Concepts

<p>This article describes common terms and their brief descriptions when using Ping An Cloud ELB.</p> <table border="1" cellpadding="0" cellspacing="0" style="width:0px"> <tbody> <tr> <td style="background-color:#ededed; width:189px"> <p><strong>Terms</strong></p> </td> <td style="background-color:#ededed; width:594px"> <p><strong>Description</strong></p> </td> </tr> <tr> <td style="width:189px"> <p>ELB service</p> </td> <td style="width:594px"> <p>A network load balancing service which Ping An Cloud provides for its customers.</p> <p>ELB service provides a unified access interface for the computing node cluster formed by back-end servers. Ping An Cloud mainly provides ELB service under four protocols including TCP, UDP, HTTP and HTTPS.</p> </td> </tr> <tr> <td style="width:189px"> <p>ELB instances</p> </td> <td style="width:594px"> <p>ELB instances are the actual vector of ELB service.</p> <p>Users can deploy ELB service by creating and configuring ELB instances.</p> </td> </tr> <tr> <td style="width:189px"> <p>Listener</p> </td> <td style="width:594px"> <p>Listener is an important functional component of ELB instance. A listener provides listening port, protocols, ELB algorithms and health check, and routes requests from clients to hosts in the resource pool.</p> <p>ELB service operates according to the creation and configuration of listeners specified by the user.</p> </td> </tr> <tr> <td style="width:189px"> <p>Server resource pool</p> </td> <td style="width:594px"> <p>A server resource pool is a computing resource clusters that can provide Internet services.</p> <p>ELB service provides a unified access port for Internet clients and distributes access traffic of t clients to member servers in the server resource pool via ELB algorithms to realize load balancing.</p> </td> </tr> <tr> <td style="width:189px"> <p>Service IP addresses</p> </td> <td style="width:594px"> <p>ELB instances inform the unified access port to the clients network by releasing service IP address externally.</p> </td> </tr> <tr> <td style="width:189px"> <p>Access control</p> </td> <td style="width:594px"> <p>ELB features listening level access control. Users can configure different access control policies for different listeners by whitelisting or blacklisting to control access permission.</p> </td> </tr> <tr> <td style="width:189px"> <p>Certificate management</p> </td> <td style="width:594px"> <p>When creating a HTTPS protocol, you need to upload SSL certificates and use them for security verification.</p> </td> </tr> </tbody> </table>
Did the above content solve your problem? Yes No
Please complete information!

Call us

400-151-8800

Email us

cloud@pingan.com

Online customer service

Instant reply

Technical Support

cloud products