What operations are high-risk operation on FusionCompute V1R5C00

0

refer to the link:
http://support.huawei.com/enterprise/en/doc/DOC1000069915?idPath=7919749%7C7919788%7C9856606%7C21462752%7C8576912

Other related questions:
After a query operation, the CPU usage is high
When you log in to an S series switch (except the S1700) through Telnet from a host, the switch and the host need to exchange packets if you perform any operations. The CPU of the switch processes TCP packets received from the host, and encapsulates related information into TCP packets to send to the host. The query operation requires a large amount of data, and the CPU of the switch receives and sends packets frequently. Therefore, the CPU usage is high after the query operation.

Query of operation logs on the USG6000 series
By checking operation logs, you can view records for operations such as login, logout, and device configuration, learn the device management history, and improve device security. Context Only the USG6000 supports operation logs, and such logs can be displayed only when a hard disk is installed. Note: For the USG6650/6660/6670/6680, the operation log page is displayed no matter whether hard disks are installed. The firewall is deployed between the Internet and the network to be protected. When the IP address or login mode is configured for an administrator to log in to the firewall or the administrator performs any operation after login, operation logs are generated. Procedure 1. Choose Monitor > Log > Operation Log to view operation logs. 2. Choose Customize and select/deselect conditions for threat log display. 3. (Optional) Click Export to export operation logs in CSV format to the management PC.

What is the operating system for the UOA?
The operating system for the UOA is 64-bit SUSE11 SP1.

What is the operation principle of Kafka?
Producers publish data to Kafka topics, and Consumers subscribe to the topics and consume messages.

What is the operation principle of Streaming?
A Streaming topology can be developed and compressed into a JAR file by using Storm APIs or referring to the CQL syntax manual. After the topology is submitted to the Streaming cluster, Nimbus automatically assigns it to the Supervisor node for processing. The topology logs can be viewed on the UI through the port provided by Logviewer.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top