百度智能云

All Product Document

          Reference

          L

          LSS template

          A template is a set of specific operational function parameters used to configure live audio and video streams. The template can not only configure basic parameters such as audio and video coding standards, bit rates, and output stream types, but also configure synchronous recording, watermarking, and thumbnails when creating a new domain name.

          Cold backup

          Backups when the database is down or under maintenance.

          Temporary Security Token

          A security token is a key that a user temporarily accesses and is time-effectively controlled. A user's application for a temporary identity generally includes a temporary AKSK and Security Token. When using a temporary identity to make a request, it is necessary to use a temporary AKSK signature at the same time and pass the Security Token in the header. At this time, the result of IAM authentication is a temporary identity information.

          Temporary data disk

          A block-level storage device based on an SSD RAID5 high-speed solid-state disk array with high throughput and high-speed read and write capabilities. Realize data reliability through RAID5 redundant array. Creating snapshots based on temporary data disks is not supported at this time. It is usually used to store cached data or application scenarios with high IOPS requirements. Unlike CDS cloud disks, it is not recommended to store data with high reliability and durability requirements in temporary data disks.

          Token Authentication

          One method of IAM authentication is token authentication, which is a type of authentication compatible with Openstack products. After the user provides the user and password, the user will be issued a Token Id. The user information corresponding to this Id is stored in the IAM. After the user obtains the Token Id and adds the Token Id header to the request, the authentication can be passed. The Token is time-sensitive. The Token method is a method for internal service use, and it is not recommended to expose it to the outside.

          Stream Computing Job

          It is a business unit of streaming computing. A job describes a complete data processing business logic for streaming computing.

          Routing table

          A routing table is a list of managed routing entries on a router.

          Logical backup

          Logical backup is also called "Export", which is to export data from the database and save it in a file that MySQL can parse. The format of the file is either SQL or text separated by some symbol. Logical backup files can only be used for logical recovery of the database, that is, data import, and cannot be physically restored according to the original storage features of the database.

          Previous
          K
          Next
          M