You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: pages/platform/logs-data-platform/cold_storage_encryption/guide.en-asia.md
+43-45Lines changed: 43 additions & 45 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,32 +4,32 @@ slug: cold-storage-encryption
4
4
order: 5
5
5
excerpt: Secure your Cold Stored logs by encrypting them with your PGP public key
6
6
section: Features
7
-
updated: 2023-03-07
7
+
updated: 2023-03-10
8
8
---
9
9
10
-
**Last updated 7th March, 2023**
10
+
**Last updated 10th March, 2023**
11
11
12
12
## Objective
13
13
14
-
With the [Cold Storage feature](../cold-storage){.ref} you can generate daily archives for your log streams.
14
+
With the [Cold Storage feature](../cold-storage) you can generate daily archives for your log streams.
15
15
16
-
On top of that you can secure these archives by encrypting them with one or more of your PGP public keys. Only the owner of the private keys will be able to decrypt and see the archives content.
16
+
On top of that, you can secure these archives by encrypting them with one or more of your PGP public keys. Only the owner of the private keys will be able to decrypt and see the archives content.
17
17
18
18
## Requirements
19
19
20
-
This is what you need to get you started:
20
+
This is what you need to get started:
21
21
22
-
- A stream with cold storage enabled. You can follow this [Cold Storage tutorial](../cold-storage){.ref} to set it up
23
-
- An existing PGP keypair, or a machine with the `gpg` binary to generate a new PGP keypair
22
+
- A stream with cold storage enabled. You can follow this [Cold Storage tutorial](../cold-storage) to set it up.
23
+
- An existing PGP keypair, or a machine with the `gpg` binary to generate a new PGP keypair.
24
24
25
25
## Instructions
26
26
27
27
### Get a PGP public key
28
28
29
-
First of all, you need a PGP keypair. You can use an existing keypair or create a new one. Both cases are documented bellow.
29
+
First of all, you need a PGP keypair. You can use an existing keypair or create a new one. Both cases are documented below.
30
30
The only restrictions we impose regarding this keypair are:
31
31
32
-
-use RSA 4096 or ECC with Curve 25519 as public key algorithms
32
+
-using RSA 4096 or ECC with Curve 25519 as public key algorithms
- One for `John Doe <john@doe.org>`, which fingerprint is `448940C5335D1D278788F4AF67336C97696A1BE0`, which is an EdDSA/ECDH key (`ed25519`/`cv25519`), and which don't have any expiration date
62
+
- One for `John Smith <john@smith.org>`, which fingerprint is `448940C5335D1D278788F4AF67336C97696A1BE0`, which is an EdDSA/ECDH key (`ed25519`/`cv25519`), and which doesn't have any expiration date
63
63
-**This key is usable for Cold Storage Encryption**
64
64
- One for `Robert Dupont <[email protected]>`, which fingerprint is `A742F6D3566178F008066E252BE29904DDDA4BA1`, which is an RSA 3072 key, and which expires on `2025-03-06`
65
65
-**This key is NOT usable for Cold Storage Encryption**, as it uses RSA < 4096 and has an expiration date
66
66
67
-
Once you identified a key which match our restrictions, you can export the **public** key in an ASCII armored format with the following command, using its fingerprint:
67
+
Once you identified a key which matches our restrictions, you can export the **public** key in an ASCII armored format with the following command, using its fingerprint:
68
68
69
69
```shell-session
70
-
# Replace the fingerprint bellow with the one of your key
70
+
# Replace the fingerprint below with the one of your key
### Register your PGP public key in your Logs Data Platform account
198
196
199
-
In the home page of your Logs Data Platform service, in the bottom left you will find a `Configuration` panel. In this panel, in the `PGP encryption keys` line, click on **"..."** and then `Edit`{.action}:
197
+
In the home page of your Logs Data Platform service, in the bottom left you will find a `Configuration` panel. In this panel, in the `PGP encryption keys` line, click the `...`{.action} button and then `Edit`{.action}:
200
198
201
199
{.thumbnail}
202
200
203
201
You will land on the `PGP encryption keys` page, where you can manage your keys.
