检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Figure 2 Entering the kernel editing mode The grub file is encrypted by Euler images by default. Before entering the edit mode, you need to contact customer service to obtain username and password. Locate the row containing linux16 and delete the parameters you do not require.
Figure 2 Entering the kernel editing mode The grub file is encrypted by Euler images by default. Before entering the edit mode, you need to contact customer service to obtain username and password. Locate the row containing linux16 and delete the parameters you do not require.
Figure 2 Entering the kernel editing mode The grub file is encrypted by Euler images by default. Before entering the edit mode, you need to contact customer service to obtain username and password. Locate the row containing linux16 and delete the parameters you do not require.
Figure 2 Entering the kernel editing mode The grub file is encrypted by Euler images by default. Before entering the edit mode, you need to contact customer service to obtain username and password. Locate the row containing linux16 and delete the parameters you do not require.
Constraints N/A Range 0: indicates a non-encrypted disk. 1: indicates an encrypted disk. Default Value If this parameter does not exist, the system disk will not be encrypted by default.
The client alive messages are sent through the encrypted channel and will not be spoofable. The TCP keepalive option enabled by TCPKeepAlive is spoofable.
The value for some OSs is 0, indicating that password login is enabled. passwd: indicates the encrypted password. disable_root: whether to disable user root. You are advised to set this parameter to true. Procedure Log in to the ECS console and access the ECS list page.
Constraints N/A Range 0: indicates a non-encrypted disk. 1: indicates an encrypted disk. Default Value If this parameter does not exist, the system disk will not be encrypted by default.
You can use an encrypted image or EVS disks when creating an ECS. In such a case, you need to use the key provided by DEW to improve data security.
If the image from which an ECS is created is not encrypted, the system disk of the ECS is not encrypted. If the image from which an ECS is created is encrypted, the system disk of the ECS is automatically encrypted. For details, see (Optional) Encryption-related parameters.
You can also select an encrypted image. For more information about encrypted images, see Image Management Service User Guide.
KMS Key Name: specifies the name of the key used by the encrypted EVS disk. You can select an existing key, or click Create KMS Key and create a new one on the KMS console. The default value is evs/default. KMS Key ID: specifies the ID of the key used by the encrypted data disk.
KMS Key Name: specifies the name of the key used by the encrypted EVS disk. You can select an existing key, or click Create KMS Key and create a new one on the KMS console. The default value is evs/default. KMS Key ID: specifies the ID of the key used by the encrypted data disk.
When creating an ECS, if you select an encrypted image, the system disk of the created ECS is automatically encrypted, improving data security. Use either of the following methods to create an encrypted image: Use an external image file. Use an existing encrypted ECS.
KMS Key Name: specifies the name of the key used by the encrypted EVS disk. You can select an existing key, or click Create KMS Key and create a new one on the KMS console. The default value is evs/default. KMS Key ID: specifies the ID of the key used by the encrypted data disk.
encrypted transmission in distributed clouds.
Only an encrypted private image can be created from an encrypted ECS. Name Set a name for the image. Enterprise Project Select an enterprise project from the drop-down list.
For a VPC with encryption enabled, the traffic between compute resources and gateways within the VPC is transmitted using encrypted packets. This ensures that all customer traffic is encrypted and cannot be cracked or listened to by cloud providers.
When creating an ECS, if you select an encrypted image, the system disk of the created ECS is automatically encrypted, improving data security. Use either of the following methods to create an encrypted image: Use an external image file. Use an existing encrypted ECS.
The data security administrator uses the command line tool obsutil to upload the encrypted ciphertext to an OBS bucket. For details, see Uploading an Object.