检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Value range: AES256, indicating AES is used to encrypt the object in SSE-C. For details, see Table 10. Default value: None sseAlgorithm SSEAlgorithmEnum No Explanation: Encryption algorithm. Restrictions: Only AES256 is supported. Value range: See Table 12.
KMS Key: Select a KMS key and use it to encrypt sensitive data. If no KMS key is available, click Access KMS to go to the KMS console and create one. Agent: Select a DataArts Migration cluster as the connection agent.
data type privacy_detail String Personal privacy data details file_type String File type mimetypes String File type rule_list List<Map<String,String>> List of matched rules keyword String Keyword for matching sensitive data rules available_zone String AZ encrypted String Whether to encrypt
\clear_token The full encryption function is used to destroy the key cached on the server. This function is used only when the memory decryption emergency channel is enabled. \ct The full encryption function is used to destroy the key cached on the server.
For security purposes, encrypt your AK and SK and store them in the configuration file or environment variables. // In this example, the AK and SK are stored in environment variables for identity authentication.
For security purposes, encrypt your AK and SK and store them in the configuration file or environment variables. // In this example, the AK and SK are stored in environment variables for identity authentication.
For security purposes, encrypt your AK and SK and store them in the configuration file or environment variables. // In this example, the AK and SK are stored in environment variables for identity authentication.
Encrypted Equality Query GS_CLIENT_GLOBAL_KEYS GS_CLIENT_GLOBAL_KEYS_ARGS GS_COLUMN_KEYS GS_COLUMN_KEYS_ARGS GS_ENCRYPTED_COLUMNS GS_ENCRYPTED_PROC Parent topic: System Catalogs
Encrypted Functions and Operators byteawithoutorderwithequalcolin(cstring) Description: Converts input data to the internal byteawithoutorderwithequalcol format. Parameter type: cstring Return type: byteawithoutorderwithequalcol byteawithoutorderwithequalcolout(byteawithoutorderwithequalcol
Encrypted Equality Query GS_CLIENT_GLOBAL_KEYS GS_CLIENT_GLOBAL_KEYS_ARGS GS_COLUMN_KEYS GS_COLUMN_KEYS_ARGS GS_ENCRYPTED_COLUMNS GS_ENCRYPTED_PROC Parent topic: System Catalogs
Encrypted Functions and Operators byteawithoutorderwithequalcolin(cstring) Description: Converts input data to the internal byteawithoutorderwithequalcol format. Parameter type: cstring Return type: byteawithoutorderwithequalcol byteawithoutorderwithequalcolout(byteawithoutorderwithequalcol
Configuring the Encrypted Transmission Scenario This topic describes how to configure the server and client parameters of the Flume service (including the Flume role) after the cluster is installed to ensure proper service running. This section applies to MRS 3.x or later. Prerequisites
EVS Disks Are Encrypted Rule Details Table 1 Rule details Parameter Description Rule Name volumes-encrypted-check Identifier volumes-encrypted-check Description If a mounted EVS disk is not encrypted, this disk is noncompliant. Tag evs, ecs Trigger Type Configuration change Filter
Encrypted Functions and Operators byteawithoutorderwithequalcolin(cstring) Description: Converts input data to the internal byteawithoutorderwithequalcol format. Parameter type: cstring Return type: byteawithoutorderwithequalcol byteawithoutorderwithequalcolout(byteawithoutorderwithequalcol
Encrypted Functions and Operators byteawithoutorderwithequalcolin(cstring) Description: Converts input data to the internal byteawithoutorderwithequalcol format. Parameter type: cstring Return type: byteawithoutorderwithequalcol byteawithoutorderwithequalcolout(byteawithoutorderwithequalcol
Application running security: Encrypt authentication credentials and sensitive configuration items for storage and invoking, preventing sensitive data leakage. Manage certificates throughout lifecycles, including application, distribution, use, deletion, and monitoring.
After the KMS key is deleted, users cannot encrypt disks.
After the KMS key is deleted, users cannot encrypt disks. Too many query tombstones TooManyQueryTombstones Major If there are too many query tombstones, queries may time out, affecting query performance. Select right query and deleting methods and avoid long range queries.
By default, this function is disabled, archive objects will be ignored during the migration, and the information about these objects will be recorded in the list of failed objects. enable_kms Boolean Indicates whether to use KMS to encrypt the data to be stored in the destination
For security purposes, encrypt your AK and SK and store them in the configuration file or environment variables. // In this example, the AK and SK are stored in environment variables for identity authentication.