(Other Schedulers) Encrypt Portworx Volumes using Vault
You can use one of the following methods to encrypt Portworx volumes with Google Cloud KMS, depending on how you provide the secret password to Portworx:
Encrypt volumes using named secrets
-
Create an encrypted volume by entering the
pxctl volume createcommand with the following parameters:--secure--secret_keywith the name of your named secret (this example useskey1)- the name of the encrypted volume (this example uses
enc_vol)
pxctl volume create --secure --secret_key key1 enc_volEncrypted volume successfully created: 374663852714325215With Portworx, you can create two types of encrypted volumes:
- Encrypted Volumes. You can access a regular volume from a single node.
If you are using Vault Namespaces, and your secret key
key1resides in a namespace calledns1then use the following command to create an encrypted volume.pxctl volume create --secure --secret_key key1 --secret_options=vault-namespace=ns1 enc_volEncrypted volume successfully created: 374663852714325215-
Shared Encrypted Volumes. You can access an encrypted sharedv4 volume from multiple nodes.
To create a shared encrypted volume, you must specify the
--sharedv4parameter as follows:pxctl volume create --sharedv4 --secret_key key1 --secure enc_shared_volEncrypted Shared volume successfully created: 77957787758406722
Docker users:
Use the following command to create an encrypted volume named
enc_vol:docker volume create --volume-driver pxd secret_key=key1,name=enc_volTo create an encrypted sharedv4 volume using a specific secret through docker, you must specify the
-sharedv4=trueoption.Example:
docker volume create --volume-driver pxd sharedv4=true,secret_key=key1,name=enc_shared_vol -
You can use the
pxctl volume listcommand to list your volumes:pxctl volume listID NAME SIZE HA SHARED ENCRYPTED IO_PRIORITY SCALE STATUS
822124500500459627 enc_volume 10 GiB 1 no yes LOW 1 up - detached -
Attach your volume by entering the
pxctl host attachcommand with the following arguments:- The name of your encrypted volume (this example uses
enc_vol) - The
--secret-keyflag with thedefaultvaule
pxctl host attach enc_vol --secret_key defaultVolume successfully attached at: /dev/mapper/pxd-enc822124500500459627 - The name of your encrypted volume (this example uses
-
Mount the volume by entering the
pxctl host mountcommand with the following parameters:- The name of your encrypted volume (this example uses
enc_vol) - The mount point (this example uses
mnt)
pxctl host mount enc_vol /mntVolume enc_vol successfully mounted at /mntDocker users:
The following example command attaches and mounts an encrypted volume:
docker run --rm -it -v secure=true,secret_key=key1,name=enc_vol:/mnt busybox - The name of your encrypted volume (this example uses
Encrypt volumes using a cluster-wide secret
A cluster wide secret key is a common key that can be used to encrypt all your volumes. This common key needs to be pre-created in Vault. Portworx will use this cluster-wide secret as a passphrase to encrypt your volume.
- Set the cluster-wide secret key. Enter the following
pxctl secrets set-cluster-keycommand specifying the--secretparameter with the secret name you created in Vault (this example usesmysecret):
pxctl secrets set-cluster-key --secret mysecret
Successfully set cluster secret key!
You must set the cluster-wide secret only once. If you overwrite the cluster-wide secret, the volumes encrypted with the old secret will become unusable.
If you are using Vault Namespaces use the following command to set the cluster-wide secret key in a specific vault namespace (this example uses ns1 as the vault namespace)
pxctl secrets set-cluster-key --secret_options=vault-namespace=ns1 --secret mysecret
- Create a new encrypted volume. Enter the
pxctl volume createcommand, specifying the following arguments:
-
--secure -
The size of your encrypted volume (this example use
10GiB) -
The name of the encrypted volume (this example uses
enc_vol)pxctl volume create --secure --size 10 enc_volVolume successfully created: 822124500500459627With Portworx, you can create two types of encrypted volumes:
- Encrypted Volumes. You can access a regular volume from a single node.
- Shared Encrypted Volumes. You can access an encrypted sharedv4 volume from multiple nodes.
To create a shared encrypted volume, you must specify the
--sharedv4parameter as follows:pxctl volume create --sharedv4 --secure --size 10 enc_volEncrypted Shared volume successfully created: 77957787758406722
-
You can use the
pxctl volume listcommand to list your volumes:pxctl volume listID NAME SIZE HA SHARED ENCRYPTED IO_PRIORITY SCALE STATUS
822124500500459627 enc_vol 10 GiB 1 no yes LOW 1 up - detached -
Attach your volume by entering the
pxctl host attachcommand with the following arguments:- The name of your encrypted volume (this example uses
enc_vol) - The
--secret-keyflag with thedefaultvaule
pxctl host attach enc_vol --secret_key defaultVolume successfully attached at: /dev/mapper/pxd-enc822124500500459627 - The name of your encrypted volume (this example uses
-
Mount the volume by entering the
pxctl host mountcommand with the following parameters:- The name of your encrypted volume (this example uses
enc_vol) - The mount point (this example uses
mnt)
pxctl host mount enc_vol /mntVolume enc_vol successfully mounted at /mnt - The name of your encrypted volume (this example uses