Skip to content

Latest commit

 

History

History
21 lines (14 loc) · 1.03 KB

enable-disk-spill-encrypt.md

File metadata and controls

21 lines (14 loc) · 1.03 KB
title summary
Enable Encryption for Disk Spill
Learn how to enable encryption for disk spill in TiDB.

Enable Encryption for Disk Spill

When the oom-use-tmp-storage configuration item is set to true, if the memory usage of a single SQL statement exceeds the limit of mem-quota-query setting, some operators can save the intermediate results during execution as a temporary file to the disk and delete the file after the query is completed.

You can enable encryption for disk spill to prevent attackers from accessing data by reading these temporary files.

Configure

To enable encryption for the disk spill files, you can configure the item spilled-file-encryption-method in the [security] section of the TiDB configuration file.

[security]
spilled-file-encryption-method = "aes128-ctr"

Value options for spilled-file-encryption-method are aes128-ctr and plaintext. The default value is plaintext, which means that encryption is disabled.