Skip to content

Rate this page
Thanks for your feedback
Thank you! The feedback has been submitted.

For help, click the link below to get free database assistance or contact our experts for personalized support.

Use the keyring vault component

The keyring_vault component connects Percona Server to a HashiCorp Vault server. The component stores and retrieves the encryption keys that protect data at rest.

Percona Server uses a keyring to protect the master keys that encrypt data at rest. The server loads the keyring component from a manifest file. The component then reads a separate configuration file during initialization. Two alternative load mechanisms cannot load the keyring early enough: --early-plugin-load and INSTALL COMPONENT.

Available keyring components

Percona Server provides the following keyring components:

Component Backend
component_keyring_file Local file on disk
component_keyring_kmip Key Management Interoperability Protocol (KMIP) server
component_keyring_kms Cloud Key Management Service (KMS)
component_keyring_vault HashiCorp Vault

Each component uses the same manifest mechanism. Each component reads its own configuration file. The name of the configuration file matches the component name with a .cnf extension. For example, component_keyring_vault reads component_keyring_vault.cnf.

Manifest files

Manifest fields

The manifest is a JavaScript Object Notation (JSON) object with the following fields:

Field Type Required Description
components string Conditional URL-style locator for the component to load. The format is file://<component_name>. Required when the manifest declares the component directly.
read_local_manifest boolean No When true, the global manifest delegates to the local manifest in the data directory. When false or absent, the global manifest declares the component directly.

Manifest examples

Replace <component_name> in the following examples with one of the components in Available keyring components.

The following example shows a global manifest that loads a component directly:

{
  "components": "file://<component_name>"
}

The following example shows a global manifest that delegates to the local manifest:

{
  "read_local_manifest": true
}

The following example shows a local manifest:

{
  "components": "file://<component_name>"
}

Manifest locations

Percona Server reads two manifest files at startup:

Manifest Location Purpose
Global manifest The directory that contains the mysqld binary Default manifest for the server installation
Local manifest Data directory Per-instance override for hosts that run multiple instances with different keyring components

Both files use the name mysqld.my. The global manifest declares the component directly or delegates to the local manifest.

Why the manifest is the only supported load path

The keyring must load before InnoDB opens an encrypted page. Any mechanism that depends on the Structured Query Language (SQL) layer therefore loads the keyring too late.

A mysqld startup proceeds in the following order:

  1. mysqld parses startup configuration and reads the manifest file from the server installation directory.

  2. The server loads each component named in the manifest.

  3. InnoDB initializes, replays the redo log, and opens tablespaces.

  4. The SQL layer accepts connections.

The keyring must load between steps 1 and 3. The following table explains why each alternative mechanism fails to load the keyring within this window:

Mechanism Reason for failure
INSTALL COMPONENT The statement runs as SQL and cannot execute until step 4. The registration record lives in mysql.component, an InnoDB table that the server reads only after InnoDB initializes. The system tablespace cannot decrypt without the keyring, which creates a circular dependency. Crash recovery also runs before the SQL layer, so the encrypted redo log must remain readable without SQL.
--early-plugin-load The flag applies to legacy keyring plugins, not components. Plugins and components load through separate subsystems. The flag cannot locate component entry points.

A component registered through INSTALL COMPONENT on a running server does not persist across restarts. On the next restart, InnoDB cannot unwrap tablespace keys because no manifest file exists on disk. A missing or malformed mysqld.my therefore prevents startup for any instance with encrypted tablespaces.

Install a keyring component

To install a keyring component:

  1. Stop the mysqld process.

  2. Create the manifest file at the chosen location. Use one of the examples in Manifest examples as a template.

  3. Create the configuration file in the same directory as the manifest that declares the component. The name of the configuration file matches the component name with a .cnf extension.

  4. Populate the configuration file with parameters for the chosen component. The required parameters depend on the component.

