检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Use the keys from DEW to fully or partially encrypt objects in an OBS bucket. For details, see Encrypting Data in OBS.
Disable Encrypt Trace File CTS supports trace file encryption. Trace files transferred to OBS buckets can be encrypted using keys provided by DEW.
Monitoring DEW Key Usage Using CTS DEW provides the key function to help you generate, encrypt, and decrypt data encryption keys (DEKs) to protect sensitive data in cloud services.
Data Encryption Workshop (DEW): Provides keys that can be used to encrypt trace files. LTS: stores logs. SMN: Sends email or SMS message notifications to users when key operations are performed. Enabling CTS for the First Time Log in to the management console.
Encrypt Trace File When OBS Bucket Account is set to Logged-in user, you can configure an encryption key for the traces. When Encrypt Trace File is enabled, CTS obtains the key IDs of the current login user from DEW. You can select a key from the drop-down list.
Encrypt Trace File When OBS Bucket Account is set to Logged-in user, you can configure an encryption key for the traces. When Encrypt Trace File is enabled, CTS obtains the key IDs of the current login user from DEW. You can select a key from the drop-down list.
Data Encryption Workshop (DEW): Provides keys that can be used to encrypt trace files. LTS: stores logs. SMN: Sends email or SMS message notifications to users when key operations are performed. Enabling CTS for the First Time Log in to the management console.
Disable Encrypt Trace File CTS supports trace file encryption. Trace files transferred to OBS buckets can be encrypted using keys provided by DEW.
Trace file encryption: After enabling trace transfer, you can use Data Encryption Workshop (DEW) to encrypt trace files stored in OBS buckets. Trace analysis: This function is provided by CTS and is free to use.
For security, encrypt your AK/SK and store them in the configuration file or environment variables. // In this example, the AK/SK are stored in environment variables for identity authentication.