You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/installation-special-config-storage.adoc
+48-16Lines changed: 48 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,8 +54,10 @@ You can also configure the TPM v2 and Tang encryption modes simultaneously.
54
54
This enables boot disk data decryption only if the TPM secure cryptoprocessor is present and the Tang servers are accessible over a secure network.
55
55
56
56
You can use the `threshold` attribute in your Butane configuration to define the minimum number of TPM v2 and Tang encryption conditions required for decryption to occur.
57
-
The threshold is met when the stated value is reached through any combination of the declared conditions.
58
-
For example, the `threshold` value of `2` in the following configuration can be reached by accessing the two Tang servers, or by accessing the TPM secure cryptoprocessor and one of the Tang servers:
57
+
58
+
The threshold is met when the stated value is reached through any combination of the declared conditions. In the case of offline provisioning, the offline server is accessed using an included advertisement, and only uses that supplied advertisement if the number of online servers do not meet the set threshold.
59
+
60
+
For example, the `threshold` value of `2` in the following configuration can be reached by accessing two Tang servers, with the offline server available as a backup, or by accessing the TPM secure cryptoprocessor and one of the Tang servers:
<1> Set this field to the instruction set architecture of the cluster nodes.
84
89
Some examples include, `x86_64`, `aarch64`, or `ppc64le`.
85
90
<2> Include this field if you want to use a Trusted Platform Module (TPM) to encrypt the root file system.
86
91
<3> Include this section if you want to use one or more Tang servers.
87
-
<4> Specify the minimum number of TPM v2 and Tang encryption conditions required for decryption to occur.
92
+
<4> Optional: Include this field for offline provisioning. Ignition will provision the Tang server binding rather than fetching the advertisement from the server at runtime. This lets the server be unavailable at provisioning time.
93
+
<5> Specify the minimum number of TPM v2 and Tang encryption conditions required for decryption to occur.
88
94
89
95
[IMPORTANT]
90
96
====
@@ -151,11 +157,11 @@ $ sudo yum install clevis
151
157
----
152
158
153
159
.. On the {op-system-base} 8 machine, run the following command to generate a thumbprint of the exchange key.
154
-
Replace `\http://tang.example.com:7500` with the URL of your Tang server:
160
+
Replace `\http://tang1.example.com:7500` with the URL of your Tang server:
<1> In this example, `tangd.socket` is listening on port `7500` on the Tang server.
161
167
+
@@ -184,6 +190,28 @@ Some other distributions provide Clevis version 17 or later, which use the SHA-2
184
190
You must use a Clevis version that uses SHA-1 to create the thumbprint, to prevent Clevis binding issues when you install {op-system-first} on your {product-title} cluster nodes.
185
191
====
186
192
193
+
.. Optional: For offline Tang provisioning:
194
+
195
+
... Obtain the advertisement from the server using the `curl` command. Replace `\http://tang2.example.com:7500` with the URL of your Tang server:
.. If the nodes are configured with static IP addressing, run `coreos-installer iso customize --dest-karg-append` or use the `coreos-installer` `--append-karg` option when installing {op-system} nodes to set the IP address of the installed system.
188
216
Append the `ip=` and other arguments needed for your network.
<1> For control plane configurations, replace `worker` with `master` in both of these locations.
@@ -240,13 +271,14 @@ For more details, see "About disk encryption".
240
271
<6> Specify the URL of a Tang server.
241
272
In this example, `tangd.socket` is listening on port `7500` on the Tang server.
242
273
<7> Specify the exchange key thumbprint, which was generated in a preceding step.
243
-
<8> Specify the minimum number of TPM v2 and Tang encryption conditions that must be met for decryption to occur.
274
+
<8> Optional: Specify the advertisement for your offline Tang server in valid JSON format.
275
+
<9> Specify the minimum number of TPM v2 and Tang encryption conditions that must be met for decryption to occur.
244
276
The default value is `1`.
245
277
For more information about this topic, see "Configuring an encryption threshold".
246
-
<9> Include this section if you want to mirror the boot disk.
278
+
<10> Include this section if you want to mirror the boot disk.
247
279
For more details, see "About disk mirroring".
248
-
<10> List all disk devices that should be included in the boot disk mirror, including the disk that {op-system} will be installed onto.
249
-
<11> Include this directive to enable FIPS mode on your cluster.
280
+
<11> List all disk devices that should be included in the boot disk mirror, including the disk that {op-system} will be installed onto.
281
+
<12> Include this directive to enable FIPS mode on your cluster.
250
282
+
251
283
[IMPORTANT]
252
284
====
@@ -451,4 +483,4 @@ In the example output, the `/boot` file system is mounted on the `/dev/md126` so
451
483
[role="_additional-resources"]
452
484
.Additional resources
453
485
454
-
* For more information about the TPM v2 and Tang encryption modes, see link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/security_hardening/configuring-automated-unlocking-of-encrypted-volumes-using-policy-based-decryption_security-hardening[Configuring automated unlocking of encrypted volumes using policy-based decryption].
486
+
* For more information about the TPM v2 and Tang encryption modes, see link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/security_hardening/configuring-automated-unlocking-of-encrypted-volumes-using-policy-based-decryption_security-hardening[Configuring automated unlocking of encrypted volumes using policy-based decryption].
0 commit comments