Data Protection
CCE takes different measures to keep data secure and reliable.
Measure |
Description |
Documentation |
---|---|---|
Certificate for service discovery |
Applications in CCE clusters can use HTTPS for secure data transmission. You can create Services (Layer-4) and ingresses (Layer-7) to connect to a load balancer as required. |
|
HA deployment |
HA solutions in CCE:
|
|
Disk encryption |
CCE supports multiple types of storage resources, as well as HA and encryption measures to secure your data. |
|
Cluster secret |
A secret is a cluster resource that holds sensitive data, such as authentication and key information. Its contents are user-defined. After creating secrets, you can use them as files or environment variables in a containerized workload. |
|
Protection for critical operations |
With this function enabled, the system authenticates user's identity when they perform any risky operation like deleting a cluster. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot