检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
In this case, the IAM user must have the necessary permissions to query and create VPCEP. Note that the VPCEP client created using this method operates separately from LakeFormation.
Technical Support Scope Supported services The GaussDB(DWS) console provides the following functions: Cluster creation, deletion, scaling, specification adjustment, upgrade, patching, and backup and restoration Cluster monitoring and alarm management IAM user agency management External
Click Add share to share the data source with other IAM users of the same tenant and set the sharing expiration time. To cancel the sharing, click Unshare in the Operation column of the row that contains the target IAM user.
To perform the change in a cluster as an IAM user, ensure that the IAM user has permissions for VPC, EVC, and BMS. Changing All Specifications Log in to the GaussDB(DWS) console. Choose Dedicated Clusters > Clusters. All clusters are displayed by default.
{Endpoint} indicates the IAM endpoint and can be obtained from Regions and Engpoints. For details about API authentication, see Authentication.
IAM users under an account do not have the permission to query or create agencies by default. Contact a user with that permission and complete the authorization on the current page.
In addition, an IAM user (similar to a sub-user) does not have the permission to access OBS data of the account to which it belongs. Handling Procedure The AK and SK in the statement for creating an OBS foreign table are incorrect.
a Cluster Using ODBC to Connect to a Cluster Using the Third-Party Database Adapter Psycopg2 (in Python) for GaussDB(DWS) Cluster Connection Using the Third-Party Database Adapter PyGreSQL (in Python) for GaussDB(DWS) Cluster Connection Configuring JDBC to Connect to a Cluster (IAM
IAM users under an account do not have the permission to query or create agencies by default. Contact a user with that permission and complete the authorization on the current page.
Endpoint indicates the IAM endpoint, which can be obtained from the Regions and Endpoints . For details about Project ID, see Obtaining Project ID. For details about interface authentication, see Authentication. The following is an example response.
To scale out a cluster as an IAM user, ensure that the IAM user has permissions for VPC, EVC, and BMS. Scaling Out a Cluster A cluster becomes read-only during scale-out. Exercise caution when performing this operation.
For example, JDBC and an application have classes with the same path and name. gsjdbc4.jar conflicts with the open-source postgresql.jar because they have the same class name. gsjdbc4.jar included other tools, such as fastjson, required for IAM features.
By default, the IAM users in those accounts cannot query or create agencies. When the users use the EIP, the system makes the binding function unavailable. Contact a user with the DWS Administrator permissions to authorize the agency on the current page.
IAM users under an account do not have the permission to query or create agencies by default. Contact a user with that permission and complete the authorization on the current page. For details, see Allowing GaussDB(DWS) to Manage Resources.
Operations Creating a Cluster Database Parameters Checking Cluster Status Resetting Passwords Connecting to a Cluster Using the gsql Client to Connect to a Cluster Using the Data Studio GUI Client to Connect to a Cluster Using the JDBC/ODBC Drivers to Connect to the Cluster Using IAM
If you access OBS with an agency, the SERVER provided on the console contains the access_key, secret_access_key, and security_token parameters, which are the temporary AK, temporary SK, and the SecurityToken value of the temporary security credential in IAM, respectively.
You have obtained the IAM endpoint and GaussDB(DWS) endpoint You have obtained the Project ID. For details, see Obtaining Project ID. Managing a Cluster The following values are examples (replace them based on the actual situation).
The IAM service provides fine-grained access control. On IAM, the administrator (that is, a user in the admin user group) can create a custom policy containing various required permissions.
The user can connect to the database only through external authentication, for example, IAM authentication, Kerberos authentication, or LDAP authentication. Only administrators can enable or disable a password. Common users cannot disable the password of an initial user.
Configure the vpc:quotas:list policy for the current account on the IAM page and try again. DWS.0132 Failed to connect to the RPC of the node. Check and restore the network of the node. Try again after the node network recovers.