included. The following database types are supported: MySQL, PostgreSQL, GaussDB(for MySQL), GaussDB(for Cassandra), DDM, and DDS.

          metadata file

          Contains API addresses and certificate information in compliance with SAML 2.0. Each identity provider and service provider have their own metadata files, which can be exchanged to establish trust. HUAWEI CLOUD (service provider) communicates with an identity provider server by using the address and certificate in the identity provider's metadata file.

          Metamodel

          A metamodel is a model of a model.

          Metric

          A metric is used to measure resource performance of a specific dimension. For example, CPU usage of ECSs is one metric and memory usage of ECSs is another.

          Microservice

          See Microservice

          Microservice

          Microservice is defined by service. If a process provides a service, it is a microservice. Each service has its own service functions. APIs that are not restricted by languages are open to other systems (HTTP frequently used). Multiple microservices form an application. In ServiceStage, a microservice is relative to an application component.

          Microservice instance

          See Microservice instance

          Microservice instance

          An instance is the minimum running and deployment unit of a microservice. Generally, it corresponds to an application process.

          Migration Agent

          The migration Agent is an Agent installed on a source server, which is used to collect information about source servers, receive commands from SMS, and migrate data from source servers to destination servers.

          migration comparison

          Comparison of migration items between source and target databases, facilitating cloud users making decisions.

          migration logs

          Logs generated during database migration, which can be classified into the following levels: alarm, error, and info.

          migration pre-check

          Before a migration, DRS pre-checks migration items and generates results to ensure that all check items are successful, improving the migration success rate.

          migration progress

          Migration progress includes: Progress of an on-going full migration in percentage Synchronization latency between source and target databases of an on-going incremental migration

          ModelArts

          ModelArts is a one-stop development platform for AI developers. With data preprocessing, semi-automated data labeling, distributed training, automated model building, and model deployment on the device, edge, and cloud, ModelArts helps AI developers build models quickly and manage the lifecycle of AI development.

          Moderation

          See Content Moderation

          mongod

          A major process in DDS. mongod mainly processes data requests and manages data access.

          mongos

          A router for data read and write, providing a unified interface for accessing DB instances.

          MPM

          See multi-pattern matching

          MRS

          See MapReduce Service

          MSGSMS

          See Message&SMS

          Multi Dimensional eXpressions

          A query language for online analytical processing (OLAP) databases, as Structured Query Language (SQL) is a query language for relational databases. It is also a calculation language, with its syntax similar to spreadsheet formulas.

          multi-pattern matching

          A highly efficient multi-mode matching algorithm is used for preorder characteristic detection of request traffic, which greatly improves the performance of the detection engine.

          My Credential

          Attributes and security information of a user, including the user ID, mobile number, email address, password, and access keys.

          My Marketplace

          Customers' operation and management center in the Marketplace where they can manage the Marketplace products they have purchased and saved to the list.

        • N
          NameNode

          A master server that manages the file system namespace and regulates access to files by clients. In HA mode, both NameNode and Secondary NameNode are provided.

          Namespace

          A namespace is a logical grouping of tables analogous to a database in relational database systems.

          NAS (SAP HANA)

          See Network Attached Storage (SAP HANA)

          NAS (SFS)

          See Network Attached Storage

          NAT

          See Network Address Translation (AAD)

          NetWeaver

          SAP NetWeaver is the integration technology platform of SAP. It is the technical foundation of all SAP applications since SAP Business Suite.

          NetWork ACL

          A firewall consists of one or more access control lists (ACLs). Based on inbound and outbound network ACLs, the firewall determines whether data packets are allowed in or out of any associated subnet.

          Network Address Translation (AAD)

          By Network Address Translation (NAT), private IP addresses are translated into public ones to allow users who only have private IP addresses to access the Internet, thereby relieving the impact of lack of IPv4 addresses. A type of network connection in hosted networking that enables you to connect your virtual machines to an external network when you have only one IP network address and the host computer uses that address.

          Network Attached Storage

          NAS is a method of file sharing. With NAS, a storage system has its own file systems inside and provides the file access service through Network File System (NFS).

          Network Attached Storage (SAP HANA)

          NAS is a file-level computer data storage connected to a computer network providing data access to heterogeneous clients. An NAS server contains storage devices, such as disk arrays, CD/DVD drives, tape drives, or portable storage media. An NAS server provides an embedded operating system to share files across platforms.

          Network File System

          Network File System (NFS) is a distributed file system protocol that allows different computers and operating systems to share data over a network. Application programs on client computers use NFS to access data on server disks. NFS is a method for sharing disk files between UNIX-like systems. SFS supports NFS v3 currently.

          Network Time Protocol

          Defines the time synchronization mechanism and synchronizes the time between the distributed time server and the client.

          network traffic

          Network transmission throughput, indicating the rate of network traffic in and out of the DB instance in MB per second.

          NFS

          See Network File System

          NM

          See NodeManager

          NN

          See NameNode

          Node

          See Node (CCE 2.0)

          Node (CCE 2.0)

          A node is a physical or virtual machine that acts as a Kubernetes worker, used to be called Minion.

          Node (DLF)

          A node defines the operations performed on data. For example, use a data migration node to import data from OBS to MRS Hive.

          Node (NoSQL)

          Compute nodes in the GaussDB NoSQL cluster.

          NodeManager

          Launches and monitors the compute containers on machines in the cluster.

          non-relational database

          Data in a non-relational database is communicated and organized based on the non-relational data structure. Based on different data structures, non-relational databases can be classified as the following types: key-value, column-oriented, document-oriented, and graphic databases. Common non-relational databases include Memcached, Redis, MongoDB, Cassandra, HBase, MemcacheDB, and Berkeley DB.

          non-standard port

          A port that is not port 80 or 443 is a non-standard port.

          non-system database

          Databases excluding system databases. For example, a user-built database is a non-system database.

          Notebook

          Notebook is an online interactive code development and debugging tool powered on the open source Jupyter Notebook. It is widely used in the AI field.

          NTP

          See Network Time Protocol

          number of concurrent users

          The number of concurrent users refers to the number of users simultaneously performing operations on a system. In CPTS, it is the number of virtual users you set when you define test task phases.

          NW

          See NetWeaver

        • O
          object

          A basic data unit in object storage service. It consists of object data and object metadata that describes object attributes.

          Object Storage Service

          Object Storage Service (OBS), a cloud storage service, provides data storage that features easy scalability, high security, proven reliability, and high cost-effectiveness. Users can manage and use objects through APIs over HTTP. It is applicable to large-scale data storage services.

