KEMBAR78
HANA Data and Log Volume Encryption | PDF
100% found this document useful (1 vote)
72 views2 pages

HANA Data and Log Volume Encryption

The document outlines the steps for enabling data and log volume encryption in HANA Database, starting with a complete backup and noting running services. It includes commands for checking tenant databases, stopping and dropping databases, changing encryption parameters, creating a new tenant database, and verifying encryption status. Finally, it emphasizes the importance of restoring the tenant database from the backup after enabling encryption.

Uploaded by

aditya.rajak2024
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
72 views2 pages

HANA Data and Log Volume Encryption

The document outlines the steps for enabling data and log volume encryption in HANA Database, starting with a complete backup and noting running services. It includes commands for checking tenant databases, stopping and dropping databases, changing encryption parameters, creating a new tenant database, and verifying encryption status. Finally, it emphasizes the importance of restoring the tenant database from the backup after enabling encryption.

Uploaded by

aditya.rajak2024
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

HANA Data and Log Volume Encryption

Pre-Steps:

 Complete database backup of the HANA Database


 Make a note of the services running along with the ports in Tenant DB

Steps for persistence and log encryption:

1. Check the number of tenant database available


SELECT * FROM SYS.M_DATABASES

2. Check encryption status

SELECT * FROM SYS.M_ENCRYPTION_OVERVIEW

3. Stop Tenant Database – Execute the below command from system DB SQL query

ALTER SYSTEM STOP DATABASE <SID>

4. Drop Tenant Database - Execute the below command from system DB SQL query

DROP DATABASE <SID>

5. Change the Encryption Parameters


log_encryption = on //in global.ini

persistence_encryption = on //in global.ini

and execute the below commands

ALTER SYSTEM PERSISTENCE ENCRYPTION ON;

ALTER SYSTEM LOG ENCRYPTION ON;


6. Verify the encryption parameter changes by executing
SELECT * FROM SYS.M_ENCRYPTION_OVERVIEW

7. Create tenant database

CREATE DATABASE <sid> SYSTEM USER PASSWORD <password>;

8. Change the port as per before using below command and start the teanant database

ALTER DATABASE <SID> ALTER ‘indexserver’ AT ‘db_hostname:new_port’ TO ‘old_port’;

ALTER SYSTEM START DATABASE <SID>;

9. Check the encryption status of the tenant database


SELECT * FROM SYS.M_ENCRYPTION_OVERVIEW;

10. Take a complete tenant database backup and restore the tenant database with your actual backup
performed in pre-steps for the log and persistence encryption

You might also like