Encrypted Backup¶
Percona XtraBackup has implemented support for encrypted backups. It can be
used to encrypt/decrypt local or streaming backup with xbstream option
(streaming tar backups are not supported) in order to add another layer of
protection to the backups. Encryption is done with the libgcrypt library.
Creating Encrypted Backups¶
To make an encrypted backup following options need to be specified (options
xtrabackup --encrypt-key and xtrabackup --encrypt-key-file
are mutually exclusive, i.e., just one of them needs to be provided):
-
--encrypt=ALGORITHM- currently supported algorithms are:AES128,AES192andAES256 -
--encrypt-key=ENCRYPTION_KEY- proper length encryption key to use. It is not recommended to use this option where there is uncontrolled access to the machine as the command line and thus the key can be viewed as part of the process info. -
--encrypt-key-file=KEYFILE- the name of a file where the raw key of the appropriate length can be read from. The file must be a simple binary (or text) file that contains exactly the key to be used.
Both xtrabackup --encrypt-key option and
xtrabackup --encrypt-key-file option can be used to specify the
encryption key. Encryption key can be generated with command like:
$ openssl rand -base64 24
Example output of that command should look like this:
GCHFLrDFVx6UAsRb88uLVbAVWbK+Yzfs
This value then can be used as the encryption key
Using the --encrypt-key option¶
Example of the xtrabackup command using the xtrabackup --encrypt-key
should look like this:
$ xtrabackup --backup --target-dir=/data/backups --encrypt=AES256 \
--encrypt-key="GCHFLrDFVx6UAsRb88uLVbAVWbK+Yzfs"
Using the --encrypt-key-file option¶
Example of the xtrabackup command using the
xtrabackup --encrypt-key-file should look like this:
$ xtrabackup --backup --target-dir=/data/backups/ --encrypt=AES256 \
--encrypt-key-file=/data/backups/keyfile
Note
Depending on the text editor used for making the KEYFILE, text file in some cases can contain the CRLF and this will cause the key size to grow and thus making it invalid. Suggested way to do this would be to create the file with: echo -n "GCHFLrDFVx6UAsRb88uLVbAVWbK+Yzfs" > /data/backups/keyfile
Optimizing the encryption process¶
Two options have been introduced with the encrypted backups that can be used to
speed up the encryption process. These are
xtrabackup --encrypt-threads and
xtrabackup --encrypt-chunk-size. By using the
xtrabackup --encrypt-threads option
multiple threads can be specified to be used for encryption in parallel. Option xtrabackup --encrypt-chunk-size can be used to specify the size (in
bytes) of the working encryption buffer for each encryption thread (default is
64K).
Decrypting Encrypted Backups¶
Percona XtraBackup xtrabackup --decrypt option has been implemented
that can be used to decrypt the backups:
$ xtrabackup --decrypt=AES256 --encrypt-key="GCHFLrDFVx6UAsRb88uLVbAVWbK+Yzfs"\
--target-dir=/data/backups/
Percona XtraBackup doesn’t automatically remove the encrypted files. In order to clean up the backup directory users should remove the *.xbcrypt
files. In Percona XtraBackup 2.4.6 xtrabackup --remove-original
option has been implemented that you can use to remove the encrypted files once they’ve been decrypted. To remove the files once they’re decrypted you should run:
$ xtrabackup --decrypt=AES256 --encrypt-key="GCHFLrDFVx6UAsRb88uLVbAVWbK+Yzfs"\
--target-dir=/data/backups/ --remove-original
Note
xtrabackup --parallel can be used with xtrabackup --decrypt option to decrypt multiple files simultaneously.
When the files have been decrypted backup can be prepared.
Preparing Encrypted Backups¶
After the backups have been decrypted, they can be prepared the same way as the standard full backups with the xtrabackup --prepare option:
$ xtrabackup --prepare --target-dir=/data/backups/
Restoring Encrypted Backups¶
xtrabackup has a xtrabackup --copy-back option, which performs the
restoration of a backup to the server’s datadir:
$ xtrabackup --copy-back --target-dir=/data/backups/
It will copy all the data-related files back to the server’s datadir,
determined by the server’s my.cnf configuration file. You should check
the last line of the output for a success message:
170214 12:37:01 completed OK!