User Action: Postgres 2.0 service encryption in the US West environment
Scheduled Maintenance Report for Predix
Completed
The scheduled maintenance has been completed.
Posted May 03, 2021 - 12:00 PDT
In progress
Scheduled maintenance is currently in progress. We will provide updates as necessary.
Posted Apr 19, 2021 - 12:00 PDT
Update
There is a change in the configuration for the Postgres 2.0 Service in the US-West environment. After this change you will be required to choose encryption-at-rest option and set it to true when creating a new Service Instance.

Please note that depending on your workload, enabling encryption-at-rest can impact the performance of your Postgres 2.0 instance anywhere between 0% to 8%. Also, note that enabling encryption-at-rest doesn't require any code or configuration change in your applications connecting to the Service Instance.

Existing Postgres 2.0 Instances that are not currently encrypted-at-rest will be modified to enable encryption-at-rest. This modification will be performed between Apr 19, 2021 12:00 PM PT and May 2, 2021 12 PM PT during a weekly maintenance-window of the respective Postgres 2.0 Instance, usually it is 30 Min. The DB Instance will be unavailable for application connections during this modification.

Example command to create a Postgres 2.0 Service Instance with encryption-at-rest enabled:

$ cf create-service postgres-2.0 dedicated-10.1 instance_name -c '{"postgres_version":"12", "encryption_at_rest":true}'

To see whether your Postgres 2.0 Instance is encrypted-at-rest and what is the DB Instance’s maintenance-window, please see the section “Credentials” at the following link.

https://www.ge.com/digital/documentation/predix-platforms/postgres-service.html#ariaid-title3
Posted Apr 09, 2021 - 10:50 PDT
Scheduled
There is a change in the configuration for the Postgres 2.0 Service in the US-West environment. After this change you will be required to choose encryption-at-rest option and set it to true when creating a new Service Instance.

Please note that depending on your workload, enabling encryption-at-rest can impact the performance of your Postgres 2.0 instance anywhere between 0% to 8%. Also, note that enabling encryption-at-rest doesn't require any code or configuration change in your applications connecting to the Service Instance.

Existing Postgres 2.0 Instances that are not currently encrypted-at-rest will be modified to enable encryption-at-rest. This modification will be performed between Apr 19, 2021 12:00 PM PT and May 2, 2021 12 PM PT during a weekly maintenance-window of the respective Postgres 2.0 Instance, usually it is 30 Min. The DB Instance will be unavailable for application connections during this modification.

Example command to create a Postgres 2.0 Service Instance with encryption-at-rest enabled:

$ cf create-service postgres-2.0 dedicated-10.1 instance_name -c '{"postgres_version":"12", "encryption_at_rest":true}'

To see whether your Postgres 2.0 Instance is encrypted-at-rest and what is the DB Instance’s maintenance-window, please see the section “Credentials” at the following link.

https://www.ge.com/digital/documentation/predix-platforms/postgres-service.html#ariaid-title3
Posted Mar 30, 2021 - 11:23 PDT