Secret key management and password protection
Faspex 5.0.8 and later uses secret keys and provides the option to set a password during the installation.
CAUTION:
This optional password is of high importance, if lost or forgotten there is no
way to recover it. Without this password you will not be able to upgrade Faspex, back up your
database, nor perform any of the maintenance operations listed in this section. You will have to
perform a fresh installation of Faspex 5.
During the installation you will be prompted with the following
question:
Would you like to use an optional password? Y/N (default to N)
If you choose to use a password (answer Y
), you will require it for maintenance
operations.
Attention: For Faspex 5.0.8 to 5.0.12 and later, when using passphrase encryption
Faspex 5 will not start automatically after a system reboot. This can lead to downtime if the system
unexpectedly restarts. If you choose not to use passphrase encryption, you can configure Faspex to
persist across reboots by enabling its
service:
systemctl enable faspexctl.service
Ensuring Faspex persists after a reboot
Backing up secret files
After creating new secrets using faspexctl create_keys, Faspex will automatically create backups of your secret files in the /opt/aspera/faspex/conf/backup_secrets directory.
You can also manually create your own backups of
/opt/aspera/faspex/conf/secrets
and
/opt/aspera/faspex/conf/secrets/keys
, after successfully setting up your Faspex
machines using faspexctl setup
and opting to use a password.
You will need the password for other operations such as:
Command | Description |
---|---|
faspexctl setup |
Faspex setup |
faspexctl restart |
Restart Faspex containers |
faspexctl unseal_secrets |
Unseal secrets |
faspexctl seal_secrets |
Encrypt secrets |
faspexctl exec |
Execute commands in containers (including backing up and restoring the database) |
faspexctl create_keys |
Create keys |
rpm -e ibm-aspera-faspex.*.rpm |
Uninstall Faspex |
rpm -Uvh ibm-aspera-faspex.*.rpm |
Upgrade Faspex |