检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Storage Pool Management Expanding a Storage Pool Disk Management Attaching an Existing Disk Detaching a Disk Deleting a Disk Expanding the Capacity of a Disk Managing an Encrypted Disk Managing a Shared Disk 02 Purchase ECS billing modes and configurations are available for you to
For how to create encrypted disks, see Create a Disk. Detaching Encrypted Disks Before you detach a disk encrypted by a custom key, check whether the custom key is disabled or scheduled for deletion.
Storage Pool Management Expanding a Storage Pool Disk Management Attaching an Existing Disk Detaching a Disk Deleting a Disk Expanding the Capacity of a Disk Managing an Encrypted Disk Managing a Shared Disk 02 Purchase ECS billing modes and configurations are available for you to
AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication. Token Authentication The validity period of a token is 24 hours.
Or, your services may be interrupted and data may never be restored as the encrypted disks become inaccessible. Relationships Between Encrypted Disks and Backups The encryption function can be used to encrypt system disks, data disks, and backups.
Disk Management Detaching a Disk Attaching an Existing Disk Deleting a Disk Expanding the Capacity of a Disk Managing Encrypted Disks Managing Shared Disks Managing Backups
Keys used by encrypted disks are provided by the Key Management Service (KMS) of Data Encryption Workshop (DEW), which is secure and convenient. Therefore, you do not need to establish and maintain the key management infrastructure.
Keys used by encrypted disks are provided by the Key Management Service (KMS) of Data Encryption Workshop (DEW), which is secure and convenient. Therefore, you do not need to establish and maintain the key management infrastructure.