          OBS

          See Object Storage Service

          OBS Archive

          OBS Archive storage class is ideal for archiving data that is rarely accessed (once a year on average). Its application scenarios include data archiving and long-term data backups. The Archive storage class is secure, durable, and inexpensive, and can be used to replace tape libraries. However, it may take hours to restore data from the Archive storage class.

          OBS Infrequent Access

          OBS Infrequent Access storage class is ideal for storing data that is accessed infrequently (less than 12 times a year) and has quick response requirements. Its application scenarios include file synchronization, file sharing, and enterprise backup. It provides the same durability, access latency, and throughput as the Standard storage class but at a lower cost. However, the Infrequent Access storage class has lower availability than the Standard storage class.

          OBS Standard

          OBS Standard storage class features low access latency and high throughput. It is therefore ideal for storing a massive number of hot files (frequently accessed every month) or small files (less than 1 MB). Its application scenarios include big data analytics, mobile apps, hot videos, and social apps.

          OBS Table

          Table that stores data of OBS.

          OCR

          See Optical Character Recognition Service

          ODBC

          See Open Database Connectivity

          Offline Import

          ImageSearch allows you to import large-scale and offline images in batches to an instance

          OLAP

          See Online Analytical Processing

          OLTP

          See Online Transaction Processing

          on-premise database

          Self-built local databases on the premises.

          Online Analytical Processing

          A technology that uses multidimensional structures to provide rapid data access for analysis. OLAP source data is generally stored in data warehouses in a relational database.

          Online database migration

          Database migration without service interruption (or with service interruption at the minute level).

          Online Service

          A model can be deployed as a cloud service. You can directly access the service by calling the RESTful API, which is used for the inference of a single piece of data.

          Online Transaction Processing

          A transaction-oriented processing system, which immediately sends original user data to the computing center for processing and provides the processing result within a short period of time. OLTP is a main application of traditional relational databases. It processes basic and routine transactions, such as banking transactions.

          Open Database Connectivity

          A data access application programming interface (API) that supports access to any data source for which an ODBC driver is available. ODBC is aligned with the American National Standards Institute (ANSI) and International Organization for Standardization (ISO) standards for a database call-level interface (CLI).

          Optical Character Recognition Service

          OCR is used to convert characters in images of typed text into machine-encoded text. OCR provides English Customs Form OCR and VAT Invoice OCR.

          Orchestration

          See Orchestration

          Orchestration

          An orchestration template contains the definitions of a group of container services and their dependencies. Orchestration templates can be used to deploy and manage multi-container applications and non-containerized applications.

          Orderer

          Orderers are nodes that order transactions into a block.

          origin server

          An origin server is a server where users' services are running.

          origin server IP address

          An origin server IP address is a public IP address used by a user's server to provide services.

          Overall Latency/Service Latency

          Latency refers to the time-consuming invocation from initiating a request to getting a response. In APM, the overall latency refers to the total time consumed by a request, and the service latency refers to the time consumed by a service.

        P-T

          • P
            packet

            Packets are data blocks sent over the HTTP, HTTPS, TCP, or UDP protocol. The data blocks start with metadata texts describing packet content, followed by optional data. Packets are transmitted between clients, servers, and proxies.

            PAM

            See Product Availability Matrix

            partition

            Data records in DIS streams are distributed into partitions. Partitions are the base throughput unit of a DIS stream. The total capacity of a stream is the sum of the capacities of its partitions. One partition supports the data read rate of 2 MB/sec and the data write rate of 1,000 records/sec and 1 MB/sec. When creating a DIS stream, you are expected to specify the number of partitions needed within your stream.

            partition key

            A partition key is used to segregate and route records to different partitions of a DIS stream. A partition key is specified by your data producer while adding data to a DIS stream. For example, assuming you have a stream with two partitions (partition 1 and partition 2). You can configure your data producer to use two partition keys (key A and key B) so that all records with key A are added to partition 1 and all records with key B are added to partition 2.

            payload

            The payload is the portion of the malware which performs malicious action

            Peer

            Peers are network nodes that maintain ledgers. One or more peers form a peer organization.

            performance metrics

            Metrics of DB instance performance, including the CPU usage, memory usage, storage space usage, network traffic, database connections, transaction rate/database throughput, submit latency, storage latency, storage IOPS, storage throughput, and storage queue length.

            permission

            A statement in a policy that allows or denies access to specific resources.

            physical backup

            A backup mechanism, in which database files in the operating system are replicated from one place to another place, generally from a disk to a tape. Physical backup includes cold backup and hot backup.

            PKI

            See Public Key Infrastructure

            Planned failover

            Source servers and disks belong to the source AZ, and target servers and disks belong to the target AZ. When servers in the target AZ are running properly, you can stop the servers in the source AZ and perform a planned failover, specifically, to migrate services from the source AZ to the target AZ and enable the target servers and disks.

            POC

            See prove of concept

            policy

            A set of permissions that allow or deny specific operations on specific resources. You can create custom policies by configuring required permissions. A policy can contain permissions for one or more cloud services. IAM implements fine-grained permissions management based on the permissions defined by policies.

            pool

            A pool is a set of nodes that are used to run tasks. Users can start, manage, and end tasks running on specific nodes.

            PRD

            See Production

            primary DB instance

            A DB instance that provides read and write services.

            Private image

            A private image is created from an ECS or an external image file and is visible only to its creator. Each private image contains an OS, preinstalled public applications, and the creator's private applications. Creating ECSs using a private image frees you from repeatedly configuring ECSs.

            private network address

            The internal access address is accessible only to clients that are in the same subnet as the Cloud Search Service cluster.

            Private Network Load Balancer

            The private network load balancer provides load balancing for intranet users and automatically distributes access traffic to multiple ECSs in one VPC.

            Probe

            The probe uses the bytecode enhancement technology to set data points to generate data. The data will be collected by the ICAgent and then displayed on the GUI. If the memory detection mechanism is enabled and the instance memory usage is too high, the probe enters the hibernation state and stops data collection.

            Product Access

            Process in which service providers connect and release products to the Marketplace and the products are added to the catalog after being approved by HUAWEI CLOUD.

            Product Availability Matrix

            PAM bundles technical and release planning information on SAP software product versions for quick reference. There you can find information on product versions′ release, availability, and maintenance.

            Production

            A HANA production scenario where HANA officially applies in the production environment.

            Production Interface Debugging

            Before releasing SaaS products, sellers must debug production interfaces of the SaaS products on the Application Access Debugging page in the Seller Console to ensure that SaaS products can be accessed correctly from the Marketplace.

