Encrypted VMs are recovered in a similar manner to ordinary VMs; however, the following considerations apply.
(1)The platform does not provide an OpenAPI interface for obtaining the encryption key of encrypted VM. If the backup data is ciphertext, restoring an encrypted VM as a new VM is not supported; otherwise, the VM will fail to boot normally.
(2)When restoring backup plaintext data, the restore must be specified as plaintext; when restoring backup ciphertext data, it must be restored as ciphertext.
(3)If the key fingerprint was backed up together with ciphertext data, the current key fingerprint of the VM must be obtained before restoration:
If the backed-up key fingerprint is inconsistent with the current one, it indicates the encrypted VM has been decrypted or re-encrypted. The backup data will fail to boot after restoration. It is recommended to prompt in the backup software interface that this backup data is not restorable.