检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
For security purposes, encrypt your AK and SK and store them in the configuration file or environment variables. // In this example, the AK and SK are stored in environment variables for identity authentication.
Precautions gs_dump and gs_dumpall encrypt the exported data files. These files are decrypted before being imported to prevent data disclosure for higher database security.
Table 8 Parameter Parameter Type Description param_name String Parameter name. param_type String Parameter type. param_group String Parameter group. default_value String Initial value of a parameter. id String Parameter ID. encryption Boolean Whether to encrypt the data. hint String
OBS uses KMS keys to encrypt objects. The checksum, together with the specified algorithm, are stored as part of the object's metadata. If server-side encryption is requested for the object, the checksum is stored in encrypted form.
Using KMS to encrypt migrated data may decrease the migration speed by about 10%. Data encryption is only available if KMS encryption is supported in the region you are migrating to.
Value range: AES256, indicating AES is used to encrypt the object in SSE-C. For details, see Table 7. Default value: None sseAlgorithm SSEAlgorithmEnum No Explanation: Encryption algorithm. Restrictions: Only AES256 is supported. Value range: See Table 6.
For security purposes, encrypt your AK and SK and store them in the configuration file or environment variables. // In this example, the AK and SK are stored in environment variables for identity authentication.
For security purposes, encrypt your AK and SK and store them in the configuration file or environment variables. // In this example, the AK and SK are stored in environment variables for identity authentication.
For security purposes, encrypt your AK and SK and store them in the configuration file or environment variables. // In this example, the AK and SK are stored in environment variables for identity authentication.
For security purposes, encrypt your AK and SK and store them in the configuration file or environment variables. // In this example, the AK and SK are stored in environment variables for identity authentication.
For security purposes, encrypt your AK and SK and store them in the configuration file or environment variables. // In this example, the AK and SK are stored in environment variables for identity authentication.
For security purposes, encrypt your AK and SK and store them in the configuration file or environment variables. // In this example, the AK and SK are stored in environment variables for identity authentication.
For security purposes, encrypt your AK and SK and store them in the configuration file or environment variables. // In this example, the AK and SK are stored in environment variables for identity authentication.
For security purposes, encrypt your AK and SK and store them in the configuration file or environment variables. // In this example, the AK and SK are stored in environment variables for identity authentication.
For security purposes, encrypt your AK and SK and store them in the configuration file or environment variables. // In this example, the AK and SK are stored in environment variables for identity authentication.
For security, encrypt your AK/SK and store them in the configuration file or environment variables. # In this example, the AK/SK are stored in environment variables for identity authentication.
After Encrypt DataStore is enabled, the key cannot be disabled, deleted, or frozen when being used. Otherwise, the cluster becomes abnormal and the database becomes unavailable.
Encrypted Transmission Overview Encrypted transmission allows you to protect your data transmitted between clients and SFS Turbo file systems using the TLS protocol. As data needs to be encrypted and decrypted, you may experience a slight decrease in performance when encrypted transmission
Encrypted Transmission Overview Encrypted transmission allows you to protect your data transmitted between clients and SFS Turbo file systems using the TLS protocol. As data needs to be encrypted and decrypted, you may experience a slight decrease in performance when encrypted transmission
After the KMS key is deleted, users cannot encrypt disks.