Updated on 2024-06-14 GMT+08:00

Converting an Ordinary Cluster to an Encrypted Cluster

GaussDB(DWS) allows you to convert an unencrypted cluster to an encrypted cluster when the cluster status is Available on the console. To ensure data security, converting a cluster to an encrypted cluster is an irreversible high-risk operation and will restart the cluster. As a result, services may be unavailable for a short period of time. Exercise caution when performing this operation.

If the current console does not support this feature, contact technical support.

Procedure

  1. Log in to the GaussDB(DWS) management console. In the navigation pane, choose Clusters > Dedicated Clusters.
  2. In the cluster list, locate the row that contains the target cluster and choose More > Convert to Encrypted Cluster in the Operation column.
  3. In the dialog box that is displayed, select the key source and encryption algorithm to convert the cluster into an encrypted cluster.

    • Method 1: Select a key name. You can create a resource share to share KMS resources with other members. After accepting the sharing invitation, the member can select the shared KMS resource from the key source.
      Figure 1 Select from existing keys
    • Method 2: Enter the key ID. Enter the key ID used for authorizing the current tenant. For details, see Viewing a CMK.

      When you grant permissions on the Creating a Grant page, the authorized object must be an account instead of a user. The authorized operations must at least contain Querying key details, Encrypting data, and Decrypting data.

      Figure 2 Key ID
    Table 1 Parameter description

    Parameter

    Description

    Key Source

    You can select a key name from the key list or directly enter a key name.

    Cryptographic Algorithm

    The encryption algorithms are as follows:

    • AES256 (general encryption algorithm, SM algorithms not supported)
    • SM4 (compatible with international algorithms)
    • The database encryption function cannot be disabled once it is enabled.
    • After Encrypt DataStore is enabled, the key cannot be disabled, deleted, or frozen when being used. Otherwise, the cluster becomes abnormal and the database becomes unavailable.
    • Snapshots created after the database encryption function is enabled cannot be restored using open APIs.
    • By default, only Huawei Cloud accounts or users with Security Administrator permissions can query and create agencies. IAM users under an account do not have the permission to query or create agencies by default. Contact a user with that permission and complete the authorization on the current page.

  4. After the conversion, you can click the cluster name to go to the Cluster Details page to view the cluster details. For details, see Viewing Database Encryption Information.