You can use the EnableEncryptionAtRest method to enable the Advanced Encryption Standard (AES) 256-bit encryption at rest on the cluster so that the cluster can manage the encryption key used for the drives on each node. This feature is not enabled by default.
When you enable Encryption at Rest, the cluster automatically manages encryption keys internally for the drives on each node in the cluster. Nodes do not store the keys to unlock drives and the keys are never passed over the network. Two nodes participating in a cluster are required to access the key to disable encryption on a drive. The encryption management does not affect performance or efficiency on the cluster. If an encryption-enabled drive or node is removed from the cluster with the API, Encryption at Rest is disabled and the data is not secure erased. Data can be secure erased using the SecureEraseDrives API method.
This method has no input parameters.
This method has no return values.
Requests for this method are similar to the following example:
{ "method": "EnableEncryptionAtRest", "params": {}, "id": 1 }
This method returns a response similar to the following example from the EnableEncryptionAtRest method. There is no result to report.
{ "id": 1, "result": {} }
While Encryption At Rest is being enabled on a cluster, GetClusterInfo returns a result describing the state of Encryption at Rest ("encryptionAtRestState") as "enabling". After Encryption At Rest is fully enabled, the returned state changes to "enabled".
{ "id": 1, "result": { "clusterInfo": { "attributes": { }, "encryptionAtRestState": "enabling", "ensemble": [ "10.10.5.94", "10.10.5.107", "10.10.5.108" ], "mvip": "192.168.138.209", "mvipNodeID": 1, "name": "Marshall", "repCount": 2, "svip": "10.10.7.209", "svipNodeID": 1, "uniqueID": "91dt" } } }