All Products
Search
Document Center

ApsaraDB for Redis:Enable TDE

Last Updated:Mar 04, 2024

ApsaraDB for Redis provides the transparent data encryption (TDE) feature. This feature allows you to encrypt and decrypt Redis Database (RDB) files. You can enable TDE in the ApsaraDB for Redis console to allow the system to encrypt and decrypt RDB files. This improves data security and compliance.

Prerequisites

Background information

TDE encrypts RDB files before they are written to disks and decrypts RDB files when they are read from disks to the memory. TDE does not increase the sizes of RDB files. When you use TDE, you do not need to modify your client.

Impacts

You cannot disable TDE after it is enabled. You must evaluate the impacts on your business before you enable TDE. Take note of the following impacts:

Usage notes

  • TDE can be enabled for an instance but not for a key or a database.

  • TDE encrypts RDB files that are written to disks, such as dump.rdb.

  • Key Management Service (KMS) generates and manages the keys used by TDE. ApsaraDB for Redis does not provide keys or certificates required for encryption. For more information about KMS, see What is Key Management Service?

  • Instances that have TDE enabled cannot be restored from the recycle bin.

Procedure

  1. Log on to the ApsaraDB for Redis console and go to the Instances page. In the top navigation bar, select the region in which the instance is deployed. Then, find the instance and click its ID.
  2. In the left-side navigation pane, click TDE Settings.

  3. Turn on the switch next to TDE Status to enable TDE.

    Note

    If an earlier minor version is used, the switch is dimmed. For more information about how to view and update the minor version, see Update the minor version.

  4. In the dialog box that appears, select Use Automatically Generated Key or Use Custom Key, and then click OK.

    Figure 2. Select a key type for enabling TDE 开启TDE选择密钥

    Note
    • The first time you enable TDE for an instance within your Alibaba Cloud account, follow the instructions on the page to assign the AliyunRdsInstanceEncryptionDefaultRole role to ApsaraDB for Redis. ApsaraDB for Redis can access KMS resources only after it assumes the role.

    • For more information about how to create a custom key, see Create a CMK.

    After the instance state changes from Modifying TDE to Running, TDE is enabled.

Related API operations

API operation

Description

ModifyInstanceTDE

Enables TDE for an ApsaraDB for Redis instance. You can use automatically generated keys or existing custom keys.

DescribeInstanceTDEStatus

Queries whether TDE is enabled for an ApsaraDB for Redis instance.

DescribeEncryptionKeyList

Queries the custom keys that are available for an ApsaraDB for Redis instance to use TDE.

DescribeEncryptionKey

Queries the details of a custom key for an ApsaraDB for Redis instance to use TDE.

CheckCloudResourceAuthorized

Queries whether an ApsaraDB for Redis instance has the permissions to use KMS.

FAQ

  • How do I decrypt an encrypted RDB file?

    RDB files cannot be decrypted. You can restore the file to a new instance. After the restoration is complete, the data is automatically decrypted.

  • Why is the data read by clients still displayed in plaintext?

    Only RDB files written to disks are encrypted. The data read by clients is read from memory and is not encrypted. That is why it is displayed in plaintext.