New function expressions now support string operations—substring, repeat, replace, join, concat—and time operations including datetimeFormat and equal.
Access Control with Both VPC Endpoint Policies and OBS Bucket Policies
You can configure both a VPC endpoint policy and a bucket policy to enable VPC-level access control over OBS resources.
A VPC endpoint policy defines which servers (ECSs, CCE, or BMSs) in a VPC can access specific resources in OBS, while a bucket policy specifies which OBS buckets can be accessed by servers in a given VPC. This ensures security by working on both the request sources and the requested resources.
Migration drills help you fully assess the feasibility and identify potential risks of a migration task beforehand. The system verifies if security group ports are set correctly, domains connect normally, and necessary permissions are available. If issues are identified, the system offer fixes to minimize risks and disruptions during migration.
TaurusDB supports the read-only (AP) proxy mode. All read requests are forwarded to the selected read replicas and HTAP nodes based on the read weights.
You can enable this function and set a bandwidth threshold. When the bandwidth of client requests reaches the threshold, CDN alerts you, helping you identify attacks promptly and prevent excess billing caused by bandwidth theft or attacks.
A cluster environment security scan checks the resources on the Kubernetes cluster management plane and data plane; identifies infrastructure as code (IaC) risks, vulnerabilities, unsafe settings, configuration compliance, sensitive information, and permissions management issues; and provides solutions, helping you build a comprehensive cluster security system.
System vulnerability scan: Check for the vulnerabilities at the OS layer of the core components in the control plane, data plane, and image repositories of Kubernetes clusters.
Application vulnerability scan: Check for the application vulnerabilities in the core components of the Kubernetes cluster control plane, data plane, and image repositories.
Emergency vulnerability scan: Check for the high-risk security vulnerabilities, such as 0-day vulnerabilities, in containers, container runtime components, and dependency packages.
Unsafe configuration scan: Check for the Kubernetes cluster settings, workloads, network policies, and role-based access control (RBAC) permissions to ensure cluster deployment complies with best security practices.
Security and compliance scan: Check the security and compliance of Kubernetes cluster settings, workloads, network policies, and RBAC permissions to ensure cluster deployment complies with industry standards and regulations.
IaC risk scan: Check for resource conflicts, configuration errors, and information leakage in IaC. Dockerfile and Kubernetes YAML files can be checked.
{"Compute":["Elastic Cloud Server","Huawei Cloud Flexus","Bare Metal Server","Auto Scaling","Image Management Service","Dedicated Host","FunctionGraph","Cloud Phone Host","Huawei Cloud EulerOS"],"Storage":["Object Storage Service","Elastic Volume Service","Cloud Backup and Recovery","Storage Disaster Recovery Service","Scalable File Service Turbo","Scalable File Service","Volume Backup Service","Cloud Server Backup Service","Data Express Service","Dedicated Distributed Storage Service"],"Networking":["Virtual Private Cloud","Elastic IP","Elastic Load Balance","NAT Gateway","Direct Connect","Virtual Private Network","VPC Endpoint","Cloud Connect","Enterprise Router","Enterprise Switch","Global Accelerator"],"Containers":["Cloud Container Engine","SoftWare Repository for Container","Application Service Mesh","Ubiquitous Cloud Native Service","Cloud Container Instance (CCI)"],"Management & Governance":["Cloud Eye","Identity and Access Management","Cloud Trace Service","Resource Formation Service","Tag Management Service","Log Tank Service","Config","OneAccess","Resource Access Manager","Simple Message Notification","Application Performance Management","Application Operations