A developer accesses logs in a Log Service Logstore via the API. The error code returned by the server is 404. Which of these could be the cause?
A developer has written a web application using a microservice architecture, in such an architecture, the client (web browser or mobile application) first initiates a request. The request first reaches the load balancer, then goes through an authentication service, a billing service, then requests a resource, and finally a result is returned. How many spans does such a call chain consist of?
You need to log all actions taken by users of your Alibaba Cloud account, whether via the command line tools or the web console. Which Alibaba Cloud product can you use to create a log of user operations?
How does Cloud Config get permission to gather information about other Alibaba Cloud services? Questions and Answers PDF 5/22
Which of these is NOT a function of CloudMonitor?
A company is developing a music application based on OSS and ECS, their users can download mp3 files after signing up for the application. Recently, the public network traffic to the OSS has doubled but the increase of registered users is less than 10%. After in-depth analysis, system operators find that many download requests are requested from the external search engine. In this case, which of the following measures is thought to be able to address this issue?