检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Encrypt sensitive information before creating a secret and decrypt the information when using it. Using a Bound ServiceAccount Token to Access a Cluster The secret-based ServiceAccount token does not support expiration time or auto update.
Encrypt sensitive information before creating a secret and decrypt the information when using it. Using a Bound ServiceAccount Token to Access a Cluster The secret-based ServiceAccount token does not support expiration time or auto update.
Encrypt sensitive information before creating a secret and decrypt the information when using it. Using a Bound ServiceAccount Token to Access a Cluster The secret-based ServiceAccount token does not support expiration time or auto update.
Encrypt sensitive information before creating a secret and decrypt the information when using it. Using a Bound ServiceAccount Token to Access a Cluster The secret-based ServiceAccount token does not support expiration time or auto update.
Encryption Configure whether to encrypt underlying storage if the storage class is csi-nas. If you select Enabled (key), an encryption key must be configured. Click Create to create a PVC and a PV.
This API uses AES-GCM to replace AES-CBC and uses DEK to encrypt data at rest (Kubernetes Secrets). No additional operation is required during this process. Additionally, data can be read through AES-GCM and AES-CBC. For details, see Using a KMS provider for data encryption.
This API uses AES-GCM to replace AES-CBC and uses DEK to encrypt data at rest (Kubernetes Secrets). No additional operation is required during this process. Additionally, data can be read through AES-GCM and AES-CBC. For details, see Using a KMS provider for data encryption.
This API uses AES-GCM to replace AES-CBC and uses DEK to encrypt data at rest (Kubernetes Secrets). No additional operation is required during this process. Additionally, data can be read through AES-GCM and AES-CBC. For details, see Using a KMS provider for data encryption.
This API uses AES-GCM to replace AES-CBC and uses DEK to encrypt data at rest (Kubernetes Secrets). No additional operation is required during this process. Additionally, data can be read through AES-GCM and AES-CBC. For details, see Using a KMS provider for data encryption.
If you use YAML to create a secret, you need to manually encrypt its value using Base64. # echo -n "Content to be encoded" | base64 Check Item 8: Whether the Container Startup Command Is Correctly Configured The error messages are as follows: Solution Click the workload name to go
Encryption You can select Encryption and an encryption key to encrypt underlying storage. Only EVS disks and SFS file systems support encryption.
Encryption You can select Encryption and an encryption key to encrypt underlying storage. Before using the encryption function, check whether the region where the EVS disk is located supports disk encryption.
Encryption Configure whether to encrypt underlying storage. If you select Enabled (key), an encryption key must be configured. Before using encryption, check whether the region where the EVS disk is located supports disk encryption.
Encryption Configure whether to encrypt underlying storage. If you select Enabled (key), an encryption key must be configured.
Encryption Configure whether to encrypt underlying storage. If you select Enabled (key), an encryption key must be configured. Before using encryption, check whether the region where the EVS disk is located supports disk encryption.
Encryption Configure whether to encrypt underlying storage. If you select Enabled (key), an encryption key must be configured.
If you use YAML to create a secret, you need to manually encrypt its value using Base64. # echo -n "Content to be encoded" | base64 Check Item 8: Whether the Container Startup Command Is Correctly Configured The error messages are as follows: Solution Click the workload name to go
Encryption Configure whether to encrypt underlying storage. If you select Enabled (key), an encryption key must be configured. Before using encryption, check whether the region where the EVS disk is located supports disk encryption.
Encryption Configure whether to encrypt underlying storage. If you select Enabled (key), an encryption key must be configured. Before using encryption, check whether the region where the EVS disk is located supports disk encryption.
This field is mandatory only when you need to encrypt the system disk or data disks of the node to be created. Table 33 VolumeMetadata Parameter Type Description __system__encrypted String Whether the EVS disk is encrypted.