pg_tde 2.1.1 (2026-01-22)¶
The pg_tde extension, provided by Percona, adds Transparent Data Encryption (TDE) to PostgreSQL and helps protect sensitive data at rest.
Release Highlights¶
Integrated Hashicorp Vault namespace¶
The namespace of Hashicorp vault is integrated with pg_tde through the pg_tde_add_global_key_provider_vault_v2 parameter.
Documentation updates¶
Updated the Global Principal Key configuration and Configure WAL encryption chapters with updated installation steps and removed outdated KMS configuration information.
Known issues¶
-
Creating, changing, or rotating global key providers (or their keys) while
pg_tde_basebackupis running may cause standbys or standalone clusters initialized from the backup to fail during WAL replay and may also lead to the corruption of encrypted data (tables, indexes, and other relations).Avoid making these actions during backup windows. Run a new full backup after completing a rotation or provider update.
-
Using
pg_tde_basebackupwith--wal-method=fetchproduces warnings.This behavior is expected and will be addressed in a future release.
-
The default
mlocklimit on Rocky Linux 8 for ARM64-based architectures equals the memory page size and is 64 Kb. This results in the child process withpg_tdefailing to allocate another memory page because the max memory limit is reached by the parent process.To prevent this, you can change the
mlocklimit to be at least twice bigger than the memory page size:- temporarily for the current session using the
ulimit -l <value>command. - set a new hard limit in the
/etc/security/limits.conffile. To do so, you require the superuser privileges.
Adjust the limits with caution since it affects other processes running in your system.
- temporarily for the current session using the
Changelog¶
New Features¶
- PG-1959 - Namespace of Hashicorp vault is integrated with
pg_tde