检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
For security, encrypt your AK/SK and store them in the configuration file or environment variables. If the message "ERROR: schema "xxx" does not exist Position" is displayed when you create a foreign table, the schema does not exist.
For security, encrypt your AK/SK and store them in the configuration file or environment variables. If the message "ERROR: schema "xxx" does not exist Position" is displayed when you create a foreign table, the schema does not exist.
Value range: AES256, indicating AES is used to encrypt the object in SSE-C. For details, see Table 9. Default value: None sseAlgorithm SSEAlgorithmEnum No Explanation: Encryption algorithm. Restrictions: Only AES256 is supported. Value range: See Table 8.
Value range: AES256, indicating AES is used to encrypt the object in SSE-C. For details, see Table 9. Default value: None sseAlgorithm SSEAlgorithmEnum No Explanation: Encryption algorithm. Restrictions: Only AES256 is supported. Value range: See Table 8.
Value range: AES256, indicating Advanced Encryption Standard (AES) is used to encrypt the object in SSE-C. For details, see Table 9. Default value: None sseAlgorithm SSEAlgorithmEnum No Explanation: Encryption algorithm. Restrictions: Only AES256 is supported.
Value range: AES256, indicating Advanced Encryption Standard (AES) is used to encrypt the object in SSE-C. For details, see Table 9. Default value: None sseAlgorithm SSEAlgorithmEnum No Explanation: Encryption algorithm. Restrictions: Only AES256 is supported.
Value range: AES256, indicating Advanced Encryption Standard (AES) is used to encrypt the object in SSE-C. For details, see Table 9. Default value: None sseAlgorithm SSEAlgorithmEnum No Explanation: Encryption algorithm. Restrictions: Only AES256 is supported.
Value range: AES256, indicating Advanced Encryption Standard (AES) is used to encrypt the object in SSE-C. For details, see Table 9. Default value: None sseAlgorithm SSEAlgorithmEnum No Explanation: Encryption algorithm. Restrictions: Only AES256 is supported.
Value range: AES256, indicating Advanced Encryption Standard (AES) is used to encrypt the object in SSE-C. For details, see Table 9. Default value: None sseAlgorithm SSEAlgorithmEnum No Explanation: Encryption algorithm. Restrictions: Only AES256 is supported.
Encryption Configure whether to encrypt underlying storage. If you select Enabled (key), an encryption key must be configured. Before using encryption, check whether the region where the EVS disk is located supports disk encryption.
NOTE: SSE-KMS encryption is used by default. Other encryption methods or custom encryption is not supported. If the destination is a parallel file system (PFS), server-side encryption is not supported.
If you use YAML to create a secret, you need to manually encrypt its value using Base64. # echo -n "Content to be encoded" | base64 Check Item 8: Whether the Container Startup Command Is Correctly Configured The error messages are as follows: Solution Click the workload name to go
Table 9 Parameter Parameter Type Description param_name String Parameter name. param_type String Parameter type. param_group String Parameter group. default_value String Initial value of a parameter. id String Parameter ID. encryption Boolean Whether to encrypt the data. hint String
Is_pw_encrypted is_pw_encrypted string false No Whether to encrypt the value. Sasl_mechanism sasl_mechanism string PLAIN No SASL mechanism. Group_id group_id string -- No Consumer group ID. Set sasl_jaas_config based on the Kafka specifications.
SSL Connection To improve data security during the migration, you are advised to enable SSL to encrypt migration links and upload a CA certificate.
NOTE: Using KMS to encrypt migrated data may slow down the migration speed by about 10%. This option is only available when KMS is supported in the region you are migrating to. Filter Source Data Filter files to be migrated by applying filters.
NOTE: Using KMS to encrypt migrated data may slow down the migration speed by about 10%. This option is only available when KMS is supported in the region you are migrating to.
Disk encryption will not encrypt backup data stored in OBS. If disk encryption is enabled, keep the key properly. Once the key is disabled, deleted, or frozen, the database will be unavailable.
Ransomware can intrude a server, encrypt data, and ask for ransom, causing service interruption, data leakage, or data loss. Attackers may not unlock the data even after receiving the ransom. HSS provides static and dynamic ransomware prevention.
If Custom command is selected, exercise caution when inputting sensitive information in the echo, cat, or debug command, or encrypt sensitive information to avoid information leakage.