diff --git a/managed-databases/postgresql-and-mysql/concepts.mdx b/managed-databases/postgresql-and-mysql/concepts.mdx index a528341d8a..aaca340391 100644 --- a/managed-databases/postgresql-and-mysql/concepts.mdx +++ b/managed-databases/postgresql-and-mysql/concepts.mdx @@ -55,11 +55,17 @@ A [snapshot](/managed-databases/postgresql-and-mysql/how-to/manage-snapshots/) i ## Encryption at rest + +Once activated on a Database Instance, encryption at rest cannot be disabled. + + Encryption at rest allows you to permanently encrypt your database data. The data is encrypted at volume level using [LUKS](https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup). At Scaleway `aes-xts-plain64` is used as the default. The management of the encryption key is done by Scaleway. -When you enable encryption at rest, you cannot disable it after database creation. All databases, data (including logs), and snapshots will be encrypted. Logical backup encryption is not currently available. +All databases, data (including logs), and snapshots will be encrypted. Logical backup encryption is not currently available. -During the beta phase, you can enable encryption on an existing Database Instance by opening a request via a [support ticket](https://console.scaleway.com/support). + +Encryption at rest can be activated after Database Instance creation via the [upgrade endpoint](https://www.scaleway.com/en/developers/api/managed-database-postgre-mysql/#path-database-instances-upgrade-a-database-instance). + Enabling encryption means your database data will be copied into a new, encrypted block volume. This takes approximately 1 hour per 100 GB of storage. When switching volumes, expect a few seconds of downtime towards the end of the copying process. diff --git a/managed-databases/postgresql-and-mysql/how-to/create-a-database.mdx b/managed-databases/postgresql-and-mysql/how-to/create-a-database.mdx index 4312d18d9b..4603f5536c 100644 --- a/managed-databases/postgresql-and-mysql/how-to/create-a-database.mdx +++ b/managed-databases/postgresql-and-mysql/how-to/create-a-database.mdx @@ -38,9 +38,11 @@ Compared to traditional database management, which requires customers to provide - Enable [encryption at rest](/managed-databases/postgresql-and-mysql/concepts/#encryption-at-rest) if you want to ensure the permanent encryption of your database data. - When you enable encryption at rest, you cannot disable it after database creation. All databases, data (including logs), and snapshots will be encrypted. Logical backup encryption is not currently available. + Once activated on a Database Instance, encryption at rest cannot be disabled.

- During the beta phase, you can enable encryption on an existing Database Instance by opening a request via a [support ticket](https://console.scaleway.com/support). + All databases, data (including logs), and snapshots will be encrypted. Logical backup encryption is not currently available. +

+ Encryption at rest can be activated after Database Instance creation via the [upgrade endpoint](https://www.scaleway.com/en/developers/api/managed-database-postgre-mysql/#path-database-instances-upgrade-a-database-instance).

Enabling encryption means your database data will be copied into a new, encrypted block volume. This takes approximately 1 hour per 100 GB of storage. When switching volumes, expect a few seconds of downtime towards the end of the copying process.