            Production site

            A production site is the data center that independently carries services in normal cases. For SDRS, it is the AZ where your servers locate. This parameter is specified when you create a protection group.

            project

            A collection of different cloud service resources that you can access. You can create multiple projects in a region and grant users permissions for specific projects.

            Property

            A property is used to describe the information about a vertex or an edge in a graph.

            Protected instance

            Indicates a server and its replication server (target server). A protected instance belongs to one protection group. Therefore, the source and target AZs of the protected instance are the same as those of the protected instance's protection group.

            Protection group

            Used to manage a group of servers to be replicated. One protection group is for servers in one VPC. If you have multiple VPCs, you need to create multiple protection groups.

            Protection group status

            Indicates the status of a protection group when users perform an operation on the protection group, such as creating or deleting a protection group, enabling or disabling protection, or performing a failover or planned failover.

            prove of concept

            A segment of code or program that proves the existence of a vulnerability

            Public image

            A public image is provided by the public cloud system. It contains a standard OS and preinstalled public applications, and is visible to all users. You can configure the application environment and required software based on your requirements.

            Public Key Infrastructure

            A public key infrastructure (PKI) is an online infrastructure that is built on an open key theory and technology and is used to provide security services. Using encryption techniques, digital signatures, and digital certificates, it protects the security of applications, communications, or transactions.

            public network

            A computer accesses the Internet through a public network. The IP address is not reserved on the Internet and can be used by the computer to communicate with other computers on the Internet.

            Public Network Load Balancer

            The public network load balancer provides load balancing for public network users and distributes access traffic from the public network to multiple ECSs.

          • Q
            QAS

            See Quality Assure

            Quality Assure

            A quality assurance scenario where SAP HANA functions, performance, and reliability are fully verified.

            Queue

            A logical combination of resources in a cluster.

            queue depth

            The number of I/O requests in the queue waiting to be serviced. These are I/O requests that have been submitted by the application but have not been sent to the device because the device is busy servicing other I/O requests. Time spent waiting in the queue is a component of Latency and Service Time (not available as a metric). This metric is reported as the average queue depth for a given time interval. RDS reports queue depth at one minute intervals. Typical values for queue depth range from zero to several hundred.

          • R
            RASR

            See Real-time Automatic Speech Recognition

            RCE

            See Remote Code Execution

            RDD

            See Resilient Distributed Datasets

            RDP

            See Remote Desktop Protocol

            RDS

            See Relational Database Service

            RDS DB instance

            An RDS DB instance is the minimum RDS management unit. An RDS DB instance represents a relational database that runs independently. You can create and manage DB instances of various database engines in the RDS system. RDS DB instances come in three types: primary DB instances, standby DB instances, and read replicas.

            read replica

            An active copy of a DB instance. Any updates to the data on the source DB instance are replicated to the read replicas using the built-in replication feature of the DB engine.

            Read/Write isolation

            DDM redirects read and write requests of application services to different RDS DB instances. When the system has a heavy read load, read replicas are added to RDS DB instances. Data is read from read replicas, improving the concurrent database performance. Application codes do not need to be changed because the read/write isolation of DDM is open to applications.

            read/write splitting

            Primary DB instances process INSERT, UPDATE, and DELETE requests and standby DB instances process SELECT requests.

            Real-time Automatic Speech Recognition

            This is a WebSocket API provided by HUAWEI CLOUD, and is used for real-time speech recognition. An audio file is transmitted by fragments. The server can return the intermediate results during the recognition process and the final recognition result after the process is complete.

            Recapture Detection

            Recapture Detection, as a custom image recognition service, can recognize whether a barcode image is the original one or the one that is recaptured or printed for recapturing by using the deep learning technology and large-scale image detection training. It helps you build an intelligent business system and greatly reduce labor costs.

            Recovery Point Objective (SAP HANA)

            RPO is a service switchover policy, minimizing data loss during DR switchover. The data recovery point is used as the objective to ensure that the data used for DR switchover is the latest backup data.

            recovery point objective (SDRS)

            Indicates recovery time objective. It is the target time on the recovery of interrupted key businesses to an acceptable level. RTO is set to minimize an interruption's impacts on the services.

            Recovery Time Objective (SAP HANA)

            RTO defines the maximum duration of time within which data must be restored. When a disaster occurs, if you want the system to be available immediately and allow the loss of some data, the RTO is zero. If you allow an hour to recover the data, the RTO is one hour.

            recovery time objective (SDRS)

            Indicates recovery point objective. It is a service switchover policy, minimizing data loss during DR switchover. The data recovery point is used as the objective to ensure that the data used for DR switchover is the latest backup data.

            Reduce

            A processing model function that merges all intermediate values associated with the same intermediate key.

            Region

            Regions are divided from the dimensions of geographical location and network latency. Public services, such as Object Storage Service (OBS), Virtual Private Cloud (VPC), and Image Management Service (IMS), are shared within the same region. Users can select a region closest to them to reduce access latencies.

            Region (MRS)

            Similar to partitions in a traditional database, each RegionServer can have multiple regions.

            RegionServer

            RegionServer is a service of HBase on each working node. It manages Regions, uploads Region load information, and facilitates HMaster in distributed, coordinated management.

            relational database

            Tables in a relational database are communicated and organized based on the relational data structure. RDB simplifies complex data structures into simple binary relations (two-dimensional tables). A relational database contains multiple tables and each table is known as a relation. Data management is performed through data manipulation language (DML) statements, such as GROUP BY, JOIN, UNION, and SELECT * FROM. Common relational databases include Oracle, MySQL, MariaDB, Microsoft SQL Server, Access, DB2, PostgreSQL, Informix, and Sybase.

            Relational Database Service

            RDS is a managed service that makes it easy to create, configure, operate, and scale a relational database in the cloud.

            reliability priority

            During a primary/standby failover, if data is inconsistent between primary and standby DB instances, the failover is not performed and database services are stopped to ensure data consistency.

            Remote Code Execution

            Attackers attack or control communication devices by remote calling.

            Remote Desktop Protocol

            A proprietary protocol developed by Microsoft.

            Remote Gateway

            A remote gateway is the public IP address of the physical device on the peer end in an IPsec VPN tunnel. The remote gateway of each IPsec VPN tunnel must be unique.

            remote login

            In remote login attempts, a user tries to log in to an ECS from a location that is not a user-configured common login location.