  5. Set the file ownership of the manifest file and the configuration file to the mysql user.

  6. Restrict read access on the configuration file to the mysql user. The configuration file may contain credentials.

  7. Start the mysqld process.

Verify the installation

Connect to the server and run the following query:

SELECT * FROM performance_schema.keyring_component_status;

The query returns one row per status field. The Component_status field reports Active when the component loaded. The Component_status field reports Disabled when the component failed to load. Inspect the server error log to identify the cause of any failure.

Operate the keyring

Rotate the master key

The InnoDB master key wraps the tablespace keys that protect data on disk. Rotate the master key on a scheduled cadence. Scheduled rotation limits the volume of data wrapped by any single master key. See Data at Rest Encryption for the role of the master key.

Run the following statement to rotate the master key:

ALTER INSTANCE ROTATE INNODB MASTER KEY;

The statement generates a master key and stores the key in the keyring. The server then wraps subsequent tablespace keys with the stored key.

The rotation operation is fast. The server does not re-encrypt the tablespace data.

Earlier master keys must remain in the keyring. Deleting an earlier master key prevents the server from reading data that was wrapped with that key.

For required privileges and the full rotation procedure, see Rotate the master encryption key.

Monitor the keyring

Use the query in Verify the installation to inspect the keyring at runtime. Configure alerts on Component_status transitions to Disabled. Watch the server error log for keyring-related errors. The server writes manifest parse errors, configuration parse errors, and backend connection errors to the error log.

Back up and restore

A backup of an encrypted tablespace requires keyring access on the destination host. The destination host must read the same key material that encrypted the backup.

The following table summarizes the keyring requirement for each backend:

Backend Backup requirement
component_keyring_file Copy the keyring file alongside the data backup. The destination host must read the same key material.
component_keyring_vault Configure the destination host to authenticate with the same Vault server and access the same secret_mount_point.
component_keyring_kmip Configure the destination host to authenticate with the same KMIP server and access the same key namespace.
component_keyring_kms Configure the destination host with credentials and permissions for the same cloud KMS keys.

Test a restore on a separate host before relying on the backup. A restore that runs on the original host can succeed even when the keyring configuration is incorrect.

Replace or remove a keyring component

To replace a keyring component:

  1. Stop the mysqld process.

  2. Edit the manifest file to reference the replacement component.

  3. Create the configuration file for the replacement component.

  4. Start the mysqld process.

To remove the keyring:

  1. Confirm that no encrypted tablespaces exist on the server. A server with encrypted tablespaces cannot start without a keyring.

  2. Stop the mysqld process.

  3. Delete the manifest file.

  4. Start the mysqld process.

Warning

Configure exactly one keyring per server instance. Percona Server does not support multiple keyring plugins, multiple keyring components, or any combination of plugin and component. Such configurations risk data loss.

Configure the keyring vault component

The configuration settings live in either a global configuration file or a local configuration file.

The component connects to the HashiCorp Vault server over Hypertext Transfer Protocol Secure (HTTPS) for production deployments. The component also accepts plain http:// URLs for development. Prepare the certificate and key files for the secure connection. Each Vault server instance requires three artifacts:

  • An organizational Certificate Authority (CA)

  • A private vault key

  • A server certificate signed by the CA

You can generate the artifacts with OpenSSL or reuse existing files. The key files contain sensitive material. Store the key files and the password for each key in a secure location.

You can also build a CA inside Vault . The Vault CA can then issue the server certificate.

Configuration parameters

The component_keyring_vault.cnf file contains required and optional parameters.

Required parameters

  • secret_mount_point — the mount point name where keyring_vault stores the keys.

  • token — a token issued by the Vault server.

  • vault_url — the address of the Vault server. The address must start with http:// or https://. Use https:// for production traffic. Use http:// only for development. The component follows HTTP redirects returned by Vault. This behavior supports cluster setups where a load balancer redirects clients to the active Vault node.

Optional parameters

The component checks the value of read_local_config before any other parameter.