Management","Organizations","Optimization Advisor","IAM Identity Center","Cloud Operations Center","Resource Governance Center"],"Databases":["Relational Database Service","Document Database Service","Data Admin Service","Data Replication Service","GeminiDB","GaussDB","Distributed Database Middleware","Database and Application Migration UGO","TaurusDB"],"Migration":["Server Migration Service","Object Storage Migration Service","Cloud Data Migration","Migration Center"],"Middleware":["Distributed Cache Service","API Gateway","Distributed Message Service for Kafka","Distributed Message Service for RabbitMQ","Distributed Message Service for RocketMQ","Cloud Service Engine","Multi-Site High Availability Service","EventGrid"],"Cloud Ecosystem":["KooGallery","Partner Center"],"Dedicated Cloud":["Dedicated Computing Cluster"],"User Support":["My Account","Billing Center","Cost Center","Resource Center","Enterprise Management","Service Tickets","HUAWEI CLOUD (International) FAQs"," ICP Filing","Support Plans","My Credentials","Customer Operation Capabilities","Partner Support Plans","Professional Services"],"Business Applications":["Workspace","ROMA Connect","Message & SMS","Domain Name Service","Edge Data Center Management","Meeting"],"Analytics":["MapReduce Service","Data Lake Insight","CloudTable Service","Cloud Search Service","Data Lake Visualization","Data Ingestion Service","GaussDB(DWS)","DataArts Studio","Data Lake Factory","DataArts Lake Formation","DataArts Fabric"],"AI":["Face Recognition Service","Graph Engine Service","Content Moderation","Image Recognition","Optical Character Recognition","ModelArts","ImageSearch","Conversational Bot Service","Speech Interaction Service","Huawei HiLens","Video Intelligent Analysis Service"],"IoT":["IoT Device Access"],"Cloud Transformation":["Well-Architected Framework","Cloud Adoption Framework "],"Developer Tools":["SDK Developer Guide","API Request Signing Guide","Terraform","Koo Command Line Interface"],"Others":["Product Pricing Details","System Permissions","Console Quick Start","Common FAQs","Instructions for Associating with a HUAWEI CLOUD Partner","Message Center"],"Content Delivery & Edge Computing":["Content Delivery Network","Intelligent EdgeFabric","CloudPond","Intelligent EdgeCloud"],"Security & Compliance":["Security Technologies and Applications","Web Application Firewall","Host Security Service","Cloud Firewall","SecMaster","Anti-DDoS Service","Data Encryption Workshop","Database Security Service","Cloud Bastion Host","Data Security Center","Cloud Certificate Manager","Edge Security"],"Solutions":["SAP Cloud","High Performance Computing"],"Blockchain":["Blockchain Service","Web3 Node Engine Service"],"Media Services":["Media Processing Center","Video On Demand","Live","SparkRTC","MetaStudio"],"MacroVerse aPaaS":["KooMessage","KooPhone","KooDrive"],"Developer Services":["ServiceStage","CodeArts","CodeArts PerfTest","CodeArts Req","CodeArts Pipeline","CodeArts Build","CodeArts Deploy","CodeArts Artifact","CodeArts TestPlan","CodeArts Check","CodeArts Repo","Cloud Application Engine","Huawei Cloud Astro Canvas","Huawei Cloud Astro Zero","CodeArts Governance"]}
["Elastic Cloud Server","Huawei Cloud Flexus","Bare Metal Server","Auto Scaling","Image Management Service","Dedicated Host","FunctionGraph","Cloud Phone Host","Huawei Cloud EulerOS","Object Storage Service","Elastic Volume Service","Cloud Backup and Recovery","Storage Disaster Recovery Service","Scalable File Service Turbo","Scalable File Service","Volume Backup Service","Cloud Server Backup Service","Data Express Service","Dedicated Distributed Storage Service","Virtual Private Cloud","Elastic IP","Elastic Load Balance","NAT Gateway","Direct Connect","Virtual Private Network","VPC Endpoint","Cloud Connect","Enterprise Router","Enterprise Switch","Global Accelerator","Cloud Container Engine","SoftWare Repository for Container","Application Service Mesh","Ubiquitous Cloud Native Service","Cloud Container Instance (CCI)","Cloud Eye","Identity and Access Management","Cloud Trace Service","Resource