Migrating from CMEK v1 to v2
We are improving the security of customer managed encryption keys (CMEK) services. All services are now configured with a unique AWS role per service to authorize using customer keys to encrypt and decrypt services. This new role is only shown in the service configuration screen.
OpenAPI and Terraform are both supported for this new process. For more information, check out our docs (Enhanced Encryption, Cloud API, Official Terraform Provider).
Manual migration
Complete the following steps to migrate to the new process:
- Sign in to https://console.clickhouse.cloud
- Click on the encrypted service
- Click on Service Settings on the left
- Scroll to the bottom of the screen and expand View service details
- Copy the Encryption Role ID (IAM)
- Go to your KMS key in AWS and update the Key Policy to add the following:
- In ClickHouse Cloud, open a support case to let us know we can enable the new method. This change requires a service restart, please let us know if there is a day/ time that is best to restart the service.
- Once we restart the service, go to your KMS key in AWS and remove the following from the Key Policy:
- The update is complete!
Terraform migration
- Update to Terraform version 3.5.0 or higher
- Apply Terraform without changes. A new field for transparent_data_encryption will appear in the Terraform state. Make note of the role_id here.
- Go to your KMS key in AWS and update the Key Policy to add the following:
- In ClickHouse Cloud, open a support case with the service name to let us know we can enable the new method. This change requires a service restart, please let us know if there is a day/ time that is best to restart the service.
- After we restart the service, you can update the transparent_data_encryption.enabled setting to ‘True’ and remove the tier setting in Terraform and apply. This will result in no changes.
- Go to your KMS key in AWS and remove the following from the Key Policy:
- The update is complete!