检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
For details, see Encrypting Images. Notes and Constraints If you use a full-ECS image to create an ECS, the EVS disks associated with the full-ECS image do not support the function of creating disks from a data disk image.
Encrypting Images Image Management Service User Guide Set password later The password for logging in to the ECS is not configured during the ECS creation.
NOTE: If the metadata contains sensitive data, take appropriate measures to protect the sensitive data, for example, controlling access permissions and encrypting the data. A maximum of 10 key-value pairs can be injected.
Managing Encrypted EVS Disks Encrypting Images Creating a Key Pair Cloud Trace Service (CTS) Records ECS-related operations for later query, auditing, and backtracking.
For details, see Encrypting Images. If you use a full-ECS image to create an ECS, the EVS disks associated with the full-ECS image do not support the function of creating disks using a data disk image.
NOTE: If the metadata contains sensitive data, take appropriate measures to protect the sensitive data, for example, controlling access permissions and encrypting the data. A maximum of 10 key-value pairs can be injected.
Apply for a valid token or check the project ID in the URL. 400 Ecs.0025 EVS is not authorized to obtain KMS keys for encrypting EVS disks. EVS is not authorized to obtain KMS keys for encrypting EVS disks.
Table 1 Keys Name Description Function DEK An encryption key that is used for encrypting data. Encrypts specific data. Custom key An encryption key created using DEW for encrypting DEKs. A custom key can encrypt multiple DEKs. Supports CMK disabling and scheduled deletion.
After user 1 grants permissions, the system automatically creates key evs/default for encrypting EVS disks. When user 1 uses the encryption feature for the first time, the user must grant the KMS access permissions to EVS.
Notes If the metadata contains sensitive data, take appropriate measures to protect the sensitive data, for example, controlling access permissions and encrypting the data.
For example, a data security administrator can create IAM users and grant them the minimum permissions, such as creating encryption keys and encrypting sensitive data.
If the metadata contains sensitive data, take appropriate measures to protect the sensitive data, for example, controlling access permissions and encrypting the data.