            Remote Subnet

            A remote subnet is the destination IP addresses reachable through the tunnel. All IP packets destined for this subnet are sent along the IPsec VPN tunnel. Multiple remote subnets can be configured. However, the remote subnet cannot conflict with the subnet of the VPC where the VPN resides.

            replica

            A copy in a shard used for storing indices. It can be understood as a replica shard.

            replica set

            A replica set consists of a set of mongod processes and provides a collection of data nodes to ensure data redundancy and high availability (HA).

            Replication factor

            The number of copies of a file is called the replication factor of that file.

            Replication pair

            Indicates a disk and its replication disk (target disk). A replication pair belongs to one protection group and can be attached to a protected instance in this protection group.

            report

            After data transmission is complete, a report is generated for you to confirm that all data is transmitted.

            Repository

            Both image repositories and software repositories are called repositories. Images are used to create containerized applications; while software packages are used to create non-containerized applications. Before creating an application, ensure that the required image and software package has been uploaded to the repository.

            Resilient Distributed Datasets

            Resilient Distributed Datasets, a distributed memory abstraction that lets programmers perform in-memory computations on large clusters in a fault-tolerant manner.

            resource

            A resource is a self-defined code or text file that is uploaded by users and scheduled when a node task is executed.

            Resource

            A resource is an entity that users can use on HUAWEI CLOUD. A resource can be an Elastic Cloud Server (ECS), an Elastic Volume Service (EVS) disk, or a Virtual Private Cloud (VPC).

            Resource Change Records

            Resource change records contain resource changes in a specific period of time. A record will be generated upon any changes to the properties or relationships of a resource.

            Resource Compliance

            You can add assignments to evaluate the compliance of your resources.

            Resource Management Service

            Resource Management Service (RMS) enables you to centrally manage your cloud resources. You can dump and search for them, and evaluate their security compliance.

            Resource Recorder

            The resource recorder tracks resource changes on HUAWEI CLOUD. When a resource is created, modified, or deleted, or the resource relationship changes, RMS sends an SMN message to notify you of the change. In addition, RMS periodically dumps the resource change notifications and your resource snapshots into the configured OBS bucket.

            Resource Relationship

            A resource relationship indicates how your resources on HUAWEI CLOUD are associated, for example, EVS disks attached to ECSs and ECSs contained in VPCs.

            Resource Template Service

            Resource Template Service (RTS) helps you simplify cloud computing resource management and automate O&M. You can compile a template file and define a collection of cloud computing resources, dependencies between resources, and resource configurations based on the template specifications defined in the RTS service. Then you can automatically create and configure all resources in the template using the orchestration engine to simplify deployment and O&M.

            ResourceManager

            Manages the global assignment of compute resources to applications.

            response extraction

            If a transaction contains multiple packets, the response to a packet can be extracted by a regular expression and used in the subsequent packet.

            retrieval IP address

            In addition to protecting origin servers, Advanced Anti-DDoS provides proxy IP addresses for origin servers, which are called retrieval IP addresses. From origin servers' perspective, traffic returned to your users is all sent from the retrieval IP addresses.

            RM

            See ResourceManager

            RMS

            See Resource Management Service

            Rollup

            Rollup is the process in which Cloud Eye calculates the maximum, minimum, average, sum, and variance values based on sample raw data collected in different periods.

            Route Table

            A route table contains a set of rules that are used to determine where network traffic is directed. You can add routes to a route table to enable other ECSs in a VPC to access the Internet through the ECS that has a bound EIP.

            Row

            A row key is one of HBase table dimensions. It is an arbitrary array of bytes. Tables are sorted in lexicographical order by their row keys.

            Row key

            A row key is the HBase primary key. Tables in HBase are lexicographically sorted in ascending order based on row key.

            RPO

            See Recovery Point Objective (SAP HANA)

            RS

            See RegionServer

            RTO

            See Recovery Time Objective (SAP HANA)

            RTS

            See Resource Template Service

            Running Parameters

            Running parameters are dynamic parameters specified when a training job is created. The dynamic parameters are received and processed by the code of the training job. You can specify the parameter values as required.

          • S
            SaaS

            SaaS products are application software products provided by sellers to run on HUAWEI CLOUD infrastructure as a service (IaaS). After purchasing SaaS products, customers can log in to specific websites to use the SaaS products without a need to purchase the required cloud resources.

            SAP HANA, express edition

            SAP HANA, express edition is the R&D version of SAP HANA. It can be installed and run on a laptop or other hosts, such as Elastic Cloud Servers (ECSs) on public cloud. SAP HANA, express edition is free to use for up to 32 GB of memory capacity. Memory capacity beyond 32 GB is available for purchase at the SAP store.

            SBD

            See Shared Block Device

            Scalable File Service

            Scalable File Service (SFS) is high-performance file storage that is scalable on demand. SFS file systems support standard file access protocols and can be mounted to Elastic Cloud Servers.

            Scale Out

            Scale-out mode is also called cluster system mode, in which an SAP HANA system contains multiple nodes. In scale-out mode, when the system requires expansion, add more nodes to the system.

            Scale Up

            Scale-up mode is also called single-node system mode, in which an SAP HANA system contains only one valid node. If HA is required, construct such an architecture using two single nodes through System Replication. In the scale-up mode, when the system requires expansion, add CPUs, memory capacity, and hard disks to the node.

            scaling action

            A scaling action triggered by an AS policy adds instances to or removes instances from an AS group.

            scanner

            A scanner is a program that automatically detects security weaknesses in local or remote hosts. It can discover vulnerabilities and provide scanning results quickly and accurately.

            Schema

            A schema is used to describe the property information about edges or vertices. A schema consists of multiple labels and each label consists of multiple properties.

            schema migration

            All structure object definition syntax, excluding database data, is migrated from a source database to a target.

            SCM

            See SSL Certificate Manager

            SDRS

            See Storage Disaster Recovery Service

            Seamless scale-out

            The database storage space is expanded by increasing RDS DB instances without service interruption. Capacity expansion breaks the storage capacity bottleneck and improves the database performance by enhancing the concurrent computing capability. The DDM console supports capacity expansion. During capacity expansion, applications are not reconstructed and the progress is visualized.

            Secondary NameNode

            Performs periodic checkpoints of the namespace and helps keep the size of file containing log of HDFS modifications within certain limits at the NameNode.

            Secure Shell

            A set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer.

            Secure Sockets Layer

            A security protocol that works at a socket layer. This layer exists between the TCP layer and the application layer to encrypt/decode data and authenticate concerned entities.

            seller

            Service providers, often enterprises, that are authorized by HUAWEI CLOUD to sell software, images, services, and solutions using cloud computing and big data technologies in the Marketplace.

