检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
If a versioned object is encrypted with SSE-KMS, the ACL configured for it is not in effect in the cross-tenant case. You can set an access control policy when uploading a versioned object or call an ACL API to modify or obtain the ACL of an existing object.
Objects created by the upload and copy operations are assigned unique ETags after being encrypted using MD5. Restrictions: If an object is encrypted using server-side encryption, the ETag is not the MD5 value of the object. Size number Explanation: Object size, in bytes.
EnterpriseProjectId g:ResourceTag/<tag-key> rds:instance:deleteNode Grants permission to delete a database node. write - - rds:instance:createDns Grants permission to create a private DNS server. write - - rds:instance:create Grants permission to create a DB instance. write - rds:Encrypted
If this parameter is specified, the SSL key is an encrypted file. Currently, the SSL key supports DES encryption and AES encryption. NOTE: The DES encryption algorithm has lower security and poses security risks.
The object cannot be decrypted due to incorrect encryption header carried when downloading the SSE-C encrypted object.
This parameter is mandatory for secure connection to the source database. ssl_cert_key No String SSL certificate content, which is encrypted using Base64. ssl_cert_name No String SSL certificate name. ssl_link No Boolean Whether SSL is enabled. topic No String Kafka topic name. cluster_mode
This parameter is mandatory for secure connection to the source database. ssl_cert_key No String SSL certificate content, which is encrypted using Base64. ssl_cert_name No String SSL certificate name. ssl_link No Boolean Whether SSL is enabled. topic No String Kafka topic name. cluster_mode
The string consisting of Nonce, Created, and Password is SHA256 encrypted and does not contain plus signs (+) or spaces. Password indicates the value of application secret.
After this function is disabled, the CM does not use encrypted communication and all information is transmitted in plaintext, which may bring security risks such as eavesdropping, tampering, and spoofing. ssl_cert_expire_alert_threshold Parameter description: Specifies the SSL certificate
You must input encrypted information for some configurations. For details on how to encrypt information, see Using the Encryption Tool of the Flume Client.
The username and password of the source and destination databases are encrypted and stored in the databases and the synchronization instance during the synchronization. After the task is deleted, the username and password are permanently deleted.
You must input encrypted information for some configurations. For details on how to encrypt information, see Using the Encryption Tool of the Flume Client.
The IP address, domain name, username, and password of the source database are encrypted and stored in DRS, and will be cleared after the task is deleted.
The MongoDB client can connect to an instance with an unencrypted connection or an encrypted connection (SSL). To improve data transmission security, connect to instances using SSL.
If the -l parameter is specified, an archive file containing a brief summary of the data is generated. gs_restore supports SSL encrypted communication. The method is the same as that of using gsql.
The SSL connection is encrypted and more secure. To improve data transmission security, connect to instances using SSL. Prerequisites For details about how to create and log in to an ECS, see Purchasing an ECS and Logging In to an ECS. Install the MongoDB client on the ECS.
For a cross-source static masking task using the DLI engine, the running parameters are stored in the encrypted user bucket named dls-dli-{projectId} that is automatically created.
Defines the data flow that enters the encrypted VPN connections between the local and customer subnets. You need to configure the source and destination CIDR blocks in each policy rule. By default, a maximum of five policy rules can be configured.
Encrypted EVS disks are not supported. If your account has enterprise projects enabled, you can only select the EVS disks in the enterprise project that the cluster belongs to, or in the default enterprise project. EVS disks that have been partitioned are not supported.
Server Certificate: When an HTTPS listener is created for a load balancer, bind a certificate to the load balancer to support encrypted authentication for HTTPS data transmission.