MySQL :: MySQL 8.0 Reference Manual :: 8.4.4.19 Keyring System Variables (original) (raw)

8.4.4.19 Keyring System Variables

MySQL Keyring plugins support the following system variables. Use them to configure keyring plugin operation. These variables are unavailable unless the appropriate keyring plugin is installed (see Section 8.4.4.3, “Keyring Plugin Installation”).

cd /usr/local/mysql  
mkdir mysql-keyring  
chmod 750 mysql-keyring  
chown mysql mysql-keyring  
chgrp mysql mysql-keyring  

If the keyring_encrypted_file plugin cannot create or access its data file, it writes an error message to the error log. If an attempted runtime assignment tokeyring_encrypted_file_data results in an error, the variable value remains unchanged.
Important
Once the keyring_encrypted_file plugin has created its data file and started to use it, it is important not to remove the file. Loss of the file causes data encrypted using its keys to become inaccessible. (It is permissible to rename or move the file, as long as you change the value ofkeyring_encrypted_file_data to match.)

cd /usr/local/mysql  
mkdir mysql-keyring  
chmod 750 mysql-keyring  
chown mysql mysql-keyring  
chgrp mysql mysql-keyring  

If the keyring_file plugin cannot create or access its data file, it writes an error message to the error log. If an attempted runtime assignment tokeyring_file_data results in an error, the variable value remains unchanged.
Important
Once the keyring_file plugin has created its data file and started to use it, it is important not to remove the file. For example,InnoDB uses the file to store the master key used to decrypt the data in tables that useInnoDB tablespace encryption; seeSection 17.13, “InnoDB Data-at-Rest Encryption”. Loss of the file causes data in such tables to become inaccessible. (It is permissible to rename or move the file, as long as you change the value ofkeyring_file_data to match.) It is recommended that you create a separate backup of the keyring data file immediately after you create the first encrypted table and before and after master key rotation.

openssl rsa -pubout -outform DER -in ~/.oci/oci_api_key.pem | openssl md5 -c  

Alternatively, obtain the fingerprint from the Console, which automatically displays the fingerprint when you upload the RSA public key.
For information about obtaining key fingerprints, seeRequired Keys and OCIDs.
This variable is mandatory. If not specified,keyring_oci initialization fails.

cd /usr/local/mysql  
mkdir mysql-keyring-okv  
chmod 750 mysql-keyring-okv  
chown mysql mysql-keyring-okv  
chgrp mysql mysql-keyring-okv  

If the value assigned tokeyring_okv_conf_dir specifies a directory that does not exist, or that does not contain configuration information that enables a connection to Oracle Key Vault to be established,keyring_okv writes an error message to the error log. If an attempted runtime assignment tokeyring_okv_conf_dir results in an error, the variable value and keyring operation remain unchanged.