204
202
It is from this page that you can add, delete, or view the details of your PGP encryption keys. You can also view there how many archives have been encrypted with a given key.
205
203
206
-
You will possibly view some keys named `LDP Recovery key <cluster name>`, that you did not add yourself. We will talk about these LDP Recovery keys later.
204
+
You will possibly view some keys named `LDP Recovery key <cluster name>`, that you did not add yourself. We will mention these LDP Recovery keys later in this documentation.
207
205
208
206
{.thumbnail}
209
207
210
-
To register your PGP public key to your Logs Data Platform account, click on the `Add a PGP encryption key`{.action} button.
211
-
You will land on a form where you have three fields to fill:
208
+
To register your PGP public key into your Logs Data Platform account, click on the `Add a PGP encryption key`{.action} button.
209
+
You will land on a form in which you have three fields to fill in:
212
210
213
-
-**Name**: it is the display name of this PGP public key inside OVHcloud systems. It can be the same as your PGP key UID (usualy`First name Last name <email>`), but it can also be something totaly different. As it's only a display name, put whatever is relevant for you
214
-
-**Fingerprint**: your PGP key fingerprint, in its 40 characters hexadecimal version. In the example above where we generated a new key, it is `E9136DAF94BD3D708C855124A7109E653C115379`
215
-
-**Content**: the ASCII armored content of your PGP **public** key. Copy paste here the full block beginning with `-----BEGIN PGP PUBLIC KEY BLOCK-----` and ending by `-----END PGP PUBLIC KEY BLOCK-----`
211
+
-**Name**: it is the display name of this PGP public key inside OVHcloud systems. It can be the same as your PGP key UID (usually`First name Last name <email>`), but it can also be something totally different. As it's only a display name, enter whatever is relevant for you.
212
+
-**Fingerprint**: your PGP key fingerprint, in its 40 characters hexadecimal version. In the example above in which we generated a new key, it is `E9136DAF94BD3D708C855124A7109E653C115379`.
213
+
-**Content**: the ASCII armored content of your PGP **public** key. Copy paste here the full block beginning with `-----BEGIN PGP PUBLIC KEY BLOCK-----` and ending by `-----END PGP PUBLIC KEY BLOCK-----`.
216
214
217
-
Even if the fingerprint can be deducted from the PGP public key content, we want you to specify both so we are 100% sure you are adding the correct key.
215
+
Even if the fingerprint can be deducted from the PGP public key content, we want you to specify both so that we are 100% sure you are adding the correct key.
218
216
219
217
{.thumbnail}
220
218
221
-
Then click on `Save`{.action}.
219
+
Then click `Save`{.action}.
222
220
223
-
If anything is wrong with your public key (unsuported algorithm, mismatch between fingerprint & key content, etc.) a precise error will be printed.
221
+
If anything is wrong with your public key (unsupported algorithm, mismatch between fingerprint & key content, etc.) an explicit error message will be printed.
224
222
225
223
### Update your stream Cold Storage configuration to use encryption
226
224
227
225
Now that you added your PGP public key to your Logs Data Platform account, you can use it in your streams cold storage configurations.
228
226
229
-
For this, go to the `Data Stream` tab, pick the stream for which you want cold storage encryption, click on **"..."**and then `Edit`{.action}.
227
+
For this, go to the `Data Stream` tab, pick the stream for which you want cold storage encryption, click the `...`{.action} button and then click`Edit`{.action}.
230
228
231
-
- Ensure the `Enable long-term storage` option is checked. You can refer to the [Cold Storage feature](../cold-storage){.ref} documentation to know about each of its fields.
229
+
- Ensure the `Enable long-term storage` option is checked. You can refer to the [Cold Storage feature](../cold-storage) documentation to know about each of its fields.
232
230
- Check the `Encrypt archives with my PGP encryption keys` option
233
231
- Select each PGP encryption key you want your archive to be encrypted with
That's it: now each archive produced by this stream will be encrypted with the selected keys (don't forget that archives are produced 2 days after logs are sends).
236
+
That's it: now each archive produced by this stream will be encrypted with the selected keys (don't forget that archives are produced 2 days after logs are sent).
