检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Figure 2 Entering the kernel editing mode The grub file is encrypted by Euler images by default. Before entering the edit mode, you need to contact customer service to obtain username and password. Locate the row containing linux16 and delete the parameters you do not require.
Figure 2 Entering the kernel editing mode The grub file is encrypted by Euler images by default. Before entering the edit mode, you need to contact customer service to obtain username and password. Locate the row containing linux16 and delete the parameters you do not require.
Figure 2 Entering the kernel editing mode The grub file is encrypted by Euler images by default. Before entering the edit mode, you need to contact customer service to obtain username and password. Locate the row containing linux16 and delete the parameters you do not require.
Figure 2 Entering the kernel editing mode The grub file is encrypted by Euler images by default. Before entering the edit mode, you need to contact customer service to obtain username and password. Locate the row containing linux16 and delete the parameters you do not require.
Run the following command: create role dbar login replication encrypted password 'xxxxx'; Run the following command to modify the /var/lib/pgsql/11/data/pg_hba.conf file and add the following content to the file: vim /var/lib/pgsql/11/data/pg_hba.conf host all 192.168.1.0/24 md5 #
Constraints N/A Range 0: indicates a non-encrypted disk. 1: indicates an encrypted disk. Default Value If this parameter does not exist, the system disk will not be encrypted by default.
The client alive messages are sent through the encrypted channel and will not be spoofable. The TCP keepalive option enabled by TCPKeepAlive is spoofable.
The value for some OSs is 0, indicating that password login is enabled. passwd: indicates the encrypted password. disable_root: whether to disable user root. You are advised to set this parameter to true. Procedure Log in to the Huawei Cloud console.
Constraints N/A Range 0: indicates a non-encrypted disk. 1: indicates an encrypted disk. Default Value If this parameter does not exist, the system disk will not be encrypted by default.
You can use an encrypted image or EVS disks when creating an ECS. In such a case, you need to use the key provided by DEW to improve data security.
If the image from which an ECS is created is not encrypted, the system disk of the ECS is not encrypted. If the image from which an ECS is created is encrypted, the system disk of the ECS is automatically encrypted. For details, see (Optional) Encryption-related parameters.
Table 9 block_device_mappings field description Parameter Type Description source_id String Specifies the data source type of the ECS volume. source_type String Specifies the source type of the volume device. encrypted Boolean Encrypted or not. cmk_id String Specifies the key ID.
KMS Key Name: specifies the name of the key used by the encrypted EVS disk. You can select an existing key, or click Create KMS Key and create a new one on the KMS console. The default value is evs/default. KMS Key ID: specifies the ID of the key used by the encrypted data disk.
When creating an ECS, if you select an encrypted image, the system disk of the created ECS is automatically encrypted, improving data security. Use either of the following methods to create an encrypted image: Use an external image file. Use an existing encrypted ECS.
encrypted transmission in distributed clouds.
AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication. Token Authentication The validity period of a token is 24 hours.
For a VPC with encryption enabled, the traffic between compute resources and gateways within the VPC is transmitted using encrypted packets. This ensures that all customer traffic is encrypted and cannot be cracked or listened to by cloud providers.
BitLocker volumes encrypted using QingTian TPM keys can only be used on the original instance. The QingTian TPM status of an ECS is not displayed in the ECS list. The QingTian TPM status is not included in image snapshots.
The data security administrator uses the command line tool obsutil to upload the encrypted ciphertext to a Huawei Cloud OBS bucket. For details, see Uploading an Object.
Table 8 block_device_mappings field description Parameter Mandatory Type Description source_id No String Specifies the VM volume data source type. source_type No String Specifies the source type of the volume device. encrypted No Boolean Encrypted or not. cmk_id No String Specifies