            Seller Console

            Sellers' operation and management center on the Marketplace, where they can manage their own information, offerings and transactions, and perform commissioning for application access.

            Seller Registration

            Process that service providers follow to apply for and implement joining to the Marketplace.

            semi-synchronous replication

            After an application initiates a data update (including insert, delete, and modify data) request, Master replicates the updated data to Slave. When at least one Slave receives binlogs, writes data to relay logs and flushes it to disks, Slave returns a response to Master. Compared to fully synchronous replication, semi-synchronous replication is faster because Master does not wait for Slave to commit data. However, since Slave responds to Master before the commitment is done, data may be inconsistent.

            sensitive file access

            Sensitive files, such as configuration files and permission management files of operating systems and application service frameworks, should not be accessed on the Internet; otherwise, service security is compromised.

            Sentence Transcription

            Sentence Transcription API is used for real-time recognition of short sentences. The entire audio is uploaded at a time, and the recognition result is returned immediately.

            sequence number

            Each data record has a sequence number that is unique within its partition. The sequence number is assigned by DIS when a data producer calls PutRecord or PutRecords operation to add data to a DIS stream. Sequence numbers for the same partition key generally increase over time; the longer the time period between write requests (PutRecord or PutRecords requests), the larger the sequence numbers become.

            server-side request forgery

            SSRF is an attacker-made vulnerability that can be used to send requests from servers. Typically, targets of SSRF are internal systems inaccessible from the Internet. The causes of SSRF are that the server can obtain data from other servers and that users have not filtered and limited destination addresses when they can.

            Service end

            The service end refers to the management component of SMS on HUAWEI CLOUD, which is used to create migration tasks, manage the migration Agent, and monitor migration task progress.

            Service Level Agreement

            A service level agreement (SLA) is a commitment between a service provider and a customer on the types, quality, performance, and reliability of services.

            Service Order

            After applying for DES, a service order is generated to trace the service progress and status.

            service provider

            A system that provides services. In federated identity authentication, the service provider refers to HUAWEI CLOUD.

            Service Supervision

            Process in which sellers and customers follow up with the delivery and communicate with each other during the delivery after customers purchase license products.

            ServiceComb

            See ServiceComb

            ServiceComb

            Apache ServiceComb is an open-source microservice project. It is compatible with popular ecosystems and provides a one-stop open-source microservice solution, featuring out-of-the-box readiness, high performance, and multi-language programming. It aims to help enterprises, customers, and developers easily deploy enterprise applications on the cloud in the form of microservices and implement efficient O&M.

            SFA

            See sensitive file access

            SFS

            See Scalable File Service

            shard (CSS)

            In Cloud Search Service, a shard is a logical partition. In the Elasticsearch search engine, an index consists of several shards. Each shard contains one or more replicas.

            shard (DDS)

            In Document Database Service, each shard is a mongod process that stores a subset of data for a DB instance. All shards store all data for a DB instance. Generally, each shard is deployed as a replica set to ensure data redundancy and HA.

            Shard and sharded table

            A DDM instance creates multiple physical databases in an RDS DB instance. Each physical database is a shard. A table that is created in a shard is a sharded table, which is neither a non-sharded table nor a global table. Data is distributed to shards based on sharding rules. The data supports distributed concurrent computing.

            Shared Block Device

            SBD is a voting disk in the active and standby systems that are used for automatic switchover.

            Shuffle

            A process of outputting data from a Map task to a Reduce task.

            signature file

            After you submit your DES order, the system generates a signature file. The signature file is the unique identifier for a Teleport or disk in the order.

            Single Point Of Failure

            SPOF is a part of a system or network that, if it fails, will stop the entire system or network from working.

            SIS

            See Speech Interaction Service

            skill

            A skill is an AI application running on a camera or other computing devices. It consists of a model and logic code. The logic code is the skill's framework, and is responsible for controlling skill running, including data reading, model import, model inference, and result output. The model is trained by AI algorithms based on big data and is responsible for inference in key scenarios during skill running.

            SLA

            See Service Level Agreement

            SLAVE

            An SAP HANA cluster can have one or multiple slave nodes configured in a distributed architecture to cache metadata and perform database operations assigned by the master node. A cluster has multiple slave nodes.

            slow HTTP attack

            In a slow HTTP attack, after managing to establish a connection with an HTTP server, the attacker specifies a large content-length and sends packets at very low rates, such as one byte per one to 10 seconds, and maintains the connection. If the client builds more such connections, available connections on the server will be exhausted bit by bit, causing the server unable to provide services.

            Small Computer System Interface

            An EVS disk type that supports transparent SCSI command transmission and allows the server OS to directly access the underlying storage media. In addition to basic SCSI read/write commands, SCSI EVS disks also support advanced SCSI commands, such as SCSI persistent reservations. SCSI EVS disks are suitable for cluster application scenarios that ensure data security using the lock mechanism.

            Smart Contract

            A smart contract, also called chaincode, is a code logic that runs on a blockchain and is automatically executed under a specific condition. It is an important method for a user to implement the service logic when using a blockchain. The nature of blockchain means that the execution results of smart contracts are reliable and cannot be forged or tampered with.

            Software Development Kit

            A collection of development tools that are used by software engineers to create application software for specific software packages, software frameworks, hardware platforms, and operating systems. Generally, the SDK is used for developing Windows applications. It simply provides some API files for a programming language, but may also include complex hardware that can communicate with an embedded system.

            software vulnerability

            A software vulnerability is a security defect in a piece of software that may allow unauthorized users to access or sabotage the host.

            SoH

            See Suite on HANA

            solid-state drive

            SSDs are built on solid electronic storage chip arrays. Each SSD consists of a control unit and a storage unit (a flash and a DRAM chip). The interface specifications, definition, functions, and usage of an SSD are the same as those of a common hard disk. SSDs are widely applied in fields such as military, vehicles, industrial control, video surveillance, network surveillance, network terminals, electricity, medical, aeronautics, and navigation equipment.

            source DB instance

            A source DB instance functions as the data source in data replication.

            Source job configuration

            During job creation, a source link specifies the data source where the data is to be extracted, for example, a table or directory. The source job parameter settings vary with source links. You can set related parameters in the source job configuration.

            Source server

            A source server refers to the server to be migrated in a server migration task. A source server can be an X86 physical server or a VM on a private or public cloud platform.

            SP

            See service provider

            Spark

            MRS deploys and hosts Apache Spark clusters in the cloud, and Spark is a distributed and parallel data processing framework.

