百度智能云

All Product Document

          Reference

          B

          Baidu Cloud Compute

          BCC is a simple and efficient computing service with elastic processing capacity. Create or release as many cloud servers as you want without purchasing hardware. It has improved operation and maintenance efficiency and reduced IT costs. It can quickly build stable and reliable applications for users, reduce the difficulty of network scale calculation, and facilitate users to focus on core business innovation.

          Baidu Cloud Monitor

          Through the integrated solution of monitoring acquisition, storage, display, calculation, convergence alarm and statistics, it provides Baidu AI Cloud users with comprehensive, reliable and timely monitoring services.

          Baidu IntelliEdge

          Baidu edge computing products include the intelligent edge local package and the intelligent edge cloud management suite.

          Baidu Load Balance

          BLB is a load balancing service that distributes traffic to multiple cloud server services. BLB can balance application traffic, forward front-end concurrent access to multiple cloud servers in the background, and achieve business level expansion. BLB can also guarantee automatic fault switching, promptly eliminate single points of service failure, and improve service availability.

          Baidu Object Storage

          Baidu Object Storage (BOS) provides stable, secure, efficient, highly scalable, and cost-effective storage services. It supports storage of any data within 5TB and multiple regions across clusters to achieve unified utilization of resources, reduce the difficulty of use, and improve work efficiency.

          BCC Security Group

          A security group is a set of security access rules agreed on for a group of BCC instances. The BCC instance can choose a default security group or a custom security group. The default security group allows all inbound and outbound access to pass through. Custom security groups define the inbound and outbound rules you want.

          BCC image

          An image is a template for the BCC instance's operating environment, including the operating system and installed software and configuration information. You can use the image to create a BCC instance and replace the system disk of the BCC instance. Baidu AI Cloud provides a variety of public images for you to choose when creating a BCC instance. You can also create your own custom image based on the BCC system disk at a certain time, this image can only be seen by yourself.

          BCC snapshot

          A snapshot is an available copy of the data collection that you specify, and the copy includes a mirror of the corresponding data at the time you specify (the point in time when the copy started). Snapshots are mainly used for online data backup and recovery. When an application fails or a file is damaged, data can be quickly restored to a state at a certain point in time. Another function of the snapshot is to provide you with another data access channel. When the original data is applied in the processing line, users can access the snapshot data and use the snapshot for testing and other tasks.

          BCC instance

          BCC instance is a virtual computing environment that contains the most basic computing components such as CPU and memory. It is the actual operating entity that the cloud server presents to each user. BCC instance is the core concept of the cloud server. It supports IP binding, mirroring, and snapshot functions. CDS disks and SCS simple cache services can only be used after being mounted on the BCC instance.

          BCM-Agent

          BCM-Agent is a monitoring and collecting client provided by the BCM service. Users can choose to download and install it in their own BCC (Baidu AI Cloud Server).

          BINLOG

          BINLOG is a SQL log generated by the database performing write operations. It can be used as the input of synchronous data of the slave in the master-slave architecture environment. When data is restored, point-to-point recovery can be performed according to BINLOG.

          Border Gateway Protocol

          It is an autonomous system routing protocol running on TCP.

          BOS FS

          BOS FS is a free tool provided by BOS, which can mount remote BOS services to the local file system, achieving functions similar to network file systems. The purpose is to make it easy for users to access files on BOS by system commands or standard POSIX interfaces, just as easily as using a local disk.

          BOS privilege control

          BOS provides a privilege control mode that combines the user signature verification, access control list ACL and time-limited access of object, so as to provide the user with safe and reliable data protection. Among them, the AK/SK asymmetric encryption that is used by the user to verify the signature is to verify the user's identity by signing the URL; after ACL verifies the identity of the user, it requests the information on access right of Bucket, and responds to the request according to corresponding information on access right; the object time-limited access allows the users to provide the users with a valid URL within the customized time for application scenarios, such as download.

