检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
As data needs to be encrypted and decrypted, you may experience a slight decrease in performance when encrypted transmission is used. Configuring Encrypted Transmission and Mounting the File System (Linux) Install stunnel.
Creating an Encrypted Shared File System You can also encrypt a shared file system. You only need to add parameters related to encryption of a shared file system to the metadata of the request body.
As data needs to be encrypted and decrypted, you may experience a slight decrease in performance when encrypted transmission is used. Configuring Encrypted Transmission and Mounting the File System (Linux) Install stunnel.
SFS Turbo File Systems Managing SFS Turbo+OBS Storage Interworking Encrypted Transmission File System Permissions Management
Only PEM encrypted key files (old OpenSSH format) are supported. Encrypted keys in the new OpenSSH format can't be used. y) Yes type in my own password g) Generate random password n) No leave this optional password blank y/g/n> n When set forces the usage of the ssh-agent.
"vpc:*:*" Creating an encrypted SFS Turbo file system requires the KMS Administrator permissions.
You can create a file system that is encrypted or not, but you cannot change the encryption settings of an existing file system. For details about how to create an encrypted file system, see Create a File System.
Only PEM encrypted key files (old OpenSSH format) are supported. Encrypted keys in the new OpenSSH format can't be used. y) Yes type in my own password g) Generate random password n) No leave this optional password blank y/g/n> n When set forces the usage of the ssh-agent.
AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication. Token Authentication The validity period of a token is 24 hours.
Encrypted CIFS file systems do not support copychunk. CIFS file systems cannot be mounted to Linux servers. A file system can use either the NFS or CIFS protocol. It cannot use both protocols.
The AK and SK are used together to obtain an encrypted signature for a request. Format example: HCY8BGCN1YM5ZWYOK1MH SK: secret access key, which is used together with the AK to sign requests, identify a request sender, and prevent the request from being modified.
You can create an encrypted or non-encrypted file system, but you cannot change the encryption settings of an existing file system. For details about how to create an encrypted file system, see Create a File System.
You can create an encrypted or non-encrypted file system, but you cannot change the encryption settings of an existing file system.
Encrypted Encryption status of the file system. The value can be Yes or No. Enterprise Project Enterprise project to which the file system belongs Mount Point File system mount point. The format of an NFS file system is File system domain name:/Path or File system IP address:/.
Change History Released On Description 2025-06-27 This issue is the third official release, which incorporates the following change: Added section "Encrypted Transmission." 2023-03-07 This issue is the second official release, which incorporates the following change: Added section
You are advised to use the default key sfs/default to create an encrypted shared file system. For details, see section "File System Encryption" and "Encryption" in the Scalable File Service User Guide.
Table 5 Metadata Parameter Mandatory Type Description crypt_key_id No String The ID of a KMS professional key, which is used to create an encrypted file system. dedicated_flavor No String The VM flavor, which is used to create a dedicated file system. dedicated_storage_id No String
Management Permissions Management File System Management Capacity Expansion Quotas Encryption Backup Encrypted Transmission Monitoring Auditing