            Spark SQL

            Spark SQL is an important component of Apache Spark and subsumes Shark. It helps engineers who understand conventional databases but do not know MapReduce quickly get started.

            Speech Interaction Service

            Speech Interaction Service provides a man-machine interaction mode by open Application Programming Interfaces (APIs). It is applicable to scenarios such as voice customer service inspection, conference records, voice SMS messages, audio books, and telephone follow-ups. You can obtain the speech interaction results by real-time access and API calling. For example, you can use Automatic Speech Recognition (ASR) to convert speech recordings in Mandarin or with certain dialects as editable text, and use Text To Speech (TTS) to convert text into lifelike voices.

            SPOF

            See Single Point Of Failure

            SQL

            See Structured Query Language

            SQL injection

            SQL injection is a common web attack. Attackers inject SQL statements into query character strings of background databases to deceive servers into executing the malicious SQL statements. Then, attackers can obtain sensitive information, add users, export files, or even gain the highest permissions on the databases or even the systems.

            SQLi

            See SQL injection

            SR

            See System Replication

            SSD

            See solid-state drive

            SSH

            See Secure Shell

            SSL

            See Secure Sockets Layer

            SSL Certificate

            An SSL certificate is a digital certificate that complies with the Secure Sockets Layer (SSL) protocol. Issued by a CA after verifying a server, an SSL certificate is used to authenticate servers and encrypt in-transit data.

            SSL Certificate Manager

            SSL Certificate Manager (SCM) is a service that provides one-stop lifecycle management of digital certificates, ensuring trusted authentication and secure connections.

            SSRF

            See server-side request forgery

            Stack

            See Stack (CCE 2.0)

            Stack (AOS)

            A stack is a collection of applications and cloud service resources. The applications and cloud services in a stack are treated as a whole when they are being created, upgraded, or deleted.

            Stack (cce 2.0)

            A stack is a deployment instance composed of applications, services, and resources. ServiceStage manages these elements by means of stacks.

            Stage

            Each job gets divided into smaller sets of tasks called stages that depend on each other.

            STANDBY

            An SAP HANA standby node takes over services of a faulty worker node. A cluster can have no or any number of standby nodes, and one standby node by default. In normal cases, software on the node is running, but the node's memory database has no data and cannot process services. The standby node takes over services of a faulty node automatically.

            standby DB instance

            A standby DB instance is a backup for a primary DB instance. If the primary instance fails, the standby instance automatically takes over services to improve database availability. When creating a primary DB instance, you can determine whether to create a synchronous standby DB instance with the same specifications as the primary one.

            static website hosting

            A function that allows you to host static website files using OBS buckets, and visit static websites by accessing the buckets.

            Sticky Session

            If sticky session is enabled, requests from the same client will be distributed to the same ECS for processing.

            storage capacity

            Size of the underlying storage resources that can be used to store indexes and logs.

            Storage Disaster Recovery Service

            Storage Disaster Recovery Service provides disaster recovery (DR) services for many public cloud services, such as Elastic Cloud Server, Elastic Volume Service, and Dedicated Storage Service.

            storage space

            The space of underlying storage resources for storing data and logs of a database.

            storage type

            Storage can be classified as different types based on the dimensions and attributes of storage resources. For example, storage can be classified into magnetic storage and SSD based on storage media, and can be classified into general, medium, and high performance I/O based on the I/O level.

            Structured Query Language

            A programming language widely used for accessing, querying, updating, and managing data in a relational database. It includes DDL, DML, and DCL.

            submit latency

            The elapsed time between the submission of a request and its completion. This metric is closely related with the storage write latency metric. A high storage write latency may cause a high submit latency.

            Suite on HANA

            An SAP HANA application scenario where SAP HANA is used as the database of the business suite (for example, ERP software).

            SYN flood

            See SYN flood attack

            SYN flood attack

            In a SYN flood attack, the malicious client (the attacker) uses forged SYN packets (the source addresses of which are fake or non-existent) to send connection requests to the target server. The target server acknowledges those requests by returning SYN-ACK. However, the client does not respond to the server with an expected ACK packet. As a result, the target server has a large number of half-open connections that last until timeout. Those connections exhaust server resources, causing the target server to fail to create normal TCP connections, as expected by the attacker.

            Synchronization status

            Indicates the status of the data replication between the source and target AZ.

            system database

            Stores system-level information used for database system running. It is created by default during the database system installation. For example, Microsoft SQL Server system databases include master, model, msdb, resource, and tempdb. MySQL system databases include information_schema, mysql, performance_schema, sakila, test, and world.

            System disk image

            A system disk image contains an OS for running services and application software. It can be used to create system disks, and can also be directly used to create ECSs. Through system disk images, you can migrate your service running environment to the cloud.

            System Replication

            System Replication is a function of SAP HANA. To implement System Replication, you need to create a secondary system, which continuously synchronizes data and transaction logs with the primary system. Due to the mirroring attribute of the primary and secondary systems, once the primary system is faulty, the secondary system takes over services of the primary system.

          • T
            Table (MRS)

            An HBase table is a three dimensional sorted map. It maps from Cartesian product of row key, column key and timestamp to cell value. All HBase data is stored in cells of tables.

            Table (DLI)

            A combination of rows and columns. Each column is a field, and each field represents a type of data.

            task

            A task is the minimum unit for executing batch computing jobs. Tasks dynamically run on the servers allocated by the system.

            task group

            A task group is a collection of tasks. You can specify replicas to set the number of tasks in a task group. Other than the task name, all of the tasks in a task group have the same settings.

            TCP

            See Transmission Control Protocol

            TCP attack

            In Transmission Control Protocol (TCP) attacks, attackers send forged TCP packets to target servers, with abnormal flag settings intended to make the servers unresponsive to normal user requests.

            Teleport

            Teleport is a military-class chassis for securely transferring TB- or PB-scale data to HUAWEI CLOUD. It is dustproof, waterproof, vibration-resistant, and crush-resistant and provides safety lock, alarm recording, and GPS positioning functions. Customers can store data in Teleport and deliver it to Huawei for uploading the data to HUAWEI CLOUD.

            Template

            An RTS template is a user-readable, easy-to-write file that describes how to deploy a set of resources and install the required software. Templates specify the resources to use, the attributes to set, and the parameters required for automatic deployment of a specific application. Template files can be in the YAML or JSON format.

            Test

            A HANA test scenario where development engineers test application software and SAP HANA to verify the functions of application software after application software development is complete.