          BRN (Baidu Resource Name)

          It is the unique identifier of Baidu AI Cloud resources. You can use this identifier to call or identify Baidu AI Cloud resources, such as API calls, DuerOS skill calls, and IAM policy identification.

          BSC

          Baidu Streaming Computing (BSC) provides low-latency, high-throughput, and high-accuracy real-time processing of streaming data. It is deeply optimized on the basis of being fully compatible with Apache Spark. Based on Baidu's self-developed BigSQL, complex business logic data processing is implemented through SQL statements, which is easy to use, and provides comprehensive, real-time monitoring indicators.

          BTS

          Baidu Table Service (BTS) is a Nosql data storage service built on Baidu's self-developed distributed table storage table. It provides massive structured, semi-structured data storage and real-time access.

          Bucket

          Bucket can be understood as a namespace. Bucket is equivalent to a hard disk in a stand-alone system, and Object is equivalent to a file stored on the hard disk. Users can create up to 100 Buckets, but the number and size of objects stored in each bucket are unlimited. Bucket names are unique within a region and cannot be modified.

          Baidu Data Factory PINGO

          Baidu Data Factory Pingo is an integrated batch and streaming data processing system provided on Baidu AI Cloud. It runs an optimized Spark calculation engine on top of elastic computing resource management and improved data access management layer, and provides SQL analysis and DataFrame API. It supports low-latency batch and streaming data processing, and provides external REST Service task execution interface.

          Baidu Data Science Platform JARVIS

          Jarvis is a visual data mining and analysis scientific environment. It integrates Baidu's open source PaddlePaddle deep learning framework and also supports other excellent frameworks, such as Tensorflow. Help developers manage complex project environments, while providing code and visual interaction modes to help users easily complete data mining and analysis.

          Alarm

          Alarms generally refer to the use of monitoring items, alarm strategies, and alarm actions to implement event notification functions.

          Alarm strategy

          Alarm strategy refers to a rule that is used to express the conditions under which an item is in an "abnormal" state.

          Alarm strategy status

          Alarm policy status refers to the status of the alarm monitoring item, which consists of three states: normal, abnormal, and insufficient data.

          • When the alarm rule set in the alarm policy is not established and the alarm conditions are not met, it belongs to the "normal" state;
          • When the alarm rules set in the alarm policy are established and the alarm conditions are met, it is in an "abnormal" state;
          • When the monitoring item associated with the alarm policy does not have any data within the determined time range, it belongs to the "insufficient data" state.

          Alarm action

          An alarm action refers to a user performing a corresponding trigger action for a certain state of the alarm strategy. Currently it only supports two actions: ��Send Alarm Email�� and ��Send Alarm SMS��, and subsequently, such actions as ��Automatic Capacity Expansion�� and ��BCC On/Off�� will be supported.

          Alarm shield

          Alarm masking means that the alarm action is not triggered, including email and text messages, but the status of the alarm strategy is still judged and displayed.

          Backup storage

          It is the underlying storage resource used to persistly store backups such as database data or logs.

          Standby node

          The node used to ensure service reliability in the primary instance. The standby node maintains synchronization with the primary node through asynchronous replication. The standby node is not visible to users.

          Local Disk

          Disk media commonly used in dedicated instances, which can provide high-IO read and write performance for dedicated instances. RAID5 is used to achieve high availability of physical disks on customer-specific physical servers. When a physical disk fails, the normal use of the disk array and customer-specific instances can be guaranteed. In dedicated instances, offline expansion of local disks can be supported.

          Edge node

          Any place outside the cloud computing center; depending on the needs of different scenarios and the degree of delay tolerance, the choices include but are not limited to: Local device side, local area network node (gateway, controller, control system server), wide area network node (base station, CDN).

          Tag

          A tag is a key-value pair that is used to provide additional information, such as "device number=95D8-7913", "model=ABC123", "factory number=1234567890", and so on.

          Play certification

          In order to avoid the risk of long-term exposure of the playback address, LSS supports the playback address encryption policy. After the playback authentication is enabled, the user can set the validity period of the playback address and need to add a playback token to play.

          Previous
          A
          Next
          C