  • read_local_config — Default: false. Declares whether the component reads the local configuration file. Use this parameter only in the global configuration file. The allowed values are true or false.

    false — the component processes the other parameters in the global configuration file and ignores the local configuration file.

    true — the component ignores the other parameters in the global configuration file and reads the local configuration file.

  • secret_mount_point_version — Default: AUTO. The Key-Value (KV) Secrets Engine version (kv or kv-v2). The allowed values are AUTO, 1, and 2.

  • timeout — Default: 15. The duration in seconds applied to both the connection phase and the total operation. The allowed range is 0 through 86400. Set the value to 0 to wait indefinitely.

  • vault_ca — Default: unset (fallback to the host trust store). The path to the CA certificate that signed the certificate of the Vault server. Set this parameter when the host does not trust the CA of the Vault server. The component always verifies the peer certificate and the hostname when vault_url uses https://.

The component trims leading and trailing whitespace from each parameter value before parsing.

Run SELECT * FROM performance_schema.keyring_component_status to inspect the loaded configuration. The view reports each parameter value and the Active or Disabled status. The view also reports the component identity fields: Component_name, Author, License, Implementation_name, and Version.

Example configuration

The following example shows a component_keyring_vault.cnf file in JSON format with sample values for each parameter.

{
  "timeout": 15,
  "vault_url": "https://vault.public.com:8202",
  "secret_mount_point": "secret",
  "secret_mount_point_version": "AUTO",
  "token": "{randomly-generated-alphanumeric-string}",
  "vault_ca": "/data/keyring_vault_confs/vault_ca.crt"
}

Warning

Each secret_mount_point must serve only one Percona Server instance. Multiple servers that share a secret_mount_point write to the same Vault namespace. The shared namespace exposes the following risks:

Risk Mechanism
Permanent data loss Key writes from one server can overwrite key writes from another server. Overwritten keys cannot decrypt previously encrypted data. Cloned servers that retain a source server_uuid collide on InnoDB master-key names. User-named keys created through the keyring user-defined function (UDF) surface collide on any duplicate name.
Unauthorized key disclosure Every server with access to the shared mount point can read every key stored by every other server. The component applies no per-server scoping inside the mount.
Iteration noise The keyring metadata iterator returns all keys under the mount, including keys owned by other servers. Rotation and audit tooling sees foreign keys.

Assign a unique secret_mount_point to each Percona Server instance.

The component fetches the key type and data from the Vault server on the first request for that key.

Validation rules

The component validates each parameter at startup. The following table lists the rejected configurations and their effects:

Condition Result
secret_mount_point ends with / The component fails to initialize.
secret_mount_point starts with / The component fails to initialize.
timeout exceeds 86400 The component fails to initialize.
vault_ca is set together with an http:// vault_url The component fails to initialize.
vault_url does not start with http:// or https:// The component fails to initialize.
vault_url uses https:// but vault_ca is unset The component logs an error and falls back to the host trust store for certificate validation.

secret_mount_point_version values

The secret_mount_point_version parameter accepts one of the following values:

Value Description
1 Works with KV Secrets Engine - Version 1 (kv). The component uses secret_mount_point directly when forming key operation URLs. For example, the URL for a key named skey is <vault_url>/v1/<secret_mount_point>/skey.
2 Works with KV Secrets Engine - Version 2 (kv-v2). Initialization splits the secret_mount_point parameter into two parts:
  • mount_point_path — the mount path under which the Vault server secret was created
  • directory_path — a virtual directory suffix that creates virtual namespaces under the same real mount point
The component uses both parts to form key access URLs, for example <vault_url>/v1/<mount_point_path>/data/<directory_path>/skey.
AUTO The component probes the secrets engine to detect kv or kv-v2. The component then either uses secret_mount_point directly or splits the parameter into a mount point path and a directory path. See Auto-detection algorithm.
Not listed The component behaves as if secret_mount_point_version is set to AUTO.