            Text To Speech

            TTS converts text into lifelike voices. Users can access and call APIs to synthesize the input text into audio and obtain the voice synthesis result in real time. TTS provides speech services with customizable timbres, speech volumes, and speeds for enterprises and individuals.

            Text To Speech Customization

            TTSC converts text into lifelike voices. Users can access and call APIs to synthesize the input text into audio and obtain the voice synthesis result in real time. TTSC provides speech services with customizable timbres, speech volumes, and speeds for enterprises and individuals.

            think time

            Think time is the time gap between two consecutive user actions. For example, when a user receives data from a server, the user may spend a few seconds checking the data before responding. Adding think time can better simulate user behaviour.

            throughput

            The number of bytes per second transferred to or from a disk. An average throughput is reported at a specified interval. RDS reports read and write throughput in MB/s separately every one minute. Typical values for throughput are from zero to the I/O channel's maximum bandwidth.

            Timestamp

            Different versions of the same data for the index, the timestamp type is 64-bit integer. Timestamp can be automatically assigned by the customer or by the explicit assignment when data is written to HBase.

            token

            An alpha-numeric string of text issued to a user for accessing APIs and resources. A token contains the identity and permission information about a user.

            Topology

            A topology graphically displays call and dependency relationships between applications. It is composed of circles, arrows, and resources. Each circle represents an application, and each section in the circle represents an instance. The fraction in each circle indicates number of active instances/total number of instances. The values below the fraction respectively indicate the service latency, calls, and errors. Each arrow represents a calling relationship. Thicker arrows indicate more calls. The values on arrows respectively indicate the throughput and overall latency. Throughput is the number of calls within the selected period. Application Performance Index (Apdex) indicates user satisfaction with application performance. Different colors indicate different Apdex value ranges, helping you quickly detect and locate performance problems.

            TP99 Latency

            TP99 latency is the minimum time meeting requirements of 99% requests. In APM, latency refers to TP99 latency.

            TPS

            TPS is a metric used to measure system throughput. It refers to the number of requests that receive responses from a tested server per second.

            trace

            A trace is a cloud service resource operation record generated and stored by Cloud Trace Service (CTS). You can view traces to see a history of operations performed by specific users on specific resources.

            trace file

            A trace file is a collection of traces. Usually, one trace file contains all traces generated in one transfer cycle. If there are too many operation records generated in one cycle, Cloud Trace Service (CTS) will adjust the number of traces contained in a trace file. Trace files are transferred to OBS buckets for archiving.

            trace list

            The trace list displays details about operations, such as creation, modification, and deletion of cloud service resources, in your account. The trace list contains traces generated during the last 7 days.

            Tracing

            Tracing and recording service calls help to visually restore the execution track and status of service requests in distributed systems, so that you can quickly demarcate performance bottlenecks and faults. The following figure shows how to trace an exception.

            Tracing Analysis

            The service calling relationships in large-scale and complex distributed systems are traced to facilitate quick location and demarcation of faults.

            tracker

            Before using Cloud Trace Service (CTS), you need to enable it. A management tracker is automatically created when CTS is enabled and is used to record management traces, which are logs of operations on all cloud resources, such as creation, login, and deletion. You can create data trackers to record data traces, which are logs of operations on data, such as upload and download.

            traffic cleaning

            Traffic cleaning is a network security service used to precisely identify and discard abnormal traffic on a network to ensure passing of normal traffic. Traffic cleaning is mainly used to protect computers against DDoS attacks.

            Traffic Management

            Traffic management provides you with visualized network statuses of cloud native applications and allows you to manage and configure network connections and security policies online. Currently, it supports routing rules, load balancing, session sticky, connection pool management, and RBAC for HTTP and TCP traffic.

            Training

            A HANA training scenario where the users are trained for the deployed SAP HANA or the deployed SAP HANA is demonstrated.

            Training Job

            A training job is a task submitted by you to train a model. You can edit and develop the code logic of the task in the development environment. After job running, a model is outputted.

            Transaction

            A transaction is usually an HTTP request (complete process: user request > web server > database > web server > user request). Transactions are one-off tasks, which are completed by using applications. For example, a commodity query in an e-commerce application is a transaction, and a payment is also a transaction.

            transaction rate/database throughput

            Number of completed transactions in a specified period, generally expressed in transactions per minute (TPM) or transactions per second (TPS). Another term for transaction rate is database throughput. Do not confuse it with the disk throughput. Databases have high transaction rates, so there is little or no disk throughput.

            Transmission Control Protocol

            According to the RFC 793 definition of the Internet Engineering Task Force (IETF), the Transmission Control Protocol (TCP) is a reliable transmission-layer protocol oriented to connections and based on byte streams.

            Trigger

            A trigger is a set of user-defined rules for triggering a function or workflow. When the rules are satisfied, an event is generated as an input to trigger the function or workflow.

            TRN

            See Training

            TRNG

            See True Random Number Generator

            True Random Number Generator

            A TRNG is a device that generates unpredictable random numbers by physical processes instead of computer programs.

            TST

            See Test

            TTS

            See Text To Speech

            TTSC

            See Text To Speech Customization

          U-Z

            • U
              UDP

              See User Datagram Protocol

              UDP flood

              See UDP flood attack

              UDP flood attack

              In a User Datagram Protocol (UDP) flood attack, the attacker sends a large number of typically large UDP packets over a botnet at very high rates, thereby exhausting server resources and causing servers unresponsive to normal user requests.

              Unhealthy Threshold

              Unhealthy threshold is the number of consecutive failed health checks necessary for an ECS to be considered unhealthy.

              unidirectional audit

              Only the requests to the database are audited.

              Unsharded table

              Tables that have a small data volume and do not need to be queried by connecting to sharded tables can be created to store data only in the default shards of DDM. These tables are called non-sharded tables. A non-sharded table can be created only by connecting to the schema through the MySQL client or application programs.

              unsynchronized data

              For primary/standby MySQL or PostgreSQL DB instances, when the failover priority is given to availability, the primary DB instance may have more data than the standby instance due to synchronization delay or other reasons. After a failover occurs, the primary DB instance is demoted to be standby and the standby DB instance is promoted to be primary. The data that has not been synchronized to the new primary DB instance (original standby) will be packaged and uploaded to OBS in SQL statements for download.

              User Datagram Protocol

              The User Datagram Protocol is a connectionless transmission-layer protocol that provides transaction-oriented transmission service of simple but unreliable information. IETF RFC 768 is the official specifications of UDP. The protocol ID of UDP in IP packets is 17.

              user group

              A group of users who have the same responsibilities. User groups facilitate centralized user management and permissions management. A user inherits permissions from the user groups to which the user belongs.

