检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Objects are encrypted using SSE-KMS on the server side. Value range: kms. For details, see Table 8. Default value: None sseAlgorithm SSEAlgorithmEnum No Explanation: Encryption algorithm. Restrictions: Only KMS is supported. Value range: See Table 9.
If an object is encrypted with SSE-KMS, the ACL configured for it is not in effect in the cross-tenant case. For more information, see ACLs. If you have any questions during development, post them on the Issues page of GitHub.
The value can be used to reference the encrypted content in a pod.
Restrictions: If an object is encrypted using server-side encryption, the ETag is not the MD5 value of the object.
Restrictions: If an object is encrypted using server-side encryption, the ETag is not the MD5 value of the object. Value range: The value must contain 32 characters.
After this function is disabled, the CM does not use encrypted communication and all information is transmitted in plaintext, which may bring security risks such as eavesdropping, tampering, and spoofing. ssl_cert_expire_alert_threshold Parameter description: Specifies the SSL certificate
The new password will be encrypted using the hash algorithm and stored for authentication in the next connection. You have obtained the public network address, including the IP address and port number in the data warehouse cluster.
As a result, the RTO and RPO of HA will be decreased. hadr_super_user_record_path Parameter description: Specifies the path for storing encrypted files of the hadr_disaster user in the standby database instance in streaming DR mode.
Minimum length: 0 characters Maximum length: 255 characters encoded_authorization_message String The encrypted authorization information. Minimum length: 0 characters Maximum length: 65,535 characters error_param Array of strings Invalid parameters.
Storing encrypted credentials in configuration files or environment variables and decrypting them when needed ensures security. For details, see Flink OpenSource SQL Jobs Using DEW to Manage Access Credentials.
Key specifications and restrictions: The ILM tables, hash bucket tables, and encrypted tables can be parsed and restored. Data can be restored and imported to the target database on the web UI.
Files or programs encrypted by KMS are not supported. HDFS: The path starts with a slash (/). Spark Script must end with .sql while MapReduce and Spark Jar must end with .jar. sql and jar are case-insensitive.
Place the server certificate at the beginning and the other certificates in sequence if a certificate chain contains multiple certificates. 400 APIG.2105 Encrypted private keys are not supported. Encrypted private keys are not supported.
Restrictions: If an object is encrypted using server-side encryption, the ETag is not the MD5 value of the object. Value range: The value must contain 32 characters. Default value: None expiration const char * No Explanation: Expiration details of the object.
Restrictions: If an object is encrypted using server-side encryption, the ETag is not the MD5 value of the object. Value range: None Default value: None callback_data void * Yes Explanation: The pointer to the custom callback data.
If SSL is enabled, the value of this parameter is true. ssl_cert_name No String SSL certificate name. ssl_cert_key No String SSL certificate content, which is encrypted using Base64. ssl_cert_check_sum No String The checksum value of the SSL certificate, which is used for backend
ModelArts does not support encrypted OBS buckets. When creating an OBS bucket, do not enable bucket encryption. The account is not in arrears because resources are consumed when training jobs are running. The OBS directory you use and ModelArts are in the same region.
The username and password of the source database are encrypted and stored in DRS and will be cleared after the task is deleted.
The username and password of the source database are encrypted and stored in DRS and will be cleared after the task is deleted.
The username and password of the source database are encrypted and stored in DRS and will be cleared after the task is deleted.