检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
You cannot add a constraint name to the clause AUTO_INCREMENT | COMMENT 'string' | ENCRYPTED WITH ( COLUMN_ENCRYPTION_KEY = column_encryption_key, ENCRYPTION_TYPE = encryption_type_value ).
The IP address, domain name, username, and password of the source database are encrypted and stored in DRS, and will be cleared after the task is deleted.
The username and password of the source database are encrypted and stored in DRS and will be cleared after the task is deleted.
Compute columns and encrypted columns cannot be synchronized or migrated. Virtual private databases (VPDs) cannot be synchronized or migrated. Jobs created by dbms_scheduler and dbms_job cannot be synchronized or migrated. Schema name changes cannot be synchronized or migrated.
Restrictions: If an object is encrypted using server-side encryption, the ETag is not the MD5 value of the object. Value range: The value must contain 32 characters. Default value: None versionId String Explanation: Object version ID.
Restrictions: If an object is encrypted using server-side encryption, the ETag is not the MD5 value of the object. Value range: The value must contain 32 characters. Default value: None objectKey String Explanation: Object name.
Restrictions: If an object is encrypted using server-side encryption, the ETag is not the MD5 value of the object. Value range: The value must contain 32 characters. Default value: None objectKey String Explanation: Object name.
Restrictions: If an object is encrypted using server-side encryption, the ETag is not the MD5 value of the object. SseKms string Explanation: SSE-KMS is used for encrypting objects on the server side. SseKmsKey string Explanation: ID of the KMS master key when SSE-KMS is used.
Encrypting data in transit Medium css:::cluster N/A Cloud Trace Service (CTS) Policy Name Function Scenario Severity Resource Mandatory RGC-GR_CONFIG_CTS_KMS_ENCRYPTED_CHECK Checks whether a CTS tracker is encrypted using KMS.
When HFile and WAL are encrypted using an encryption algorithm and a table is created, do not disable encryption or switch the encryption algorithm. If an encryption table (ENCRYPTION=>AES/SMS4) is not created, you can only switch the encryption algorithm.
Constraints: None Options: N/A Default value: N/A metadataCmkid String Details: CMK ID of an encrypted disk. The value is a string of 36 bytes. If this parameter is left blank, there is no restriction on the disk key ID.
Constraints: None Options: N/A Default value: N/A metadataCmkid String Details: CMK ID of an encrypted disk. The value is a string of 36 bytes. If this parameter is left blank, there is no restriction on the disk key ID.
Constraints: None Options: N/A Default value: N/A metadataCmkid String Details: CMK ID of an encrypted disk. The value is a string of 36 bytes. If this parameter is left blank, there is no restriction on the disk key ID.
Constraints: None Options: N/A Default value: N/A metadataCmkid String Details: CMK ID of an encrypted disk. The value is a string of 36 bytes. If this parameter is left blank, there is no restriction on the disk key ID.
Server-Side Encryption If the object uploaded to the server is encrypted on the server using the encryption key provided by the client, downloading the object requires including the encryption key in the message.
This parameter is mandatory for secure connection to the source database. ssl_cert_key String SSL certificate content, which is encrypted using Base64. ssl_cert_name String SSL certificate name. ssl_link Boolean Whether SSL is enabled. topic String Kafka topic name. cluster_mode String
The username and password of the source database are encrypted and stored in DRS and will be cleared after the task is deleted.
The username and password of the source database are encrypted and stored in DRS and will be cleared after the task is deleted.
The username and password of the source and destination databases are encrypted and stored in the databases and the synchronization instance during the synchronization. After the task is deleted, the username and password are permanently deleted.
The username and password of the source and destination databases are encrypted and stored in the databases and the synchronization instance during the synchronization. After the task is deleted, the username and password are permanently deleted.