检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Storing encrypted credentials in configuration files or environment variables and decrypting them when needed ensures security. For details, see Flink OpenSource SQL Jobs Using DEW to Manage Access Credentials.
For details about how to use the encryption mode, see Configuring an Encrypted Flume Data Collection Task. The configuration applies to scenarios where only the server is configured, for example, Spooldir Source+File Channel+HBase Sink.
The character string encrypted using SHA-256 must be lowercase letters. Add the header parameter X-HW-ID and set the parameter value to the credential key. public_key_enable Off On/Off Determine whether to enable public_key authentication. Default: disabled.
Load balancing at Layer 7 provides some advanced features such as encrypted transmission and cookie-based sticky sessions. Supported Supported HTTPS support HTTPS can be used as both the frontend and backend protocol.
To enable the encrypted equality query, set this parameter to 1. connection_info The value of connection_info is a JSON character string consisting of driver_name, driver_version, driver_path, and os_user.
To enable the encrypted equality query, set this parameter to 1. connection_info The value of connection_info is a JSON character string consisting of driver_name, driver_version, driver_path, and os_user.
SSL Encryption No Whether to enable SSL encrypted transmission. Data Source Driver Configuration Driver Name Yes com.mysql.jdbc.Driver: Select this driver name for RDS for MySQL or MySQL. Driver File Path Yes It specifies the OBS path where the driver file is located.
If the disk is not created from a data source, the disk is not encrypted by default. full_clone The creation method when the disk is created from a snapshot. 0: linked clone 1: full clone hw:passthrough If this parameter value is true, the disk device type is SCSI, which allows ECS
Restrictions: The value is encrypted by MD5 and then encoded by Base64, for example, 4XvB3tbNTN+tIEVa0/fGaQ==.
Objects created by the upload and copy operations have unique ETags after being encrypted using MD5. Restrictions: If an object is encrypted using server-side encryption, the ETag is not the MD5 value of the object. Value range: The value must contain 32 characters.
Restrictions: The value is encrypted by MD5 and then encoded by Base64, for example, 4XvB3tbNTN+tIEVa0/fGaQ==.
Objects created by the upload and copy operations have unique ETags after being encrypted using MD5. Restrictions: If an object is encrypted using server-side encryption, the ETag is not the MD5 value of the object. Value range: The value must contain 32 characters.
Data is encrypted with an SSL certificate for high-security transmission. SASL_PLAINTEXT: SASL is used for authentication. Data is transmitted in plaintext for better performance. direction No String Definition: Synchronization direction.
With HTTPS access enabled, communication will be encrypted when you access the cluster. NOTE: Compared with a non-security mode cluster that uses HTTP, a security-mode cluster that uses HTTPS has lower read performance.
With HTTPS access enabled, communication will be encrypted when you access the cluster. NOTE: Compared with a non-security mode cluster that uses HTTP, a security-mode cluster that uses HTTPS has lower read performance.
Enabling server-side encryption for a bucket ensures that any objects uploaded to the bucket are encrypted into ciphertext before being stored on the server, and then are decrypted into plaintext on the server before being downloaded.
Status code: 400 Table 31 Response body parameters Parameter Type Description error_code String Error code, which is returned upon failure. error_msg String Error description. error_detail String Error details. encoded_authorization_message String Encrypted detailed reason for rejection
The IP address, port, username, and password of the source database are encrypted and stored in the database and the synchronization instance, and will be cleared after the task is deleted.
Database Password The database username and password are encrypted and stored in the system and will be cleared after the task is deleted.
Enable KMS Encryption If you do not select this option, whether migrated data will be encrypted in the target bucket depends on the server-side encryption setting of the bucket.