Formation Service","Tag Management Service","Log Tank Service","Config","OneAccess","Resource Access Manager","Simple Message Notification","Application Performance Management","Application Operations Management","Organizations","Optimization Advisor","IAM Identity Center","Cloud Operations Center","Resource Governance Center","Relational Database Service","Document Database Service","Data Admin Service","Data Replication Service","GeminiDB","GaussDB","Distributed Database Middleware","Database and Application Migration UGO","TaurusDB","Server Migration Service","Object Storage Migration Service","Cloud Data Migration","Migration Center","Distributed Cache Service","API Gateway","Distributed Message Service for Kafka","Distributed Message Service for RabbitMQ","Distributed Message Service for RocketMQ","Cloud Service Engine","Multi-Site High Availability Service","EventGrid","KooGallery","Partner Center","Dedicated Computing Cluster","My Account","Billing Center","Cost Center","Resource Center","Enterprise Management","Service Tickets","HUAWEI CLOUD (International) FAQs"," ICP Filing","Support Plans","My Credentials","Customer Operation Capabilities","Partner Support Plans","Professional Services","Workspace","ROMA Connect","Message & SMS","Domain Name Service","Edge Data Center Management","Meeting","MapReduce Service","Data Lake Insight","CloudTable Service","Cloud Search Service","Data Lake Visualization","Data Ingestion Service","GaussDB(DWS)","DataArts Studio","Data Lake Factory","DataArts Lake Formation","DataArts Fabric","Face Recognition Service","Graph Engine Service","Content Moderation","Image Recognition","Optical Character Recognition","ModelArts","ImageSearch","Conversational Bot Service","Speech Interaction Service","Huawei HiLens","Video Intelligent Analysis Service","IoT Device Access","Well-Architected Framework","Cloud Adoption Framework ","SDK Developer Guide","API Request Signing Guide","Terraform","Koo Command Line Interface","Product Pricing Details","System Permissions","Console Quick Start","Common FAQs","Instructions for Associating with a HUAWEI CLOUD Partner","Message Center","Content Delivery Network","Intelligent EdgeFabric","CloudPond","Intelligent EdgeCloud","Security Technologies and Applications","Web Application Firewall","Host Security Service","Cloud Firewall","SecMaster","Anti-DDoS Service","Data Encryption Workshop","Database Security Service","Cloud Bastion Host","Data Security Center","Cloud Certificate Manager","Edge Security","SAP Cloud","High Performance Computing","Blockchain Service","Web3 Node Engine Service","Media Processing Center","Video On Demand","Live","SparkRTC","MetaStudio","KooMessage","KooPhone","KooDrive","ServiceStage","CodeArts","CodeArts PerfTest","CodeArts Req","CodeArts Pipeline","CodeArts Build","CodeArts Deploy","CodeArts Artifact","CodeArts TestPlan","CodeArts Check","CodeArts Repo","Cloud Application Engine","Huawei Cloud Astro Canvas","Huawei Cloud Astro Zero","CodeArts Governance"]
3625
www.huaweicloud.com/intl/en-us/productfeature
[{"product":"ROMA Connect","stage":"","functionName":"New functions supported","onlineTime":"June,2025","description":"<p id=\"EN-US_TOPIC_0217213179__p6212459171815\" data-hd-class=\"- topic/p \" data-hd-id=\"p6212459171815\" data-copy-enter=\"true\" data-copy=\"true\" data-topicnum=\"en-us_topic_0217213179\" data-lang=\"en-us\" data-multidtd=\"true\" data-dtdtype=\"topic\" data-projectid=\"1082090225\">New function expressions now support string operations—substring, repeat, replace, join, concat—and time operations including datetimeFormat and equal.</p>","documentLink":"https://support.huaweicloud.com/intl/en-us/usermanual-roma3/roma_03_5118.html,","detailsLink":"https://www.huaweicloud.com/intl/en-us/product/roma.html","id":"d55e2f47-232b-3a22-bfee-0c34447736b0","documentName":"Referencing Functions,","content":{"updatedAt":1751891585000},"btnLink":"https://support.huaweicloud.com/intl/en-us/usermanual-roma3/roma_03_5118.html"},{"product":"ROMA Connect","stage":"","functionName":"Sender alias for SMTP Mail","onlineTime":"June,2025","description":"<p id=\"EN-US_TOPIC_0217213179__p33381425201518\" data-hd-class=\"- topic/p \" data-hd-id=\"p33381425201518\" data-copy-enter=\"true\" data-copy=\"true\" data-topicnum=\"en-us_topic_0217213179\" data-lang=\"en-us\" data-multidtd=\"true\" data-dtdtype=\"topic\" data-projectid=\"1082090225\">The sender alias can be set for SMTP mails.