检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
As data needs to be encrypted and decrypted, you may experience a slight decrease in performance when encrypted transmission is used. Configuring Encrypted Transmission and Mounting the File System (Linux) Install stunnel.
Encrypted Functions and Stored Procedures In the current version, only encrypted functions and stored procedures in SQL or PL/pgSQL are supported.
Encrypted Functions and Stored Procedures In the current version, only encrypted functions and stored procedures in SQL or PL/pgSQL are supported.
The definitions of encrypted columns cannot be modified in an encrypted equality query function or stored procedure, including creating an encrypted table and adding an encrypted column.
The definitions of encrypted columns cannot be modified in an encrypted equality query function or stored procedure, including creating an encrypted table and adding an encrypted column.
As data needs to be encrypted and decrypted, you may experience a slight decrease in performance when encrypted transmission is used. Configuring Encrypted Transmission and Mounting the File System (Linux) Install stunnel.
Parent topic: Configuring an Encrypted Flume Data Collection Task
Precautions Only the backups generated after encrypted backup is enabled will be encrypted. After encrypted backup is disabled, new backup files will not be encrypted for storage. Backup files created before encrypted backup is disabled will not be decrypted.
Setting Encrypted Equality Queries Overview Using gsql to Operate an Encrypted Database Using JDBC to Operate an Encrypted Database Enhancing Security in the Configuration Phase Encrypted Functions and Stored Procedures
Setting Encrypted Equality Query Overview Using gsql to Operate an Encrypted Database Using JDBC to Operate an Encrypted Database Using Go Driver to Operate an Encrypted Database Enhancing Security in the Configuration Phase Encrypted Functions and Stored Procedures
The schema.table.column points to other encrypted columns. In this case, the original data type of the encrypted column is returned.
The schema.table.column points to other encrypted columns. In this case, the original data type of the encrypted column is returned.
When JDBC is used to perform operations on an encrypted database, different connections change the encrypted configuration data. The client calls the isValid method to ensure that the connections can hold the changed encrypted configuration data.
When JDBC is used to perform operations on an encrypted database, different connections change the encrypted configuration data. The client calls the isValid method to ensure that the connections can hold the changed encrypted configuration data.
credit_card | character varying | encrypted -- 13.
credit_card | character varying | encrypted -- 13.
set credit_card = '80000000011111111' where name = 'joy'; UPDATE 1 -- Add an encrypted column to the table. gaussdb=# ALTER TABLE creditcard_info ADD COLUMN age int ENCRYPTED WITH (COLUMN_ENCRYPTION_KEY = cek1, ENCRYPTION_TYPE = DETERMINISTIC); ALTER TABLE -- Delete an encrypted
(19) encrypted with (column_encryption_key = cek1, encryption_type = DETERMINISTIC)); CREATE TABLE Perform other operations on the encrypted table. -- Write data to the encrypted table. gaussdb=# INSERT INTO creditcard_info VALUES (1,'joe','6217986500001288393'); INSERT 0 1 gaussdb
Parent topic: Setting Encrypted Equality Query
Parent topic: Setting Encrypted Equality Query