Setup using HashiCorp Vault KMIP Secrets Engine
This topic describes how to setup encryption using HashiCorp Vault KMIP Secrets Engine as the RKM key server.
Requirements:
The following requirements must be met on every
IBM
Storage Scale node that participates in encryption:
- The node must have direct network access to the system where the key server is installed.
- The security-sensitive files that are created during the configuration process must have the
following
characteristics:The
security-sensitive files include the following files:
- The RKM.conf file. For more information about this file, see The RKM.conf file and the RKM stanza.
- The files in the client keystore directory, which include the keystore file, the public and
private key files for the client, and possibly other files. For more information about these files,
see The client keystore directory and its files.Note: In the simplified setup, the mmkeyserv command automatically creates and distributes the RKM.conf files and the files in the client keystore directory to every node in the cluster. The files are located in the following directory on each node:
/var/mmfs/ssl/keyServ
- Client keystore files must be record-locked when the GPFS daemon starts. If the keystore files are stored on an NFS mount, the encryption initialization process can hang. The cause is a bug that affects the way NFS handles record locking. If you encounter this problem, upgrade your version of NFS or store your keystore file on a local file system. If an upgrade is not possible and no local file system is available, use a RAM drive to store the keystore files.
See the following subtopics for instructions:
Part 1: Installing and configuring Vault KMIP Secrets Engine
Follow the below links to install and configure HashiCorp Vault KMIP Secrets Engine:
Part 2: Configuring IBM Storage Scale cluster to use HashiCorp Vault KMIP Secrets Engine for encryption
Gather the following information:
- The Vault Enterprise key server hostname.
- Create and save a temporarily authentication token in a file with owner only read permission.
The following table provides a high-level overview of the configuration process. The steps
in the table correspond to the steps in the procedure that begins immediately after the table.
Step | Actions |
---|---|
1 | Verify the direct network connection between the IBM Storage Scale node and the RKM server. |
2 | Add the RKM key server to the configuration. |
3 | Create a new role from a scope on the RKM server. |
4 | Register the role created in the previous step. |
5 | Create a master encryption key for the role. |
6 | Set up an encryption policy in the node. |
7 | Test the encryption policy. |