Asset Identification and Management
Secure Communications
In an MRS cluster, you can provision, manage, and use big data components through the management console. Big data components are deployed in users' VPCs. To allow the MRS console to directly access big data components, you must enable the corresponding security group rules after granting authorization. This authorization process is called secure communications.
You need to enable secure communications when creating a cluster, as shown in Figure 1.
You are advised to enable security group rules only for trusted IP addresses. Exercise caution when using 0.0.0.0/0 as the security group source address.
Protection for Critical Operations
MRS provides protection for critical operations. If you have enabled operation protection (for details, see Critical Operation Protection of IAM), enter the verification code obtained using the verification method you selected (as shown in Figure 2) to prevent risks and losses caused by misoperations.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot