Skip to content

Commit 5446d90

Browse files
committed
Proofreading
1 parent f8cf853 commit 5446d90

File tree

1 file changed

+43
-45
lines changed

1 file changed

+43
-45
lines changed

pages/platform/logs-data-platform/cold_storage_encryption/guide.en-asia.md

Lines changed: 43 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -4,32 +4,32 @@ slug: cold-storage-encryption
44
order: 5
55
excerpt: Secure your Cold Stored logs by encrypting them with your PGP public key
66
section: Features
7-
updated: 2023-03-07
7+
updated: 2023-03-10
88
---
99

10-
**Last updated 7th March, 2023**
10+
**Last updated 10th March, 2023**
1111

1212
## Objective
1313

14-
With the [Cold Storage feature](../cold-storage){.ref} you can generate daily archives for your log streams.
14+
With the [Cold Storage feature](../cold-storage) you can generate daily archives for your log streams.
1515

16-
On top of that you can secure these archives by encrypting them with one or more of your PGP public keys. Only the owner of the private keys will be able to decrypt and see the archives content.
16+
On top of that, you can secure these archives by encrypting them with one or more of your PGP public keys. Only the owner of the private keys will be able to decrypt and see the archives content.
1717

1818
## Requirements
1919

20-
This is what you need to get you started:
20+
This is what you need to get started:
2121

22-
- A stream with cold storage enabled. You can follow this [Cold Storage tutorial](../cold-storage){.ref} to set it up
23-
- An existing PGP keypair, or a machine with the `gpg` binary to generate a new PGP keypair
22+
- A stream with cold storage enabled. You can follow this [Cold Storage tutorial](../cold-storage) to set it up.
23+
- An existing PGP keypair, or a machine with the `gpg` binary to generate a new PGP keypair.
2424

2525
## Instructions
2626

2727
### Get a PGP public key
2828

29-
First of all, you need a PGP keypair. You can use an existing keypair or create a new one. Both cases are documented bellow.
29+
First of all, you need a PGP keypair. You can use an existing keypair or create a new one. Both cases are documented below.
3030
The only restrictions we impose regarding this keypair are:
3131

32-
- use RSA 4096 or ECC with Curve 25519 as public key algorithms
32+
- using RSA 4096 or ECC with Curve 25519 as public key algorithms
3333
- the key must not have any expiration date
3434

3535
> [!warning]
@@ -48,7 +48,7 @@ $ gpg --list-secret-keys
4848
-----------------------
4949
sec ed25519 2023-03-07 [SC]
5050
448940C5335D1D278788F4AF67336C97696A1BE0
51-
uid [ultimate] John Doe <john@doe.org>
51+
uid [ultimate] John Doe <john@smith.org>
5252
ssb cv25519 2023-03-07 [E]
5353
5454
sec rsa3072 2023-03-07 [SC] [expires: 2025-03-06]
@@ -59,15 +59,15 @@ ssb rsa3072 2023-03-07 [E] [expires: 2025-03-06]
5959

6060
We have two keypairs here:
6161

62-
- One for `John Doe <john@doe.org>`, which fingerprint is `448940C5335D1D278788F4AF67336C97696A1BE0`, which is an EdDSA/ECDH key (`ed25519`/`cv25519`), and which don't have any expiration date
62+
- One for `John Smith <john@smith.org>`, which fingerprint is `448940C5335D1D278788F4AF67336C97696A1BE0`, which is an EdDSA/ECDH key (`ed25519`/`cv25519`), and which doesn't have any expiration date
6363
- **This key is usable for Cold Storage Encryption**
6464
- One for `Robert Dupont <[email protected]>`, which fingerprint is `A742F6D3566178F008066E252BE29904DDDA4BA1`, which is an RSA 3072 key, and which expires on `2025-03-06`
6565
- **This key is NOT usable for Cold Storage Encryption**, as it uses RSA < 4096 and has an expiration date
6666

67-
Once you identified a key which match our restrictions, you can export the **public** key in an ASCII armored format with the following command, using its fingerprint:
67+
Once you identified a key which matches our restrictions, you can export the **public** key in an ASCII armored format with the following command, using its fingerprint:
6868

6969
```shell-session
70-
# Replace the fingerprint bellow with the one of your key
70+
# Replace the fingerprint below with the one of your key
7171
$ gpg --armor --export 448940C5335D1D278788F4AF67336C97696A1BE0
7272
-----BEGIN PGP PUBLIC KEY BLOCK-----
7373
@@ -84,7 +84,7 @@ JX2+PZIPN0uhQdsvvF52tQFhags=
8484
-----END PGP PUBLIC KEY BLOCK-----
8585
```
8686

87-
If none of your existing keypairs are compatible, simply generate a new one as explained bellow.
87+
If none of your existing keypairs are compatible, simply generate a new one as explained below.
8888

8989
#### Generate a new PGP public key
9090

@@ -129,13 +129,13 @@ Please select which elliptic curve you want:
129129
Your selection? 1
130130
131131
Please specify how long the key should be valid.
132-
0 = key does not expire
132+
0 = key smiths not expire
133133
<n> = key expires in n days
134134
<n>w = key expires in n weeks
135135
<n>m = key expires in n months
136136
<n>y = key expires in n years
137137
Key is valid for? (0) 0
138-
Key does not expire at all
138+
Key smiths not expire at all
139139
140140
Is this correct? (y/N) y
141141
@@ -168,16 +168,14 @@ sub cv25519 2023-03-07 [E]
168168

169169
> [!primary]
170170
>
171-
> When you are prompted to choose a passphrase,
172-
> it's up to you to pick one or to leave it empty for no passphrase.
173-
> If you choose to use a passphrase, be sure to store it in some password manager,
174-
> it will be needed to decrypt your archives.
171+
> When you are prompted to choose a passphrase, it's up to you to pick one or to leave it empty for no passphrase.
172+
> If you choose to use a passphrase, be sure to store it in a password manager, it will be needed to decrypt your archives.
175173
>
176174
177175
Congratulations, your key is now generated. You can now export the **public** key in an ASCII armored format with the following command:
178176

179177
```shell-session
180-
# Replace the fingerprint bellow with the one outputed at the end of your key generation
178+
# Replace the fingerprint below with the one from the output at the end of your key generation
181179
$ gpg --armor --export E9136DAF94BD3D708C855124A7109E653C115379
182180
-----BEGIN PGP PUBLIC KEY BLOCK-----
183181
@@ -196,57 +194,56 @@ aMinMlgU3tTxxr1HuldFrFXKcNxfsgdsWNtCBA==
196194

197195
### Register your PGP public key in your Logs Data Platform account
198196

199-
In the home page of your Logs Data Platform service, in the bottom left you will find a `Configuration` panel. In this panel, in the `PGP encryption keys` line, click on **"..."** and then `Edit`{.action}:
197+
In the home page of your Logs Data Platform service, in the bottom left you will find a `Configuration` panel. In this panel, in the `PGP encryption keys` line, click the `...`{.action} button and then `Edit`{.action}:
200198

201199
![Home page](images/home.png){.thumbnail}
202200

203201
You will land on the `PGP encryption keys` page, where you can manage your keys.
204202
It is from this page that you can add, delete, or view the details of your PGP encryption keys. You can also view there how many archives have been encrypted with a given key.
205203

206-
You will possibly view some keys named `LDP Recovery key <cluster name>`, that you did not add yourself. We will talk about these LDP Recovery keys later.
204+
You will possibly view some keys named `LDP Recovery key <cluster name>`, that you did not add yourself. We will mention these LDP Recovery keys later in this documentation.
207205

208206
![PGP keys home page](images/pgp_home.png){.thumbnail}
209207

210-
To register your PGP public key to your Logs Data Platform account, click on the `Add a PGP encryption key`{.action} button.
211-
You will land on a form where you have three fields to fill:
208+
To register your PGP public key into your Logs Data Platform account, click on the `Add a PGP encryption key`{.action} button.
209+
You will land on a form in which you have three fields to fill in:
212210

213-
- **Name**: it is the display name of this PGP public key inside OVHcloud systems. It can be the same as your PGP key UID (usualy `First name Last name <email>`), but it can also be something totaly different. As it's only a display name, put whatever is relevant for you
214-
- **Fingerprint**: your PGP key fingerprint, in its 40 characters hexadecimal version. In the example above where we generated a new key, it is `E9136DAF94BD3D708C855124A7109E653C115379`
215-
- **Content**: the ASCII armored content of your PGP **public** key. Copy paste here the full block beginning with `-----BEGIN PGP PUBLIC KEY BLOCK-----` and ending by `-----END PGP PUBLIC KEY BLOCK-----`
211+
- **Name**: it is the display name of this PGP public key inside OVHcloud systems. It can be the same as your PGP key UID (usually `First name Last name <email>`), but it can also be something totally different. As it's only a display name, enter whatever is relevant for you.
212+
- **Fingerprint**: your PGP key fingerprint, in its 40 characters hexadecimal version. In the example above in which we generated a new key, it is `E9136DAF94BD3D708C855124A7109E653C115379`.
213+
- **Content**: the ASCII armored content of your PGP **public** key. Copy paste here the full block beginning with `-----BEGIN PGP PUBLIC KEY BLOCK-----` and ending by `-----END PGP PUBLIC KEY BLOCK-----`.
216214

217-
Even if the fingerprint can be deducted from the PGP public key content, we want you to specify both so we are 100% sure you are adding the correct key.
215+
Even if the fingerprint can be deducted from the PGP public key content, we want you to specify both so that we are 100% sure you are adding the correct key.
218216

219217
![Add a new PGP key](images/add_key.png){.thumbnail}
220218

221-
Then click on `Save`{.action}.
219+
Then click `Save`{.action}.
222220

223-
If anything is wrong with your public key (unsuported algorithm, mismatch between fingerprint & key content, etc.) a precise error will be printed.
221+
If anything is wrong with your public key (unsupported algorithm, mismatch between fingerprint & key content, etc.) an explicit error message will be printed.
224222

225223
### Update your stream Cold Storage configuration to use encryption
226224

227225
Now that you added your PGP public key to your Logs Data Platform account, you can use it in your streams cold storage configurations.
228226

229-
For this, go to the `Data Stream` tab, pick the stream for which you want cold storage encryption, click on **"..."** and then `Edit`{.action}.
227+
For this, go to the `Data Stream` tab, pick the stream for which you want cold storage encryption, click the `...`{.action} button and then click`Edit`{.action}.
230228

231-
- Ensure the `Enable long-term storage` option is checked. You can refer to the [Cold Storage feature](../cold-storage){.ref} documentation to know about each of its fields.
229+
- Ensure the `Enable long-term storage` option is checked. You can refer to the [Cold Storage feature](../cold-storage) documentation to know about each of its fields.
232230
- Check the `Encrypt archives with my PGP encryption keys` option
233231
- Select each PGP encryption key you want your archive to be encrypted with
234232
- Click on `Save`{.action}
235233

236234
![Update stream configuration](images/update_stream.png){.thumbnail}
237235

238-
That's it: now each archive produced by this stream will be encrypted with the selected keys (don't forget that archives are produced 2 days after logs are sends).
236+
That's it: now each archive produced by this stream will be encrypted with the selected keys (don't forget that archives are produced 2 days after logs are sent).
239237

240238
> [!primary]
241239
>
242-
> For a given stream, you can select up to five of your encryption keys
243-
> (the LDP Recovery Keys are not included in this five keys).
244-
> A given encryption key can be used in several coldstorage configurations.
240+
> For a given stream, you can select up to five of your encryption keys (the LDP Recovery Keys are not included in this five keys).
241+
> A given encryption key can be used in several cold storage configurations.
245242
>
246243
247244
### Know which key was used to encrypt which archive
248245

249-
In the `Data Stream` tab, you can see how many archives exist for each stream. On a stream where you have some archives, click on **"..."** and then `Archives`{.action}
246+
In the `Data Stream` tab, you can see how many archives exist for each stream. On a stream on which you have some archives, click the`...`{.action} button and then click `Archives`{.action}.
250247

251248
![List archives](images/archives.png){.thumbnail}
252249

@@ -258,15 +255,15 @@ In this archives list, you can see a `PGP encryption keys` column.
258255
#### Download and decrypt your archives
259256

260257
Once your encrypted archives are available, you can retrieve them [following this tutorial](../cold-storage/#retrieving-the-archives).
261-
To decrypt a given archive, you can use `gpg` on a machine where your private key is present:
258+
To decrypt a given archive, you can use `gpg` on a machine on which your private key is present:
262259

263260
```shell-session
264261
$ ls
265262
2022-11-15.zst.pgp
266263
267264
$ gpg --output 2022-11-15.zst --decrypt 2022-11-15.zst.pgp
268265
gpg: encrypted with 4096-bit RSA key, ID 97B70793B8270D80, created 2022-05-10
269-
"John Doe <john.doe@corp.acme.org>"
266+
"John Doe <john.smith@corp.acme.org>"
270267
271268
$ ls
272269
2022-11-15.zst 2022-11-15.zst.pgp
@@ -275,21 +272,22 @@ $ ls
275272
### The LDP Recovery Key
276273

277274
Now your stream's archives are encrypted with your PGP public keys, and only the owner of the related private keys can decrypt the archives.
275+
278276
But what if you lose access to your private keys or to your passphrase ? In such a case, you won't be able to decrypt your archives anymore, and won't be able to see the archives content.
279277

280-
To avoid such a situation, we provide the `LDP Recovery Keys`. These are also PGP public keys you can use in your coldstorage configuration, but which private keys are owned by OVHcloud. Thus if you choosed to use `LDP Recovery Keys` in addition to your own keys, and you lose access to your private keys, OVHcloud teams will still be able to decrypt your archives; re-encrypt it with your new keys; and send you these re-encrypted archives.
278+
To avoid such a situation, we provide the `LDP Recovery Keys`. These are also PGP public keys you can use in your cold storage configuration, but which private keys are owned by OVHcloud. Thus if you chose to use `LDP Recovery Keys` in addition to your own keys, and you lose access to your private keys, OVHcloud teams will still be able to decrypt your archives, re-encrypt it with your new keys and send you these re-encrypted archives.
281279

282-
Note that this feature is opt-in: you have to explicitly select the `LDP Recovery Key` in your stream's coldstorage configuration to benefit from this feature.
280+
Note that this feature is opt-in: you have to explicitly select the `LDP Recovery Key` in your stream's cold storage configuration to benefit from this feature.
283281

284282
#### Ask OVHcloud to recover your encrypted archive
285283

286-
If the situation described above happens (you lost your private key, but your archive is also encrypted with the `LDP Recovery Key`), you will have to [contact OVHcloud support](https://www.ovhcloud.com/en/contact/). Open a ticket and describe precisely the name of your Logs Data Platform service, the name of the stream and the name of the archive. You will also have to provide a new PGP encryption key (a one you already added to your Logs Data Platform account).
284+
If the situation described above happens (you lost your private key, but your archive is also encrypted with the `LDP Recovery Key`), you will have to [contact OVHcloud support](https://www.ovhcloud.com/en/contact/). Open a ticket and describe precisely the name of your Logs Data Platform service, the name of the stream and the name of the archive. You will also have to provide a new PGP encryption key (a key you already added to your Logs Data Platform account).
287285

288286
The Logs Data Platform team will then take care of your request.
289287

290288
## Go further
291289

292-
- Getting Started: [Quick Start](../quick-start){.ref}
293-
- Documentation: [Guides](../){.ref}
290+
- Getting Started: [Quick Start](../quick-start)
291+
- Documentation: [Guides](../)
294292
- Community hub: [https://community.ovh.com](https://community.ovh.com/en/c/Platform/data-platforms){.external}
295293
- Create an account: [Try it!](https://www.ovh.com/en/order/express/#/express/review?products=~(~(planCode~'logs-account~productId~'logs)){.external}

0 commit comments

Comments
 (0)