All Products
Search
Document Center

ApsaraDB for OceanBase:TDE

Last Updated:Apr 25, 2024

This topic describes how to use the Transparent Data Encryption (TDE) feature. Once you enable the TDE feature, it cannot be disabled. Proceed with caution.

Background information

ApsaraDB for OceanBase provides the TDE feature for storage and remote procedure calls (RPC).

  • Storage encryption protects data on disks.

  • RPC encryption protects the communications between OBServers.

Note

The TDE feature is provided in ApsaraDB for OceanBase V3.2.3, V3.2.4, and V4.2.1.

At present, TDE supports the service key and custom key.

Service keys

A service key is generated and managed by ApsaraDB for OceanBase.

Custom keys

A custom key is created by using Alibaba Cloud Key Management Service (KMS). After you purchase Alibaba Cloud KMS, you can create your custom keys in the KMS console. For more information, see Create a CMK.

Limitations

  • Limitations on service keys

    • Once you enable the TDE feature, it cannot be disabled.

    • An Oracle tenant supports the following key types: AES-256, AES-128, AES-192, and M4-CBC. Once you specify a key type, you cannot change it or convert a key of this type to another type.

  • Limitations on custom keys

    • Once you enable the TDE feature, it cannot be disabled.

    • An Oracle tenant supports the following key types: AES-256, AES-128, AES-192, and M4-CBC. Once you specify a key type, you cannot change it or convert a key of this type to another type.

    • At present, custom keys are supported only in ApsaraDB for OceanBase V2.2.77 and later.

    • A unique service role is created for each cloud product. As for ApsaraDB for OceanBase, the AliyunServiceRoleForOceanBase role is created for you to encrypt data in ApsaraDB for OceanBase. You must use your Alibaba Cloud account or an account with the AliyunSTSAssumeRoleAccess permission.

    • Do not disable keys, schedule a key deletion task or delete keys in the KMS console. Otherwise, TDE cannot be enabled.

    • After you create a key in the KMS console, add the oceanbase:encryption: true tag to the key.

    • You must select an HSM version for KMS.

Procedure

  1. In the left-side navigation pane, click Instances and select the target cluster instance to go to the Cluster Instance Workspace page.

  2. In the left-side navigation pane, click Security Settings.

  3. On the TDE tab, configure the TDE settings.1

    1. Click Enable TDE in the Actions column.

      Note

      Once you enable the TDE feature, it affects the database performance and cannot be disabled. Proceed with caution.

    2. In the dialog box that appears, click OK to specify the key type.

      Service keys and custom keys are supported;

      • A service key is generated and managed by ApsaraDB for OceanBase.

        Note

        At present, the key types Aliyun_AES_256 and Aliyun_SM4 are supported. Once you specify a key type, you cannot change it or convert a key of this type to another type.

      • A custom key is created by using Alibaba Cloud KMS. After you purchase Alibaba Cloud KMS, you can create your custom keys in the KMS console. For more information, see Create a CMK.

        Note

        1. At present, the key types Aliyun_AES_256 and Aliyun_SM4 are supported. Once you specify a key type, you cannot change it or convert a key of this type to another type.

        2. A unique service role is created for each cloud product. As for ApsaraDB for OceanBase, the AliyunServiceRoleForOceanBase role is created for you to encrypt data in ApsaraDB for OceanBase.

    3. After you specify the key type, click OK.

What to do next

You can also click Create Tablespace in the Actions column to create an encrypted tablespace.

To view the tablespace name, encryption algorithm, and creation time of all encrypted tablespaces in a tenant, click the plus sign (+) in front of the tenant.

TDE透明加密3

You can click the name of an encrypted tablespace to view the encryption status and progress of encrypted tables. The encryption progress indicates the percentage of data blocks that are already encrypted in the data table.

TDE透明加密2

After you create an encrypted tablespace, you can perform DDL operations by using data R&D tools or other CLI tools to create tables and assign the tables to the specified encrypted tablespace.

  • Oracle tenant

    create table table_name (column1 int, column2 int) tablespace tablespace_name;
  • MySQL tenant

    create table table_name (column1 int, column2 int) tablespace tablespace_name;
Note

  1. To encrypt data, you must enable TDE, create a tablespace on the TDE tab, and perform the DDL operation to create an encrypted table. Sample DDL statement for creating an encrypted table: obclient> CREATE TABLE t1 (id int,id2 int) TABLESPACE sectest_ts1;

  2. After you add a historical data table to an encrypted tablespace, perform a major compaction to persist the data.

Perform a full compaction for a historical data table

To perform a full compaction for historical data table t1, perform the following steps:

  1. Set the value of the progressive_merge_num parameter to 1.

    obclient> ALTER TABLE t1 set progressive_merge_num = 1;
  2. On the Cluster Instance Workspace page, manually initiate a major compaction. For more information, see Major compaction.

  3. After the major compaction is completed, set the value of the progressive_merge_num parameter to 0.

    obclient> ALTER TABLE t1 set progressive_merge_num = 0;