The component fails to initialize for any other value. Numeric values other than 1 or 2 produce an error. Non-numeric values other than AUTO produce a separate error.

A version mismatch causes one of the following failures:

Configured value Actual engine version Result
2 kv (Version 1) The component runs auto-detection during initialization to confirm the configured value. The component fails to initialize when the probe finds no kv-v2 mount. The error message reads Auto-detected mount point version is not the same as specified in 'secret_mount_point_version'.
1 kv-v2 (Version 2) The component initializes, but every keyring operation fails.

Auto-detection algorithm

The component runs the auto-detection probe during initialization in two cases:

  • secret_mount_point_version is set to AUTO.

  • secret_mount_point_version is set to 2.

The probe walks secret_mount_point from the longest prefix to the shortest. The probe queries the Vault metadata configuration endpoint for each prefix. The first prefix that returns a kv-v2 response defines the mount point path. The remainder of secret_mount_point becomes the directory path. The component falls back to kv when no prefix returns kv-v2.

The probe writes one informational message per prefix to the server log. The messages identify successful matches, unreadable responses, and rejected prefixes.

Upgrade from Vault Secrets Engine Version 1 to Version 2

Use either of the following methods to upgrade from Version 1 to Version 2:

  • Set secret_mount_point_version to AUTO in the keyring_vault configuration file on every Percona Server, or omit the parameter. The AUTO value triggers autodetection during component initialization.

  • Set secret_mount_point_version to 2 to ensure each component initializes only after the upgrade from kv to kv-v2 completes.

Note

The keyring_vault component does not use the built-in key versioning of kv-v2. The component encodes each version into the keyring key name.

Services exposed by the component

The keyring_vault component implements the following services for keyring operations. Other components and the server core consume these services to manage keys backed by Vault:

Service Purpose
keyring_aes Performs Advanced Encryption Standard (AES) encryption and decryption with keys stored in Vault.
keyring_component_metadata_query Reports the component metadata, including the loaded configuration values.
keyring_component_status Reports the component status.
keyring_generator Generates keys on demand and stores the keys in Vault.
keyring_keys_metadata_iterator Iterates over key metadata for inspection.
keyring_load Loads the keyring during server startup and reloads on demand.
keyring_reader_with_status Reads keys and exposes the read status.
keyring_writer Writes keys to Vault.

The keyring_aes service supports server-side encryption at rest. The service also supports the AES UDFs when paired with the encryption UDF component.

Operate the vault component

The shared Operate the keyring section covers rotation, monitoring, and backup procedures that apply to every keyring component. The following notes describe behaviors that are specific to keyring_vault.

Rotate the master key

Each ALTER INSTANCE ROTATE INNODB MASTER KEY statement writes a master key entry to Vault under the configured secret_mount_point. The previous key remains in Vault history when secret_mount_point_version is 2. The previous key also remains when the AUTO probe identifies a kv-v2 mount. The component contacts Vault during the rotation, so a slow or unreachable Vault delays statement completion. Schedule rotation during a low-load window.

Monitor the component

Compare the values returned by performance_schema.keyring_component_status against component_keyring_vault.cnf. The comparison detects drift in vault_url, secret_mount_point, vault_ca, and secret_mount_point_version. Watch the server error log for HTTP 403 (token expiration) and HTTP 503 (sealed Vault). Configure alerts on both patterns.

Back up and restore

A Vault-backed restore requires the following on the destination host:

  • Network reachability to the same Vault server, with valid name resolution and certificate trust.

  • A valid token with read access to the configured secret_mount_point.

  • A server_uuid distinct from the source host. A duplicated server_uuid triggers the data-loss case described in Configure the keyring vault component.

  • kv-v2 history retention that covers the time between backup and restore. A backup taken before a master-key rotation cannot decrypt later tablespaces. The post-rotation key must remain in Vault history for the restore to succeed.

See also