当前位置:网站首页>When FC connects to the database, do you have to use a custom domain name to access it outside?
When FC connects to the database, do you have to use a custom domain name to access it outside?
2022-07-07 14:02:00 【Alibaba cloud Q & A】
FC Connect to database , Do you have to use a custom domain name to access outside ?
Take the answer 1:
sdk、http trigger Can be accessed externally .
This answer comes from the nail group “ Alibaba function calculation official website customer ”
边栏推荐
- Laravel5 call to undefined function openssl cipher iv length() 报错 PHP7开启OpenSSL扩展失败
- 使用day.js让时间 (显示为几分钟前 几小时前 几天前 几个月前 )
- Navicat run SQL file import data incomplete or import failed
- 内存溢出和内存泄漏的区别
- C语言数组相关问题深度理解
- 最佳实践 | 用腾讯云AI意愿核身为电话合规保驾护航
- Laravel form builder uses
- The delivery efficiency is increased by 52 times, and the operation efficiency is increased by 10 times. See the compilation of practical cases of financial cloud native technology (with download)
- 648. Word replacement: the classic application of dictionary tree
- What parameters need to be reconfigured to replace the new radar of ROS robot
猜你喜欢
2022-7-7 Leetcode 34.在排序数组中查找元素的第一个和最后一个位置
社会责任·价值共创,中关村网络安全与信息化产业联盟对话网信企业家海泰方圆董事长姜海舟先生
2022-7-6 beginner redis (I) download, install and run redis under Linux
Battle Atlas: 12 scenarios detailing the requirements for container safety construction
How to check the ram and ROM usage of MCU through Keil
Help tenants
干货|总结那些漏洞工具的联动使用
Vmware 与主机之间传输文件
SSRF漏洞file伪协议之[网鼎杯 2018]Fakebook1
数据库系统概论-第一章绪论【概念模型、层次模型和三级模式(外模式、模式、内模式)】
随机推荐
Is the compass stock software reliable? Is it safe to trade stocks?
Cargo placement problem
"Song of ice and fire" in the eleventh issue of "open source Roundtable" -- how to balance the natural contradiction between open source and security?
Ogre introduction
带你掌握三层架构(建议收藏)
Excerpt from "misogyny: female disgust in Japan"
Battle Atlas: 12 scenarios detailing the requirements for container safety construction
请问,在使用flink sql sink数据到kafka的时候出现执行成功,但是kafka里面没有数
call undefined function openssl_cipher_iv_length
Dry goods | summarize the linkage use of those vulnerability tools
What are the principles for distinguishing the security objectives and implementation methods that cloud computing security expansion requires to focus on?
Oracle advanced (V) schema solution
Server to server (S2S) event (adjust)
FCOS3D label assignment
[1] ROS2基础知识-操作命令总结版
Drawerlayout suppress sideslip display
PostgreSQL array type, each splice
Navicat运行sql文件导入数据不全或导入失败
Flink | multi stream conversion
Redis 核心数据结构 & Redis 6 新特性详