Longhorn supports encrypted volumes by utilizing the linux kernel module via cryptsetup
for the encryption. Further we use the Kubernetes secret mechanism for key storage, which can be further encrypted and guarded via appropriate permissions. An encrypted volume results in your data being encrypted while in transit as well as at rest, this also means that any backups taken from that volume are also encrypted.
Requirements
To be able to use encrypted volumes, you will need to have the dm_crypt
kernel module loaded and cryptsetup
installed on your worker nodes.
Setting up Kubernetes Secrets
Volume encryption utilizes Kubernetes secrets for encryption key storage. To configure the secret that will be used for an encrypted volume, you will need to specify the secret as part of the parameters of a storage class. This mechanism is provided by Kubernetes and allows the usage of some template parameters that will be resolved as part of volume creation.
Example secret your encryption keys are specified as part of the CRYPTO_KEY_VALUE
parameter. We use stringData
as type here so we don’t have to base64 encoded before submitting the secret via kubectl create
.
Besides , parameters CRYPTO_KEY_CIPHER
, CRYPTO_KEY_HASH
, CRYPTO_KEY_SIZE
, and CRYPTO_PBKDF
provide the customization for volume encryption.
CRYPTO_KEY_CIPHER
: Sets the cipher specification algorithm string. The default value isaes-xts-plain64
for LUKS.CRYPTO_KEY_SIZE
: Sets the key size in bits and it must be a multiple of 8. The default value is256
.CRYPTO_PBKDF
: Sets Password-Based Key Derivation Function (PBKDF) algorithm for LUKS keyslot. The default value isargon2i
.
For more details, you can see the Linux manual page - crypsetup(8)
Example storage class (per volume key)
Using an encrypted volume
To create an encrypted volume, you just create a PVC utilizing a storage class that has been configured for encryption. The above storage class examples can be used as a starting point.
After creation of the PVC it will remain in state till the associated secret has been created and can be retrieved by the csi external-provisioner
sidecar. Afterwards the regular volume creation flow will take over and the encryption will be transparently used so no additional actions are needed from the user.
Filesystem expansion
History
Available since v1.2.0 #1859