Access an Encrypted Snapshot
On this page
When you use Encryption at Rest using Customer Key Management, Atlas encrypts the
mongod
data files in your snapshots. If you want to download and
restore a snapshot, the mongod
can't read these data files unless it
has access to a KMIP server that can provide the appropriate
decryption key. You can use the KMIP Proxy Standalone to access the
mongod
data files. You download the KMIP Proxy Standalone as a
binary for your specific operating system.
Considerations
By default, the KMIP Proxy Standalone uses the credentials stored in
the
/<dbPath>/cloudProviderCredentials/<keyID>.<cloudProvider>.metadata
file.
If you rotate keys, these credentials reflect the latest key rotation.
If the KMIP Proxy Standalone binary is unable to decrypt the snapshots using these credentials, the binary shows an error message stating that you must update the metadata files on disk that contain the old credentials. You can update the metadata file with any text editor.
If you use role-based access to your encryption key, the
/<dbPath>/cloudProviderCredentials/<keyID>.<cloudProvider>.metadata
file won't contain valid credentials.Take one of the following actions:
Update the
/<dbPath>/cloudProviderCredentials/<keyID>.<cloudProvider>.metadata
file. Use an emptyroleId
. Provide temporary credentials based on the IAM role that can access your encryption key in theaccessKeyId
andsecretAccessKey
fields:{ "accessKeyId": "TemporaryAccessKeyId", "secretAccessKey": "TemporarySecretAccessKey", "roleId": "", "region": "us-east-1" } Start the KMIP Proxy Standalone binary with the following options:
awsAccessKey
awsSecretAccessKey
awsSessionToken
awsRegion
To generate temporary credentials based on an IAM role, see the AWS documentation.
Procedure
In Atlas, go to the Clusters page for your project.
If it's not already displayed, select the organization that contains your desired project from the Organizations menu in the navigation bar.
If it's not already displayed, select your desired project from the Projects menu in the navigation bar.
If it's not already displayed, click Clusters in the sidebar.
The Clusters page displays.
Go to the Backup page for your cluster.
Click your cluster's name.
Click the Backup tab.
If the cluster has no Backup tab, then Atlas backups are disabled for that cluster and no snapshots are available. You can enable backups when you scale the cluster.
The Backup page displays.
Download the encrypted snapshot.
If it isn't already selected, click the Snapshots tab.
In the Actions column, expand the Actions menu, and click Download for the snapshot that you want to download.
Atlas prepares the snapshot. When it is ready to download, Atlas generates a one-time use download link that expires after four hours. Atlas emails you the download link and displays it in the Restores & Downloads tab.
Download the KMIP Proxy Standalone.
In the Preparing Snapshot Download modal, click Download KMIP Proxy and select the binary for your operating system.
Tip
You can also do one of the following steps to access the download KMIP Proxy Standalone link:
Click the Restores & Downloads tab.
In Atlas, go to the Advanced page for your project.
If it's not already displayed, select the organization that contains your project from the Organizations menu in the navigation bar.
If it's not already displayed, select your project from the Projects menu in the navigation bar.
In the sidebar, click Advanced under the Security heading.
The Advanced page displays.
The link appears in the Encryption at Rest using your Key Management section.
Start the KMIP Proxy Standalone.
Open a terminal or command prompt window.
Invoke the following command with the specified parameters:
kmipProxyStandalone -awsAccessKey <accessKey> -awsSecretAccessKey <secretAccessKey> \ -awsSessionToken <token> -awsRegion <region> -cloudProvider aws \ -dbpath <dbpath> -kmipPort <kmipPort> -mongodPort <mongodPort> ParameterDescriptionawsAccessKey
IAM access key ID with permissions to access the customer master key.
Required only if you didn't specify an
accessKeyId
in the/<dbPath>/cloudProviderCredentials/<keyID>.<cloudProvider>.metadata
file.awsSecretAccessKey
IAM secret access key with permissions to access the customer master key.
Required only if you didn't specify a
secretAccessKey
in the/<dbPath>/cloudProviderCredentials/<keyID>.<cloudProvider>.metadata
file.awsSessionToken
Token to use when granting temporary AWS security credentials.
awsRegion
AWS region in which the AWS customer master key exists.
Required only if you didn't specify a
region
in the/<dbPath>/cloudProviderCredentials/<keyID>.<cloudProvider>.metadata
file.cloudProvider
Your cloud service provider. Value must be
aws
.dbpath
Path to the
mongod
data directory for which you want to create a proxy.kmipPort
Port on which to run the KMIP proxy.
mongodPort
Port on which to run the
mongod
.kmipProxyStandalone -cloudProvider <azure|gcp> -dbpath <dbpath> \ -kmipPort <kmipPort> -mongodPort <mongodPort> ParameterDescriptioncloudProvider
Your cloud service provider. Valid values are
azure
orgcp
.dbpath
Path to the
mongod
data directory for which you want to create a proxy.kmipPort
Port on which to run the KMIP proxy.
mongodPort
Port on which to run the
mongod
.
The KMIP Proxy Standalone generates a KMIP certificate for
localhost
and writes it to the dbpath
.
Start a mongod
process.
Invoke the following command with the specified parameters:
mongod --dbpath <dbpath> --port <mongodPort> --enableEncryption --kmipPort <kmipPort> --kmipServerName 127.0.0.1 --kmipServerCAFile <dbpath>/kmipCA.pem --kmipActivateKeys false --kmipClientCertificateFile <dbpath>/kmipClient.pem
Parameter | Description |
---|---|
| Path to the directory where the |
| Port on which the |
| Port on which the KMIP server listens. |
| Path to the CA File used to validate secure client connection to the KMIP server. |
| For MongoDB server v5.2 or later, flag that specifies whether
to activate or disable keys for the MongoDB server. Value for
this parameter must be |
| Path to the client certificate used for authenticating MongoDB to the KMIP server. |
The mongod
acts as a KMIP server bound to 127.0.0.1
and
runs on the specified kmipPort
.
Connect to the mongod
process.
Access your data files by connecting to the mongod
through the
mongosh
, MongoDB Compass, or through standard
utilities such as mongodump
or mongorestore.
You can also restore a snapshot using Encryption at Rest.