Accessing an encrypted remote file system using keys from Vault KMIP Secrets Engine
See an example of how to access an encrypted file in a remote cluster.
This topic shows how to configure a cluster so that it can mount an encrypted file system that is
in another cluster. In the examples in this topic, the encrypted file system is fs1
and its cluster is
. The cluster that mounts the encrypted
file system is Cluster1
Cluster2
.
The examples assume that Cluster1
and fs1
are the cluster and
file system that you configured in the topic Setup using HashiCorp Vault KMIP Secrets Engine. You configured Cluster1
for encryption and you created a policy that caused all the files in fs1
be
encrypted.
To configure
Cluster2
with remote access to an encrypted file in
Cluster1
, you must configure Cluster2
for encryption in much the
same way that Cluster1
was configured. As the following table shows,
Cluster2
must add the same key server, create role in the same scope name and
register the role using the same RKM stanza name.Note: In the third column of the table, items in
square brackets are connected or added during this topic. The fourth column shows the step in which
each item in the third column is added.
Item | Cluster1 |
Cluster2 |
Steps |
---|---|---|---|
File systems | fs1 |
[fs1_remote ] |
Step 1 |
Connected to key server | tru-4pub.fyre.ibm.com |
[tru-4pub.fyre.ibm.com ] |
Step 2 |
Scope name |
spectrumscale (default) |
[spectrumscale
](default) |
Step 3 |
Created role | gpfsAdmin |
[gpfsAdminRemote ] |
Step 4 |
Registered the role to RKM stanza | gpfsAdmin to
gpfsRKMstanza |
[gpfsAdminRemote to
gpfsRKMstanza ] |
Step 4 |
Has access to master encryption keys | gpfsAdmin role in
spectrumscale scope |
[gpfsAdmin role in
spectrumscale ] |
Step 4 |
Has access to encrypted file | Local access to testFile
file in fs1 file system |
[Remote access to file
testFile in file system fs1 ] |
Step 5 |
The encrypted file testFile is in fs1
on
Cluster1
. To configure Cluster2
to have remote access to file
testFile, follow the below steps:
You can now access encrypted files on fs1_remote from
Cluster2
.