| CPC H04L 9/0894 (2013.01) [G06F 16/2379 (2019.01); G06F 16/27 (2019.01)] | 20 Claims |

|
1. A computer-implemented method comprising:
persisting, in a log file on a first database hosted on a primary server, keys for encrypting and decrypting data persisted at the first database, wherein the keys are managed at a first key store hosted on the primary server, and wherein the log file comprises data for executed database transactions at the first database and key management operations at the first key store; and
in response to triggering a synchronization between the primary server and a secondary server, replaying, at the secondary server, a set of sequential entries of the log file from the first database hosted on the primary server to replicate executions of (i) a transaction of the executed database transactions at a secondary database at the secondary server based on data for an entry at the log file and (ii) a key management operation from the key management operations associated with a key from the keys at the first key store that is persisted in another entry of the one or more entries of the log file on the first database hosted on the primary server.
|