检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
The detailed parameter description is as follows: encrypt Specifies whether data is encrypted. This parameter is available only when type is OBS. The default value is on.
The CMK of the database instance is used to encrypt the DEK. When the DEK needs to be decrypted, a request packet needs to be sent to KMS. The DEK ciphertext and the ID of the corresponding CMK are sent to KMS. This is a SIGHUP parameter.
The CMK of the cluster is used to encrypt the DEK. When the DEK needs to be decrypted, a request packet needs to be sent to KMS. The DEK ciphertext and the ID of the corresponding CMK are sent to KMS. This parameter is a SIGHUP parameter.
Therefore, if a table with the same name is deleted and created again, the encrypted function may become invalid and you need to create the encrypted function again. Parent topic: Setting Encrypted Equality Queries
When you use psycopy2 to connect to the GaussDB server, you can enable SSL to encrypt the communication between the client and server. To enable SSL, you must have the server certificate, client certificate, and private key files.
When you use psycopy2 to connect to the GaussDB server, you can enable SSL to encrypt the communication between the client and server. To enable SSL, you must have the server certificate, client certificate, and private key files.
When you use psycopy2 to connect to the GaussDB server, you can enable SSL to encrypt the communication between the client and server. To enable SSL, you must have the server certificate, client certificate, and private key files.
When you use psycopy2 to connect to the GaussDB server, you can enable SSL to encrypt the communication between the client and server. To enable SSL, you must have the server certificate, client certificate, and private key files.
Encrypt the function. The definer fails to be specified for a scheduled event in the following scenarios: The user who operates the scheduled event does not have the sysadmin permission. The current user is inconsistent with the specified definer.
The database driver automatically accesses the external key management service to encrypt and decrypt column keys. Overall Process The process of using a fully-encrypted database consists of the following five phases. This section describes the overall process.
The database driver automatically accesses the external key management service to encrypt and decrypt column keys. Overall Process The process of using a fully-encrypted database consists of the following five phases. This section describes the overall process.
When you use psycopy2 to connect to the GaussDB server, you can enable SSL to encrypt the communication between the client and server. To enable SSL, you must have the server certificate, client certificate, and private key files.
When you use psycopy2 to connect to the GaussDB server, you can enable SSL to encrypt the communication between the client and server. To enable SSL, you must have the server certificate, client certificate, and private key files.
The database driver automatically accesses the external key manager to encrypt and decrypt column keys. Overall Process The process of using a fully-encrypted database consists of the following four phases. This section describes the overall process.
Encrypt the function. The definer fails to be specified for a scheduled event in the following scenarios: The user who operates the scheduled event does not have the sysadmin permission. The current user is inconsistent with the specified definer.
Table 3 SQL statements for defining a CMK Function SQL Statement Creating a CMK CREATE CLIENT MASTER KEY Deleting a CMK DROP CLIENT MASTER KEY Defining a CEK CEKs are used to encrypt data for the encrypted database feature.
Table 3 SQL statements for defining a CMK Function SQL Statement Creating a CMK CREATE CLIENT MASTER KEY Deleting a CMK DROP CLIENT MASTER KEY Defining a CEK CEKs are used to encrypt data for the encrypted database feature.
Encrypt the CMKs of CEKs in round robin (RR) mode and encrypt the plaintext of CEKs. ALTER COLUMN ENCRYPTION KEY The M-compatible mode does not support the full encryption. Therefore, this syntax is not supported.
integer | UNLIMITED } | maxsize_clause | PCTINCREASE integer | FREELISTS integer | FREELIST GROUPS integer | OPTIMAL [ size_clause | NULL ] | BUFFER_POOL { KEEP | RECYCLE | DEFAULT } | FLASH_CACHE { KEEP | NONE | DEFAULT } | ( CELL_FLASH_CACHE ( KEEP | NONE | DEFAULT ) ) | ENCRYPT
integer | UNLIMITED } | maxsize_clause | PCTINCREASE integer | FREELISTS integer | FREELIST GROUPS integer | OPTIMAL [ size_clause | NULL ] | BUFFER_POOL { KEEP | RECYCLE | DEFAULT } | FLASH_CACHE { KEEP | NONE | DEFAULT } | ( CELL_FLASH_CACHE ( KEEP | NONE | DEFAULT ) ) | ENCRYPT