</p>","documentLink":"https://support.huaweicloud.com/intl/en-us/usermanual-roma3/roma_03_5007.html,","detailsLink":"https://www.huaweicloud.com/intl/en-us/product/roma.html","id":"31f69d2d-bf46-3d65-bc8c-46c5439b5986","documentName":"Connectors,","content":{"updatedAt":1751891580000},"btnLink":"https://support.huaweicloud.com/intl/en-us/usermanual-roma3/roma_03_5007.html"},{"product":"Object Storage Service","stage":"","functionName":"Access Control with Both VPC Endpoint Policies and OBS Bucket Policies","onlineTime":"June,2025","description":"<p class=\"MsoNormal\" align=\"left\"><span lang=\"EN-US\" >You can configure both a VPC endpoint policy and a bucket policy to enable VPC-level access control over OBS resources.</span></p>\n<p><span lang=\"EN-US\" >A VPC endpoint policy defines which servers (ECSs, CCE, or BMSs) in a VPC can access specific resources in OBS, while a bucket policy specifies which OBS buckets can be accessed by servers in a given VPC. This ensures security by working on both the request sources and the requested resources.</span></p>","documentLink":"https://support.huaweicloud.com/intl/en-us/usermanual-obs/obs_03_0602.html,","detailsLink":"https://www.huaweicloud.com/intl/en-us/product/obs.html","id":"926bd715-94fc-3e4b-af5c-e9cbc0290ee8","documentName":"Access Control with Both VPC Endpoint Policies and OBS Bucket Policies,","content":{"updatedAt":1751372431000},"btnLink":"https://support.huaweicloud.com/intl/en-us/usermanual-obs/obs_03_0602.html"},{"product":"Server Migration Service","stage":"","functionName":"Migration Drill","onlineTime":"June,2025","description":"<p>Migration drills help you fully assess the feasibility and identify potential risks of a migration task beforehand. The system verifies if security group ports are set correctly, domains connect normally, and necessary permissions are available. If issues are identified, the system offer fixes to minimize risks and disruptions during migration.</p>","documentLink":"https://support.huaweicloud.com/intl/en-us/qs-sms/sms3_02_0009.html,","detailsLink":"https://www.huaweicloud.com/intl/en-us/product/sms.html","id":"75914dd0-fd7f-354e-ac42-e8488a8211e6","documentName":"Configuring the Target Server,","content":{"updatedAt":1751338098000},"btnLink":"https://support.huaweicloud.com/intl/en-us/qs-sms/sms3_02_0009.html"},{"product":"Data Lake Insight","stage":"","functionName":"Introduction to data catalogs in Data Lake Insight User Guide","onlineTime":"June,2025","description":"<p id=\"EN-US_TOPIC_0287340785__p1118284311447\" data-hd-class=\"- topic/p \" data-hd-id=\"p1118284311447\" data-copy=\"true\" data-topicnum=\"en-us_topic_0287340785\" data-lang=\"en-us\" data-multidtd=\"true\" data-dtdtype=\"topic\" data-projectid=\"2331572288\">Included details about data catalogs and added steps for creating them in <em id=\"EN-US_TOPIC_0287340785__i2061093921818\" data-hd-class=\"+ topic/ph hi-d/i \" data-hd-id=\"i2061093921818\">Data Lake Insight User Guide</em>.</p>","documentLink":"https://support.huaweicloud.com/intl/en-us/usermanual-dli/dli_01_0228.html,","detailsLink":"https://www.huaweicloud.com/intl/en-us/product/dli.html","id":"e4670805-f669-3e5d-98f0-8a635f048525","documentName":"Understanding Data Catalogs, Databases, and Tables,","content":{"updatedAt":1751092638000},"btnLink":"https://support.huaweicloud.com/intl/en-us/usermanual-dli/dli_01_0228.html"},{"product":"TaurusDB","stage":"OBT","functionName":"Read-only (AP) proxy mode","onlineTime":"June,2025","description":"<p id=\"EN-US_TOPIC_0000002277584100__p115494251324\" data-hd-class=\"- topic/p \" data-hd-id=\"p115494251324\" data-copy-enter=\"true\" data-copy=\"true\" data-topicnum=\"en-us_topic_0000002277584100\" data-lang=\"en-us\" data-multidtd=\"true\" data-dtdtype=\"topic\" data-projectid=\"205872849953\"><span id=\"EN-US_TOPIC_0000002277584100__text139471533155119\" data-hd-class=\"- topic/text \" data-hd-id=\"text139471533155119\" data-hd-conref=\"x-wc://file=en-us_commonterms_0000001928524213.xml#id_9cd283fd-d6dd-135e-7ab8-299681ecd9fb\" data-refreshed=\"true\" data-commonterms=\"true\" data-textsourceprojectid=\"205872849953\" data-textsourcemap=\"EN-US_BOOKMAP_0000002312183777\" data-textiszh=\"en-us\" data-textisproject=\"true\">TaurusDB</span> supports the read-only (AP) proxy mode. All read requests are forwarded to the selected read replicas and HTAP nodes based on the read weights.</p>","documentLink":"https://support.huaweicloud.com/intl/en-us/usermanual-taurusdb/taurusdb_11_0016.html,","detailsLink":"https://www.huaweicloud.com/intl/en-us/product/taurusdb.html","id":"a727395a-3897-3186-8459-7e8172d0bed4","documentName":"What Is Database Proxy?,","content":{"updatedAt":1750929175000},"btnLink":"https://support.huaweicloud.com/intl/en-us/usermanual-taurusdb/taurusdb_11_0016.html"},{"product":"Content Delivery Network","stage":"","functionName":"Burst Bandwidth Alert","onlineTime":"June,2025","description":"<p>You can enable this function and set a bandwidth threshold. When the bandwidth of client requests reaches the threshold, CDN alerts you, helping you identify attacks promptly and prevent excess billing caused by bandwidth theft or attacks.</p>","documentLink":"https://support.huaweicloud.com/intl/en-us/usermanual-cdn/cdn_01_0324.html,","detailsLink":"https://www.huaweicloud.com/intl/en-us/product/cdn.html","id":"513ad3ec-5359-391a-b012-20c2afaf1152","documentName":"Burst Bandwidth Alert,","content":{"updatedAt":1750920265000},"btnLink":"https://support.huaweicloud.com/intl/en-us/usermanual-cdn/cdn_01_0324.html"},{"product":"Data Encryption Workshop","stage":"","functionName":"Secret quota expansion","onlineTime":"June,2025","description":"<p id=\"EN-US_TOPIC_0291822505__p198039312188\" data-hd-class=\"- topic/p \" data-hd-id=\"p198039312188\" data-copy-enter=\"true\" data-copy=\"true\" data-topicnum=\"en-us_topic_0291822505\" data-lang=\"en-us\" data-multidtd=\"true\" data-dtdtype=\"topic\" data-projectid=\"33064637464\">Increased the secret quota from 200 to 500.</p>","documentLink":"https://support.huaweicloud.com/intl/en-us/usermanual-dew/dew_01_9993.html,","detailsLink":"https://www.huaweicloud.com/intl/en-us/product/dew.html","id":"768e9a53-36e0-321c-a2e1-bf347f42330f","documentName":"Creating a Secret,","content":{"updatedAt":1750751777000},"btnLink":"https://support.huaweicloud.com/intl/en-us/usermanual-dew/dew_01_9993.html"},{"product":"Host Security Service","stage":"","functionName":"Added cluster environment security scans","onlineTime":"June,2025","description":"<p id=\"EN-US_TOPIC_0000001390767686__p49410362411\" data-hd-class=\"- topic/p \" data-hd-id=\"p49410362411\" data-copy-enter=\"true\" data-copy=\"true\" data-topicnum=\"en-us_topic_0000001390767686\" data-lang=\"en-us\" data-multidtd=\"true\" data-dtdtype=\"topic\" data-projectid=\"33064637464\">A cluster environment security scan checks the resources on the Kubernetes cluster management plane and data plane; identifies infrastructure as code (IaC) risks, vulnerabilities, unsafe settings, configuration compliance, sensitive information, and permissions management issues; and provides solutions, helping you build a comprehensive cluster security system.</p>\n<ul id=\"EN-US_TOPIC_0000001390767686__ul986617146388\" data-hd-class=\"- topic/ul \" data-hd-id=\"ul986617146388\">\n<li id=\"EN-US_TOPIC_0000001390767686__li986619145387\" data-hd-class=\"- topic/li \" data-hd-id=\"li986619145387\">\n<p id=\"EN-US_TOPIC_0000001390767686__li986619145387p0\" data-assist-p=\"true\" data-hd-class=\"- topic/p \" data-hd-id=\"li986619145387p0\" data-copy-enter=\"true\">System vulnerability scan: Check for the vulnerabilities at the OS layer of the core components in the control plane, data plane, and image repositories of Kubernetes clusters.