检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Can I Use an Encrypted Password to Log In to an RDS DB Instance? What Are the Differences Between Floating and Private IP Addresses of RDS DB Instances? What Can I Do If I Can't Find My RDS Resources?
Will Backups Be Encrypted After Disk Encryption Is Enabled for My RDS Instance? RDS for MySQL: If you enable disk encryption during instance creation, the disk encryption status and the key cannot be changed later. Disk encryption will not encrypt backup data stored in OBS.
Can I Use an Encrypted Password to Log In to an RDS DB Instance? No. When you log in to an RDS instance, use the password set on the console for authentication. Encrypted password authentication is not supported. Parent topic: Product Consulting
Figure 1 Setting a cross-region backup policy Encrypted backups cannot be stored across regions. The instance name is synchronized only when cross-region backups are synchronized for the first time. The instance ID is the unique identifier for the cross-region backups.
If server-side encryption is enabled, disk data will be encrypted and stored on the server when you create a DB instance or expand disk capacity. When downloading encrypted objects, the encrypted data will be decrypted on the server and displayed to you in plaintext.
If server-side encryption is enabled, disk data will be encrypted and stored on the server when you create a DB instance or expand disk capacity. When downloading encrypted objects, the encrypted data will be decrypted on the server and displayed to you in plaintext.
If server-side encryption is enabled, disk data will be encrypted and stored on the server when you create a DB instance or expand disk capacity. When downloading encrypted objects, the encrypted data will be decrypted on the server and displayed to you in plaintext.
If you scale down a DB instance with the disk encrypted, the new storage space will be encrypted using the original encryption key.
After TDE is enabled, backup files are encrypted, preventing data leakage caused by backup leakage. Connect to the target DB instance. Run the following commands to encrypt or decrypt a table.
Enabling TDE improves data security but affects read and write performance of encrypted databases. Exercise caution when enabling TDE. To migrate on-premises encrypted databases to RDS for SQL Server DB instances, you need to disable database-level TDE first.
If you scale up a DB instance with the disk encrypted, the expanded storage space will be encrypted using the original encryption key. Procedure Log in to the management console. Click in the upper left corner and select a region.
If you scale up a DB instance with the disk encrypted, the expanded storage space will be encrypted using the original encryption key. Scaling Up a Primary DB Instance Log in to the management console.
SSL encryption ensures that all communications between a client and server are encrypted, preventing data leakage and tampering and ensuring data integrity.
VPN uses an encrypted tunnel to connect VPCs in different regions and sends traffic over the Internet. It is inexpensive, easy to configure, and easy to use. However, the quality of VPN connections depends on the quality of your Internet connection.
Configuring an SSL Connection Secure Socket Layer (SSL) is an encryption-based Internet security protocol for establishing an encrypted link between a server and a client.
Context SSL is an encryption-based Internet security protocol for establishing an encrypted link between a server and a client. It provides authenticated Internet connections to ensure the privacy and integrity of online communications.
After TDE is enabled for an RDS for SQL Server instance, data files are encrypted and do not need to be encrypted again using disk encryption. TDE is recommended over disk encryption because disk encryption affects database and OS performance.
Configuring SSL and Encryption Algorithm SSL is recommended for TCP/IP connections because SSL ensures that all communications between clients and servers are encrypted, preventing data leakage and tampering and ensuring data integrity.
For encrypted DB instances, you need to configure the KMS Administrator permission in the project. Restoring tables to a specified point in time rds:instance:tableRestore N/A Configuring TDE permission rds:instance:tde Only used for RDS for SQL Server DB instances.
Encrypted backups cannot be used to restore data to existing instances. Instances with Transparent Data Encryption (TDE) enabled do not support cross-region restoration. The kernel version of the target instance cannot be earlier than that of the original instance.