239
237
240
238
> [!primary]
241
239
>
242
-
> For a given stream, you can select up to five of your encryption keys
243
-
> (the LDP Recovery Keys are not included in this five keys).
244
-
> A given encryption key can be used in several coldstorage configurations.
240
+
> For a given stream, you can select up to five of your encryption keys (the LDP Recovery Keys are not included in this five keys).
241
+
> A given encryption key can be used in several cold storage configurations.
245
242
>
246
243
247
244
### Know which key was used to encrypt which archive
248
245
249
-
In the `Data Stream` tab, you can see how many archives exist for each stream. On a stream where you have some archives, click on **"..."**and then `Archives`{.action}
246
+
In the `Data Stream` tab, you can see how many archives exist for each stream. On a stream on which you have some archives, click the`...`{.action} button and then click `Archives`{.action}.
250
247
251
248
{.thumbnail}
252
249
@@ -258,15 +255,15 @@ In this archives list, you can see a `PGP encryption keys` column.
258
255
#### Download and decrypt your archives
259
256
260
257
Once your encrypted archives are available, you can retrieve them [following this tutorial](../cold-storage/#retrieving-the-archives).
261
-
To decrypt a given archive, you can use `gpg` on a machine where your private key is present:
258
+
To decrypt a given archive, you can use `gpg` on a machine on which your private key is present:
gpg: encrypted with 4096-bit RSA key, ID 97B70793B8270D80, created 2022-05-10
269
-
"John Doe <john.doe@corp.acme.org>"
266
+
"John Doe <john.smith@corp.acme.org>"
270
267
271
268
$ ls
272
269
2022-11-15.zst 2022-11-15.zst.pgp
@@ -275,21 +272,22 @@ $ ls
275
272
### The LDP Recovery Key
276
273
277
274
Now your stream's archives are encrypted with your PGP public keys, and only the owner of the related private keys can decrypt the archives.
275
+
278
276
But what if you lose access to your private keys or to your passphrase ? In such a case, you won't be able to decrypt your archives anymore, and won't be able to see the archives content.
279
277
280
-
To avoid such a situation, we provide the `LDP Recovery Keys`. These are also PGP public keys you can use in your coldstorage configuration, but which private keys are owned by OVHcloud. Thus if you choosed to use `LDP Recovery Keys` in addition to your own keys, and you lose access to your private keys, OVHcloud teams will still be able to decrypt your archives; re-encrypt it with your new keys; and send you these re-encrypted archives.
278
+
To avoid such a situation, we provide the `LDP Recovery Keys`. These are also PGP public keys you can use in your cold storage configuration, but which private keys are owned by OVHcloud. Thus if you chose to use `LDP Recovery Keys` in addition to your own keys, and you lose access to your private keys, OVHcloud teams will still be able to decrypt your archives, re-encrypt it with your new keys and send you these re-encrypted archives.
281
279
282
-
Note that this feature is opt-in: you have to explicitly select the `LDP Recovery Key` in your stream's coldstorage configuration to benefit from this feature.
280
+
Note that this feature is opt-in: you have to explicitly select the `LDP Recovery Key` in your stream's cold storage configuration to benefit from this feature.
283
281
284
282
#### Ask OVHcloud to recover your encrypted archive
285
283
286
-
If the situation described above happens (you lost your private key, but your archive is also encrypted with the `LDP Recovery Key`), you will have to [contact OVHcloud support](https://www.ovhcloud.com/en/contact/). Open a ticket and describe precisely the name of your Logs Data Platform service, the name of the stream and the name of the archive. You will also have to provide a new PGP encryption key (a one you already added to your Logs Data Platform account).
284
+
If the situation described above happens (you lost your private key, but your archive is also encrypted with the `LDP Recovery Key`), you will have to [contact OVHcloud support](https://www.ovhcloud.com/en/contact/). Open a ticket and describe precisely the name of your Logs Data Platform service, the name of the stream and the name of the archive. You will also have to provide a new PGP encryption key (a key you already added to your Logs Data Platform account).
287
285
288
286
The Logs Data Platform team will then take care of your request.
0 commit comments