</p>\n</li>\n<li id=\"EN-US_TOPIC_0000001390767686__li78661514113816\" data-hd-class=\"- topic/li \" data-hd-id=\"li78661514113816\">\n<p id=\"EN-US_TOPIC_0000001390767686__li78661514113816p0\" data-assist-p=\"true\" data-hd-class=\"- topic/p \" data-hd-id=\"li78661514113816p0\" data-copy-enter=\"true\">Application vulnerability scan: Check for the application vulnerabilities in the core components of the Kubernetes cluster control plane, data plane, and image repositories.</p>\n</li>\n<li id=\"EN-US_TOPIC_0000001390767686__li178662014123818\" data-hd-class=\"- topic/li \" data-hd-id=\"li178662014123818\">\n<p id=\"EN-US_TOPIC_0000001390767686__li178662014123818p0\" data-assist-p=\"true\" data-hd-class=\"- topic/p \" data-hd-id=\"li178662014123818p0\" data-copy-enter=\"true\">Emergency vulnerability scan: Check for the high-risk security vulnerabilities, such as 0-day vulnerabilities, in containers, container runtime components, and dependency packages.</p>\n</li>\n<li id=\"EN-US_TOPIC_0000001390767686__li686691411383\" data-hd-class=\"- topic/li \" data-hd-id=\"li686691411383\">\n<p id=\"EN-US_TOPIC_0000001390767686__li686691411383p0\" data-assist-p=\"true\" data-hd-class=\"- topic/p \" data-hd-id=\"li686691411383p0\" data-copy-enter=\"true\">Unsafe configuration scan: Check for the Kubernetes cluster settings, workloads, network policies, and role-based access control (RBAC) permissions to ensure cluster deployment complies with best security practices.</p>\n</li>\n<li id=\"EN-US_TOPIC_0000001390767686__li48669149388\" data-hd-class=\"- topic/li \" data-hd-id=\"li48669149388\">\n<p id=\"EN-US_TOPIC_0000001390767686__li48669149388p0\" data-assist-p=\"true\" data-hd-class=\"- topic/p \" data-hd-id=\"li48669149388p0\" data-copy-enter=\"true\">Security and compliance scan: Check the security and compliance of Kubernetes cluster settings, workloads, network policies, and RBAC permissions to ensure cluster deployment complies with industry standards and regulations.</p>\n</li>\n<li id=\"EN-US_TOPIC_0000001390767686__li2866214183816\" data-hd-class=\"- topic/li \" data-hd-id=\"li2866214183816\">\n<p id=\"EN-US_TOPIC_0000001390767686__li2866214183816p0\" data-assist-p=\"true\" data-hd-class=\"- topic/p \" data-hd-id=\"li2866214183816p0\" data-copy-enter=\"true\">IaC risk scan: Check for resource conflicts, configuration errors, and information leakage in IaC. Dockerfile and Kubernetes YAML files can be checked.</p>\n</li>\n</ul>\n<p id=\"EN-US_TOPIC_0000001390767686__p8378413203917\" data-hd-class=\"- topic/p \" data-hd-id=\"p8378413203917\" data-copy-enter=\"true\"><strong id=\"EN-US_TOPIC_0000001390767686__b358643215019\" data-hd-class=\"+ topic/ph hi-d/b \" data-hd-id=\"b358643215019\">Editions</strong>: container edition</p>","documentLink":"https://support.huaweicloud.com/intl/en-us/usermanual-hss2.0/hss_01_0747.html,","detailsLink":"https://www.huaweicloud.com/intl/en-us/product/hss.html","id":"bfc5bdfb-a5db-318e-84e7-67d8b37662b2","documentName":"Cluster Environment Security,","content":{"updatedAt":1752110380000},"btnLink":"https://support.huaweicloud.com/intl/en-us/usermanual-hss2.0/hss_01_0747.html"},{"product":"Data Encryption Workshop","stage":"","functionName":"Setting the maximum size of a secret to 64 KB","onlineTime":"June,2025","description":"<p id=\"EN-US_TOPIC_0291822505__p38036314181\" data-hd-class=\"- topic/p \" data-hd-id=\"p38036314181\" data-copy-enter=\"true\" data-copy=\"true\" data-topicnum=\"en-us_topic_0291822505\" data-lang=\"en-us\" data-multidtd=\"true\" data-dtdtype=\"topic\" data-projectid=\"33064637464\">The secret created on CSMS cannot exceed 64 KB.</p>","documentLink":"https://support.huaweicloud.com/intl/en-us/usermanual-dew/dew_01_9993.html,","detailsLink":"https://www.huaweicloud.com/intl/en-us/product/dew.html","id":"872edf7d-264c-3729-b623-dae63f0f9a31","documentName":"Creating a Secret,","content":{"updatedAt":1750751820000},"btnLink":"https://support.huaweicloud.com/intl/en-us/usermanual-dew/dew_01_9993.html"}]