检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
__system__cmkid String Specifies the ID of the key used to encrypt the image. min_disk Integer Specifies the minimum disk space (GB) required for running the image. For Linux, the value ranges from 10 GB to 1,024 GB.
For security, encrypt your AK/SK and store them in the configuration file or environment variables. // In this example, the AK/SK stored in the environment variables are used.
To ensure security, encrypt your passwords, store them in configuration files or environment variables, and decrypt them when needed. Constructing dependency information and creating a Spark session Import dependencies.
This parameter is left blank by default. kms_key_id String ID of the KMS CMK used to encrypt a secret version value. secret_name String Secret name version_stages Array of strings Secret version status list. Each status tag is unique for a secret version.
This parameter is left blank by default. kms_key_id String ID of the KMS CMK used to encrypt a secret version value. secret_name String Secret name version_stages Array of strings Secret version status list. Each status tag is unique for a secret version.
This parameter is left blank by default. kms_key_id String ID of the KMS CMK used to encrypt a secret version value. secret_name String Secret name version_stages Array of strings Secret version status list. Each status tag is unique for a secret version.
If Custom command is selected, exercise caution when inputting sensitive information in the echo, cat, or debug command, or encrypt sensitive information to avoid information leakage.
If Custom command is selected, exercise caution when inputting sensitive information in the echo, cat, or debug command, or encrypt sensitive information to avoid information leakage.
KMS Key Yes KMS key used to encrypt and decrypt data source authentication information. Select a default or custom key. NOTE: When you use KMS for encryption through DataArts Studio or KPS for the first time, the default key dlf/default or kps/default is automatically generated.
Encrypt your sensitive data if necessary. Billing After ELB is interconnected with LTS, LTS charges you based on the log read/write traffic, log storage volume, and log transfer traffic. For details, see LTS Billing Items.
Specify whether to encrypt the header. Figure 6 Header parameters For custom HTTPS events, add authorization configurations for the event target to improve security. If the request header and value are invalid, the encryption option is unavailable.
NOTE: Using KMS to encrypt migrated data may slow down the migration speed by about 10%. This option is only available when KMS is supported in the region you are migrating to.
For security purposes, encrypt your AK and SK and store them in the configuration file or environment variables. In this example, the AK and SK are stored in environment variables for identity authentication.
Value range: AES256 (AES256 encryption algorithm) Default value: None ssec_customer_key char * No Explanation: Indicates the key used to encrypt an object. Restrictions: The header is used only in SSE-C mode.
Value range: AES256 (AES256 encryption algorithm) Default value: None ssec_customer_key char * No Explanation: Indicates the key used to encrypt an object. Restrictions: The header is used only in SSE-C mode.
Value range: AES256 (AES256 encryption algorithm) Default value: None ssec_customer_key char * No Explanation: Indicates the key used to encrypt an object. Restrictions: The header is used only in SSE-C mode.
Encrypt the CMKs of CEKs in round robin (RR) mode and encrypt the plaintext of CEKs. ALTER COLUMN ENCRYPTION KEY The M-compatible mode does not support the full encryption. Therefore, this syntax is not supported.
When entering a parameter containing sensitive information (for example, login password), add an at sign (@) before the parameter name to encrypt the parameter value. This prevents the sensitive information from being persisted in plaintext.
For security purposes, encrypt your AK and SK and store them in the configuration file or environment variables. // In this example, the AK and SK are stored in environment variables for identity authentication.
It is used to encrypt the target object. Value range: See Table 6 or Table 7. Default value: None sourceSseHeader SseCHeader No Explanation: Header for server-side decryption. It is used to decrypt the source object. Value range: See Table 6.