检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
To ensure security, encrypt your AK and SK, store them in configuration files or environment variables, and decrypt them when needed. # Endpoint of the site where DIS is deployed, for example, https://dis.cn-north-1.myhuaweicloud.com disEndpoint=xx # ID of the region where DIS is,
If you use YAML to create a secret, you need to manually encrypt its value using Base64. echo -n "Content to be encoded" | base64 Unmatched Container Image Tag with the Node Architecture The proper image tag is not used during the workload creation on an Arm node.
SFSAccessKMS: If Agency Name is SFSAccessKMS, SFS Capacity-Oriented is granted the KMS access rights to use custom keys to encrypt or decrypt file systems. KMS key name NOTE: KMS key name is displayed only after the agency named SFSAccessKMS has been created.
After this function is enabled, the SSL certificate is used to encrypt communication. Any modification of this parameter takes effect only after CM server is restarted.
Value range: Boolean After this function is enabled, the SSL certificate is used to encrypt communication. Any modification of this parameter takes effect only after a restart. For details about how to modify this parameter, see Table 2.
If Custom command is selected, exercise caution when inputting sensitive information in the echo, cat, or debug command, or encrypt sensitive information to avoid information leakage.
SSL Connection To improve data security during a migration on a public network, you are advised to enable SSL to encrypt migration links and upload a CA certificate.
Encryption Configure whether to encrypt underlying storage. If you select Enabled (key), an encryption key must be configured. Before using encryption, check whether the region where the EVS disk is located supports disk encryption.
Ransomware can encrypt and control your data assets, such as documents, emails, databases, source code, images, and compressed files, to leverage victim extortion. Web shells Check whether the files (often PHP and JSP files) in the web directories on containers are web shells.
KMS key used to encrypt and decrypt data source authentication information. Select a default or custom key. NOTE: When you use KMS for encryption through DataArts Studio or KPS for the first time, the default key dlf/default or kps/default is automatically generated.
Refer to Table 1 to turn on/off backup, define time interval to save the data, and encrypt the saved data. Unsaved changes of each SQL Terminal/PL/SQL Viewer are taken as backup and stored in DataStudio\UserData\<user name>\Autosave folder.
For security purposes, encrypt your access key, store it in the configuration file or environment variables, and decrypt it before using it. In this example, SecretAccessKeyID is stored in the environment variables for identity authentication.
For security purposes, encrypt your AK and SK and store them in the configuration file or environment variables. In this example, the AK and SK are stored in environment variables for identity authentication.
Value range: AES256, indicating AES is used to encrypt the object in SSE-C. For details, see Table 7. Default value: None sseAlgorithm SSEAlgorithmEnum No Explanation: Encryption algorithm. Restrictions: Only AES256 is supported. Value range: See Table 9.
Value range: AES256, indicating AES is used to encrypt the object in SSE-C. For details, see Table 7. Default value: None sseAlgorithm SSEAlgorithmEnum No Explanation: Encryption algorithm. Restrictions: Only AES256 is supported. Value range: See Table 6.
Value range: Boolean After this function is enabled, the SSL certificate is used to encrypt communication. Any modification of this parameter takes effect only after CM Server is restarted. For details about how to modify the parameter, see Table 2.
To test instances with SSL enabled, change "amqp://" to "amqps://" to encrypt data transmission. Single-queue test script: .
The value is obtained by using the MD5 encryption algorithm to encrypt the string consisting of key, Stream Name, and txTime. txSecret = md5 (Key + Stream Name + txTime) Duration How long a signed URL remains effective.
NOTE: Using KMS to encrypt migrated data may slow down the migration speed by about 10%. This option is only available when KMS is supported in the region you are migrating to.
__system__cmkid String Specifies the ID of the key used to encrypt the image. hw_vif_multiqueue_enabled String Specifies whether the image supports NIC multi-queue. The value can be true or false.