检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Credential encryption Credentials for online collection are encrypted and stored on MgC. If you choose to deploy the MgC Agent in your source environment to collect data, your credentials are encrypted and stored locally on the MgC Agent (formerly named Edge).
NOTICE: If the key file is not encrypted, you do not need to enter the password. Then specify Network Range, which can be a single IP address or an IP address range.
Enable KMS Encryption If you do not select this option, whether migrated data will be encrypted in the target buckets depends on the server-side encryption setting of the buckets.
Enable KMS Encryption If you do not select this option, whether migrated data will be encrypted in the target buckets depends on the server-side encryption setting of the buckets.
Encrypted storage of credentials: All credentials used for data collection are encrypted to ensure security. Credentials used for online collection are stored only on MgC.
Enable KMS Encryption If you do not select this option, whether migrated data will be encrypted in the target buckets depends on the server-side encryption setting of the buckets.
Table 5 Advanced options Parameter Description Enable KMS Encryption If you do not select this option, whether migrated data will be encrypted in the target buckets depends on the server-side encryption setting of the buckets.
Enable KMS Encryption If you do not select this option, whether migrated data will be encrypted in the target bucket depends on the server-side encryption setting of the bucket.
Enable KMS Encryption If you do not select this option, whether migrated data will be encrypted in the target buckets depends on the server-side encryption setting of the buckets.
If you select this option, all migrated objects will be encrypted before they are stored to the target bucket. NOTE: Using KMS to encrypt migrated data may slow down the migration speed by about 10%.
Encrypted files SMS cannot migrate OSs that contain protected folders or encrypted volumes. Encrypted systems SMS cannot migrate OSs that are encrypted, such as Windows OSs protected with BitLocker.
Encrypted files MgC cannot migrate OSs that contain protected folders or encrypted volumes. External storage of servers MgC cannot migrate data from the external storage attached to a source server.
For example, if the source object was encrypted but the encryption option was not enabled for the migration workflow, the source object will not be encrypted after being migrated to the target. If the target object has your desired encryption attribute, ignore this error.
Collection from databases requiring encrypted connections is not supported. To generate accurate target database recommendations, discover source databases by creating an online discovery task.
Encryption If you select No, the system and data disks will not be encrypted for target servers newly created in the workflow. If you select Yes, the system and data disks will be encrypted for target servers newly created in the workflow.
Enable Disk Encryption If you select No, the system and data disks will not be encrypted for target server newly created in the workflow. If you select Yes, the system and data disks will be encrypted for target servers newly created by the workflow.
NOTICE: If the key file is not encrypted, you do not need to enter the password. Then specify Network Range, which can be a single IP address or an IP address range.
Local encrypted storage of credentials: The credentials you provided for the MgC Agent are encrypted and stored locally and are not transmitted to the cloud over the Internet. Local storage of collected data: Data collected offline by the MgC Agent is stored locally.
- Enable KMS Encryption If you do not select this option, whether migrated data will be encrypted in the target buckets depends on the server-side encryption setting of the buckets.
- Enable KMS Encryption If you do not select this option, whether migrated data will be encrypted in the target bucket depends on the server-side encryption setting of the bucket.