Alibaba Cloud International Product Updates showcases the latest news and information of our products, helping you to quickly discover and understand our latest product releases, updates, and offers on the Alibaba Cloud International Website.
Information about fine-grained data objects such as tables, views, and functions can be displayed in the output of the SHOW command.
Target customers: data analysts and data management personnel.
Features released: Users can easily perform SHOW operations on tables, views, and functions. For example, users can perform SHOW operations to display the information about common tables and external tables, display the information about common views and materialized views, and display the information about custom functions and built-in functions.
Learn more about MaxCompute
E-MapReduce (EMR) clusters support data disk encryption.
Target customers: all users.
Features released: You can turn on Data Disk Encryption when you create an EMR cluster. The following types of data disks can be encrypted: enhanced SSDs, standard SSDs, and ultra disks. After a data disk is encrypted, both dynamic data and static data are encrypted for the data disk to meet your security and compliance requirements.
If you delete a RAM user or an AccessKey pair, the RAM user or AccessKey pair is moved to the recycle bin. If a service failure occurs after you delete the RAM user or AccessKey pair, you can restore the RAM user or AccessKey pair from the recycle bin. This helps reduce service loss.
Target customers: all customers who use RAM for user management. Customers whose services are accessed by multiple users and programs.
Features released: Feature description: 1) If you delete a RAM user or an AccessKey pair, the RAM user or AccessKey pair is moved to the recycle bin. You can restore the RAM user or AccessKey pair. 2) You can permanently delete the RAM users and AccessKey pairs from the recycle bin. The retention period of RAM users and AccessKey pairs in the recycle bin is 30 days. If the retention period expires, the system automatically deletes the RAM users and AccessKey pairs.
The Access Links and Ports tab of the E-MapReduce (EMR) console provides the native UI addresses of open source components. You can use the native UI addresses of open source components to access the web UIs of the components in different cluster environments.
Target customers: all users.
Features released: The Access Links and Ports tab provides two methods for you to access the web UIs of open source components that are deployed in an EMR cluster. You can use the native UI address or the Knox proxy address of an open source component to access the web UI of the component. The Knox proxy address can be an internal or public Knox proxy address. You can access the web UIs of open source components in different cluster environments.
Learn more about E-MapReduce
The offline key analysis feature now allows you to analyze any backup file or cluster instance.
Target customers: all users.
Features released: You can perform offline key analysis on any backup file of an instance and use the analysis results to evaluate historical large keys of the instance. You can also perform offline key analysis on a cluster instance to identify large keys.
Learn more about ApsaraDB for Redis
Elastic Algorithm Service (EAS) allows you to use preemptible instances when you deploy services. You can set the bidding mode of preemptible instances to Set Maximum Price. This greatly reduces costs.
Target customers: customers that have requirements for AI service deployment and AI inference, including the deployment of models such as AI-generated content (AIGC) and ChatGPT.
Features released: When you use public resource groups to deploy services in EAS, you can select preemptible instances to reduce costs. Preemptible instances are more cost-effective compared with pay-as-you-go instances of public resource groups. Prices of preemptible instances fluctuate in real time based on the changes in supply and demand.
When you deploy services in Elastic Algorithm Service (EAS) of Machine Learning Platform for AI, you can specify multiple instance specifications in the configuration file. Resources are created based on the configuration file. This reduces risks that are caused by insufficient resources of a single specification.
Target customers: customers that have requirements for AI service deployment and AI inference, including the deployment of models such as AIGC and ChatGPT.
Features released: If you specify computing resources of a single specification when you deploy a service, the service may not work as expected due to insufficient resources of the specified specification. EAS allows you specify multiple instance specifications in the configuration file. Resources are created based on the configuration file. This reduces risks that are caused by insufficient resources of a single specification.
Learn more about Machine Learning Platform For AI
After the intelligent whitelist feature is enabled, Web Application Firewall (WAF) performs intelligent learning based on historical service traffic and identifies basic protection rules that may cause false positives. Then, the basic protection rules and URLs that are always inadvertently blocked are automatically added to a whitelist. This way, requests that are sent from the URLs can bypass the detection of the basic protection rules. This helps prevent normal requests from being blocked.
Target customers: users who want to reduce false positives.
Features released: The intelligent whitelist feature is supported in the following editions of WAF 3.0: Pay-as-you-go, Enterprise, and Ultimate. You can enable the intelligent whitelist feature in the basic protection rule module. After the intelligent whitelist feature is enabled, WAF performs intelligent learning based on historical service traffic and identifies basic protection rules that may cause false positives. Then, the basic protection rules and URLs that are always inadvertently blocked are automatically added to a whitelist. This way, requests that are sent from the URLs can bypass the detection of the basic protection rules. This helps prevent normal requests from being blocked.
The validity period of bot management rules can be specified. The validity period can be a specific period of time or a recurring schedule.
Target customers: users who want to protect websites or apps from crawlers and traffic flood attacks.
Features released: The validity period of bot management rules can be specified. The validity period can be a specific period of time or a recurring schedule. We recommend that you enable stricter bot management rules for your websites or apps during major events to increase barriers to attacks.
Learn more about WAF
The new E-MapReduce (EMR) console is available in the Malaysia (Kuala Lumpur) region.
The Advanced Edition is released in the Singapore region.
China (Beijing), China (Ulanqab), China (Shanghai), China (Shenzhen), China (Guangzhou), China (Chengdu), and China (Hong Kong)
Learn more about Elasticsearch
Code Smell - High Cyclomatic Complexity with Multi-Layer Nesting
1,097 posts | 322 followers
FollowAlibaba Cloud Community - December 28, 2023
Alibaba Cloud Community - January 16, 2024
Alibaba Clouder - October 13, 2020
Alibaba Cloud Community - November 16, 2023
ApsaraDB - April 20, 2023
Alibaba Cloud Native Community - March 25, 2019
1,097 posts | 322 followers
FollowAlibaba Cloud is committed to safeguarding the cloud security for every business.
Learn MoreSimple, secure, and intelligent services.
Learn MoreA new generation of business Intelligence services on the cloud
Learn MoreConduct large-scale data warehousing with MaxCompute
Learn MoreMore Posts by Alibaba Cloud Community
Start building with 50+ products and up to 12 months usage for Elastic Compute Service
Get Started for Free Get Started for Free