Search: "layer"
Use CloudMonitor to monitor ECS instances - Elastic Compute Service Documentation
information, see Process monitoring. Set site monitoring Site monitoring is at the network access layer to test the ...
HDFS authorization - E-MapReduce Documentation
other upper-layer services. When permissions are enabled for HDFS, the services must be set up (such as /spark-history for ...
Network isolation - ApsaraDB for MongoDB Documentation
control on the network layer. Users can use VPN or a physical connection to connect on-premise servers to Alibaba Cloud and use user-defined VPC IP addresses to prevent P address conflicts. ...
[Vulnerability notice] Meltdown and Spectre flaws in Intel processors - Security Advisories Documentation
some design bugs at the chip hardware layer. Successful exploitation can result in leakage of the operating system’s ...
Product structure - Game Shield Documentation
the SDK and the Game Security Gateway, thus completely solving TCP protocol layer connection flood attacks (analog protocol-type ...
Set priorities for multiple sources - Dynamic Route for CDN Documentation
the same origin priority, CDN round-robin takes place. Origin site health check: 4-layer health check is ...
HTTPS settings - Dynamic Route for CDN Documentation
Introduction Hyper Text Transfer Protocol over Secure Socket Layer (HTTPS) is an HTTP channel designed to ensure security ...
What Is ENS - ENS Documentation
(CDN). It enables users to build a “center + edge” dual-layer architecture that implements network forwarding, storage ...
What is Machine Learning Platform for AI? - Machine Learning Platform for AI Documentation
generated. How to compute and analyze such a huge amount of data poses a great challenge for the bottom-layer computing engine ...