              UVP

              UVP (Unified Virtualization Platform) is a general and open virtualization platform to establish enterprise-class data center.

            • V
              VAT Invoice OCR

              VAT Invoice OCR can recognize the text on the value-added tax (VAT) invoice image for further processing by using technologies, such as image preprocessing, table extraction, text extraction, text recognition, and structured information output, greatly saving labor costs.

              Vehicle License OCR

              Vehicle License OCR automatically recognizes all information on the original page of vehicle license, and accurately extracts structured information such as plate number, vehicle type, owner, use character, model, vehicle identification number (VIN), engine number, and register date under complex conditions such as dark light, tilt, overexposure, anti-counterfeit watermarks, and shadow.

              Version Management

              In ModelArts, multiple versions of data are generated when data (such as datasets, training jobs, and models) of jobs of different types is modified. ModelArts records version information and displays it on the management console for you to accurately trace and compare changes between versions.

              versioning

              Records and stores the versions of objects at different times in the system to trace and manage multiple object versions, so that data of a specific version can be recovered when an anomaly occurs.

              Vertex

              Vertices represent entities in data models, such as vehicles in the traffic network, stations in the communications network, users and commodities in the e-commerce transaction network, and web pages on the Internet.

              Virtual Block Device

              An EVS disk type that only supports basic SCSI read/write commands. VBD EVS disks are suitable for enterprise office applications and development and testing environments.

              Virtual IP Address

              A virtual IP address can be shared among multiple ECSs. An ECS can have both private and virtual IP addresses, and you can access the ECS through either IP address. A virtual IP address has the same network access capabilities as a private IP address, including layer 2 and layer 3 communication in VPCs, access between VPCs using VPC peering connections, as well as access through EIPs, VPN connections, and Direct Connect connections.

              Virtual Network Console

              VNC is an open-source software based on UNIX and Linux OSs. It provides powerful remote control capabilities.

              virtual Network Interface Card

              A NIC virtualized from a physical NIC by the virtualization software. A vNIC works like a physical NIC for a virtual machine.

              Virtual Private Cloud

              A Virtual Private Cloud (VPC) is a secure, isolated, and logical network environment. You can create virtual networks in a VPC. The virtual networks provide the same network functions as those provided by a physical network, as well as providing advanced network services, such as elastic IP addresses and security groups.

              Virtual Private Network

              The virtual private network (VPN) service establishes an encrypted communication tunnel between a remote user and a VPC, thereby enabling the remote user to use service resources in the VPC.

              VNC

              See Virtual Network Console

              vNIC

              See virtual Network Interface Card

              Volume Backup Service

              Volume Backup Service (VBS) backs up and restores Elastic Volume Service (EVS) disks. You can configure backup policies to implement periodic incremental backup of EVS disks and to store data across data centers so as to improve data reliability.

              VPC

              Indicates the VPC of the protection group. A VPC facilitates internal network management and configuration, allowing secure and quick modifications to networks. Servers in the same VPC can communicate with each other, but those in different VPCs cannot communicate with each other by default.

              VPC Peering

              A VPC peering connection is a networking connection between two VPCs that enables you to route traffic between them using private IP addresses. ECSs in either VPC can communicate with each other just as if they were in the same VPC. You can create a VPC peering connection between your own VPCs, or between your VPC and another tenant's VPC within the same region.

              VSS

              See Vulnerability Scan Service

              VUL

              See Vulnerability

              Vulnerability Scan Service

              VSS is a security detection service designed for servers and websites.

              Vulnerability

              A vulnerability is a defect of hardware, software, or protocol in specific implementation or system security policy. Such a defect enables an attacker to access or sabotage a system without being authorized.

            • W
              WAF

              See Web Application Firewall

              WAL (MRS)

              See Write Ahead Log

              weak password

              A weak password can be easily guessed or cracked because it is simple or commonly used.

              Web 2.0

              Web 2.0 basically refers to the transition from static HTML Web pages to a dynamic Web that is more organized and based on serving Web applications.

              Web Application Firewall

              Web Application Firewall (WAF) is designed to keep web services stable and secure. It examines all HTTP and HTTPS requests to detect and block attacks such as Structure Query Language (SQL) injections, cross-site scripting (XSS), webshell upload, command or code injections, file inclusions, sensitive file access, third-party vulnerability exploits, CC attacks, malicious crawlers, and cross-site request forgery (CSRF).

              Web Tamper Protection

              Web Tamper Protection is a mode in which HSS is provided. This mode protects your files, such as web pages, documents, images, and databases, in specific directories against tampering and sabotage by hackers and viruses.

              webshell

              A webshell is an attack script. After intruding a website, an attacker mixes .asp, .php, .jsp, or .cgi files with normal web page files. Then, the attacker can access web backdoors using a browser. In other words, the attacker has obtained an environment to run his malicious commands to control the website server. For this reason, webshells are also called backdoor tools.

              WORKER

              An SAP HANA worker node runs and performs database operations.

              world wide name

              A World Wide Name (WWN) or World Wide Identifier (WWID) is a unique identifier used in storage technologies including Fiber Channel, Advanced Technology Attachment (ATA) or Serial Attached SCSI (SAS). A WWN may be employed in a variety of roles, such as a serial number or for addressability.

              Write Ahead Log

              An efficient database algorithm. For the same amount of data, when using WAL log, the database system during the transaction commits disk writes only about half of the traditional rollback log, greatly improving the efficiency of the database disk I/O operations, thereby improving the performance of the database. Each incremental data loads in HBase are written to WAL.

              WTP

              See Web Tamper Protection

            • X
              XML External Entity attack

              An XML External Entity attack is a type of attack against an application that parses XML input. This attack occurs when XML input containing a reference to an external entity is processed by a weakly configured XML parser. This attack may lead to the disclosure of confidential data, denial of service, port scanning from the perspective of the machine where the parser is located, and other system impacts.

              XSS

              See cross-site scripting

              XXE attack

              See XML External Entity attack

            • Z
              zero-day

              A 0-day vulnerability refers to a vulnerability that is exploited immediately upon discovery. Plainly speaking, malicious programs are already available when a vulnerability is discovered and its patch developed. 0-day attacks are abrupt and destructive.

            Sitemizi ve deneyiminizi iyileştirmek için çerezleri kullanırız. Sitemizde tarama yapmaya devam ederek çerez politikamızı kabul etmiş olursunuz. Daha fazla bilgi edinin

            Feedback

            Feedback

            Feedback

            0/500

            Selected Content

            Submit selected content with the feedback