Skip to content

Commit bd5f76e

Browse files
authored
Merge pull request #69250 from mjpytlak/osdocs-8828
OSDOCS#8828: User-managed encryption (BYOK) for IBM Cloud
2 parents f039841 + fe94900 commit bd5f76e

File tree

3 files changed

+76
-0
lines changed

3 files changed

+76
-0
lines changed

_topic_maps/_topic_map.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -287,6 +287,8 @@ Topics:
287287
File: installing-ibm-cloud-account
288288
- Name: Configuring IAM for IBM Cloud
289289
File: configuring-iam-ibm-cloud
290+
- Name: User-managed encryption
291+
File: user-managed-encryption-ibm-cloud
290292
- Name: Installing a cluster on IBM Cloud with customizations
291293
File: installing-ibm-cloud-customizations
292294
- Name: Installing a cluster on IBM Cloud with network customizations
Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
:_mod-docs-content-type: ASSEMBLY
2+
[id="user-managed-encryption-ibm-cloud"]
3+
= User-managed encryption for {ibm-cloud-title}
4+
include::_attributes/common-attributes.adoc[]
5+
:context: user-managed-encryption-ibm-cloud
6+
7+
toc::[]
8+
9+
By default, provider-managed encryption is used to secure the following when you deploy an {product-title} cluster:
10+
11+
* The root (boot) volume of control plane and compute machines
12+
* Persistent volumes (data volumes) that are provisioned after the cluster is deployed
13+
14+
You can override the default behavior by specifying an {ibm-name} Key Protect for {ibm-cloud-name} (Key Protect) or {ibm-name} Hyper Protect Crypto Services (Hyper Protect Crypto Services) root key as part of the installation process.
15+
16+
When you bring our own root key, you modify the installation configuration file (`install-config.yaml`) to specify the Cloud Resource Name (CRN) of the root key by using the `encryptionKey` parameter.
17+
18+
You can specify that:
19+
20+
* The same root key be used be used for all cluster machines. You do so by specifying the key as part of the cluster's default machine configuration.
21+
+
22+
When specified as part of the default machine configuration, all managed storage classes are updated with this key. As such, data volumes that are provisioned after the installation are also encrypted using this key.
23+
24+
* Separate root keys be used for the control plane and compute machine pools.
25+
26+
For more information about the `encryptionKey` parameter, see xref:../../installing/installing_ibm_cloud_public/installation-config-parameters-ibm-cloud-vpc.adoc#installation-configuration-parameters-additional-ibm-cloud_installation-config-parameters-ibm-cloud-vpc[Additional IBM Cloud configuration parameters].
27+
28+
[NOTE]
29+
====
30+
Be sure you have integrated Key Protect or Hyper Protect Crypto Services with your IBM Cloud Block Storage service. For more information, see the Key Protect link:https://cloud.ibm.com/docs/key-protect?topic=key-protect-integrate-services#grant-access[documentation] or Hyper Protect Crypto Services link:https://cloud.ibm.com/docs/hs-crypto?topic=hs-crypto-integrate-services[documentation].
31+
====
32+
33+
34+
[id="user-managed-encryption-ibm-cloud-next-steps"]
35+
== Next steps
36+
37+
Install an {product-title} cluster:
38+
39+
* xref:../../installing/installing_ibm_cloud_public/installing-ibm-cloud-customizations.adoc#installing-ibm-cloud-customizations[Installing a cluster on {ibm-cloud-title} with customizations]
40+
* xref:../../installing/installing_ibm_cloud_public/installing-ibm-cloud-network-customizations.adoc#installing-ibm-cloud-network-customizations[Installing a cluster on {ibm-cloud-title} with network customizations]
41+
* xref:../../installing/installing_ibm_cloud_public/installing-ibm-cloud-vpc.adoc#installing-ibm-cloud-vpc[Installing a cluster on {ibm-cloud-title} into an existing VPC]
42+
* xref:../../installing/installing_ibm_cloud_public/installing-ibm-cloud-private.adoc#installing-ibm-cloud-private[Installing a private cluster on {ibm-cloud-title}]

modules/installation-configuration-parameters.adoc

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2273,6 +2273,38 @@ Additional {ibm-cloud-name} configuration parameters are described in the follow
22732273
|====
22742274
|Parameter|Description|Values
22752275

2276+
|controlPlane:
2277+
platform:
2278+
ibmcloud:
2279+
bootVolume:
2280+
encryptionKey:
2281+
|An {ibm-name} Key Protect for {ibm-cloud-name} (Key Protect) or {ibm-name} Hyper Protect Crypto Services (Hyper Protect Crypto Services) root key that should be used to encrypt the root (boot) volume of only control plane machines.
2282+
d|The Cloud Resource Name (CRN) of the root key.
2283+
2284+
The CRN must be enclosed in quotes ("").
2285+
2286+
|compute:
2287+
platform:
2288+
ibmcloud:
2289+
bootVolume:
2290+
encryptionKey:
2291+
|A Key Protect or Hyper Protect Crypto Services root key that should be used to encrypt the root (boot) volume of only compute machines.
2292+
d|The CRN of the root key.
2293+
2294+
The CRN must be enclosed in quotes ("").
2295+
2296+
|platform:
2297+
ibmcloud:
2298+
defaultMachinePlatform:
2299+
bootvolume:
2300+
encryptionKey:
2301+
d|A Key Protect or Hyper Protect Crypto Services root key that should be used to encrypt the root (boot) volume of all of the cluster's machines.
2302+
2303+
When specified as part of the default machine configuration, all managed storage classes are updated with this key. As such, data volumes that are provisioned after the installation are also encrypted using this key.
2304+
d|The CRN of the root key.
2305+
2306+
The CRN must be enclosed in quotes ("").
2307+
22762308
|platform:
22772309
ibmcloud:
22782310
resourceGroupName:

0 commit comments

Comments
 (0)