检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
secmaster:dataclass:listTypes Querying the search criteria list secmaster:searchCondition:list Querying the data distribution histogram secmaster:search:listHistograms Obtaining the module list secmaster:module:list Searching for an incident list secmaster:incident:list Querying the audit
Permissions management instance * g:EnterpriseProjectId gaussdbformysql:auditlog:list Grants permission to query audit logs. List instance * g:EnterpriseProjectId gaussdbformysql:backup:create Grants permission to create a manual backup.
of all nodes in ZooKeeper. rangeradmin Rangeradmin@123 This user has the Ranger system management permissions and user permissions: Ranger web UI management permission Management permission of each component that uses Ranger authentication rangerauditor Rangerauditor@123 Default audit
If you pay the charge to us net of the withholding tax or tax deduction, and a subsequent tax audit, investigation or inquiry identifies that a filing, withholding or deduction should have been made for/from the charge, you shall be liable to bear and pay amounts due under such a
By default, database configuration files and key files are not allowed, and you can run COPY FROM FILENAME or COPY TO FILENAME for certificate files and audit logs to prevent unauthorized users from viewing or modifying sensitive files.
By default, COPY FROM FILENAME or COPY TO FILENAME cannot be run for database configuration file, key files, certificate files, and audit logs to prevent unauthorized users from viewing or modifying sensitive files.
By default, database configuration files and key files are not allowed, and you can run the COPY FROM FILENAME or COPY TO FILENAME command for certificate files and audit logs to prevent unauthorized users from viewing or modifying sensitive files.
Enumerated values: aws_aurora_mysql tencent_tdsql_c ali_rds_mysql region Yes String Region name of other clouds. traffic_source Yes String Workload file source. sdk: Download audit logs through third-party cloud APIs.
By default, database configuration files and key files are not allowed, and you can run the COPY FROM FILENAME or COPY TO FILENAME command for certificate files and audit logs to prevent unauthorized users from viewing or modifying sensitive files.
If this parameter is set to a value other than none, the statement audit function is enabled. The database administrator can access server logs to view SQL execution records. Parameter type: enumerated type.
If this parameter is set to a value other than none, the statement audit function is enabled. The database administrator can access server logs to view SQL execution records. Value type: enumerated type.
If you pay the charge to us net of the withholding tax or tax deduction, and a subsequent tax audit, investigation or inquiry identifies that a filing, withholding or deduction should have been made for/from the charge, you shall be liable to bear and pay amounts due under such a
Reserved ASC Reserved Reserved Reserved ASENSITIVE N/A Non-reserved N/A ASSERTION Non-reserved Reserved Reserved ASSIGNMENT Non-reserved Non-reserved N/A ASYMMETRIC Reserved Non-reserved N/A AT Non-reserved Reserved Reserved ATOMIC N/A Non-reserved N/A ATTRIBUTE Non-reserved N/A N/A AUDIT
Reserved ASC Reserved Reserved Reserved ASENSITIVE N/A Non-reserved N/A ASSERTION Non-reserved Reserved Reserved ASSIGNMENT Non-reserved Non-reserved N/A ASYMMETRIC Reserved Non-reserved N/A AT Non-reserved Reserved Reserved ATOMIC N/A Non-reserved N/A ATTRIBUTE Non-reserved N/A N/A AUDIT
Reserved ASC Reserved Reserved Reserved ASENSITIVE N/A Non-reserved N/A ASSERTION Non-reserved Reserved Reserved ASSIGNMENT Non-reserved Non-reserved N/A ASYMMETRIC Reserved Non-reserved N/A AT Non-reserved Reserved Reserved ATOMIC N/A Non-reserved N/A ATTRIBUTE Non-reserved N/A N/A AUDIT
Reserved ASC Reserved Reserved Reserved ASENSITIVE N/A Non-reserved N/A ASSERTION Non-reserved Reserved Reserved ASSIGNMENT Non-reserved Non-reserved N/A ASYMMETRIC Reserved Non-reserved N/A AT Non-reserved Reserved Reserved ATOMIC N/A Non-reserved N/A ATTRIBUTE Non-reserved N/A N/A AUDIT
Reserved ASC Reserved Reserved Reserved ASENSITIVE N/A Non-reserved N/A ASSERTION Non-reserved Reserved Reserved ASSIGNMENT Non-reserved Non-reserved N/A ASYMMETRIC Reserved Non-reserved N/A AT Non-reserved Reserved Reserved ATOMIC N/A Non-reserved N/A ATTRIBUTE Non-reserved N/A N/A AUDIT
Reporting audit logs CTS CTS Administrator Configure the CTS permission to report events. CTS does not support fine-grained permissions for event reporting. Therefore, you need to configure the administrator permission.
By default, database configuration files and key files are not allowed, and you can run COPY FROM FILENAME or COPY TO FILENAME for certificate files and audit logs to prevent unauthorized users from viewing or modifying sensitive files.
By default, database configuration files and key files are not allowed, and you can run COPY FROM FILENAME or COPY TO FILENAME for certificate files and audit logs to prevent unauthorized users from viewing or modifying sensitive files.