Encrypted volumes using LUKS

LUKS: Introduction

LUKS (Linux Unified Key Setup) is a disk encryption methodology and was mainly intended for Linux distributions. Using LUKS, almost everything on the disk is encrypted and can be decrypted using a unique password.
LUKS encrypted devices can also be used to create OpenEBS cStor volumes. This guide will give an overview of how we can use encryption features for OpenEBS cStor volumes.

Below are the steps to provide encrypted OpenEBS cStor volume capacity running on OpenEBS version 1.9 and above. We will be doing a data backup and restore using Kubera’s DMaaS feature, where data from non-encrypted to encrypted volume will be migrated.

Encrypted volumes using LUKS

Instructions and Pre-requisite:

For performing the migration from non-encrypted to encrypted volumes in Kubera using DMaaS, we need to make sure that we have :

To perform the migration, follow the below-mentioned steps:

Step1: Create a new K8S cluster where the LUKS will be used to get encrypted volumes

Step2: Make sure to add an additional block device to each node, which LUKS will use for encryption. In our case, we have used a Kubernetes cluster hosted on VMware with an additional 50GB block devices added to each node.
Device-name = sdb

~ > lsblk 
NAME   MAJ:MIN RM   SIZE RO TYPE MOUNTPOINT
fd0      2:0    1     4K  0 disk 
loop0    7:0    0   956K  1 loop /snap/gnome-logs/81
loop1    7:1    0  44.9M  1 loop /snap/gtk-common-themes/1440
loop2    7:2    0    97M  1 loop /snap/core/9665
loop3    7:3    0    55M  1 loop /snap/core18/1880
loop4    7:4    0   4.2M  1 loop /snap/gnome-calculator/544
loop5    7:5    0   2.2M  1 loop /snap/gnome-system-monitor/148
loop6    7:6    0  54.7M  1 loop /snap/core18/1668
loop7    7:7    0 161.4M  1 loop /snap/gnome-3-28-1804/128
loop8    7:8    0   2.4M  1 loop /snap/gnome-calculator/748
loop9    7:9    0 255.6M  1 loop /snap/gnome-3-34-1804/36
loop10   7:10   0   956K  1 loop /snap/gnome-logs/100
loop11   7:11   0  14.8M  1 loop /snap/gnome-characters/399
loop12   7:12   0  89.1M  1 loop /snap/core/8268
loop13   7:13   0 160.2M  1 loop /snap/gnome-3-28-1804/116
loop14   7:14   0   3.7M  1 loop /snap/gnome-system-monitor/127
loop15   7:15   0  62.1M  1 loop /snap/gtk-common-themes/1506
loop16   7:16   0   276K  1 loop /snap/gnome-characters/550
sda      8:0    0   100G  0 disk 
└─sda1   8:1    0   100G  0 part /
sdb      8:16   0    50G  0 disk 
sr0     11:0    1  1024M  0 rom  
~ >
~ > fdisk -l /dev/sdb
Disk /dev/sdb: 50 GiB, 53687091200 bytes, 104857600 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes

Step3: Make sure you install cryptsetup package on each node connected to the cluster.

For Ubuntu:
apt-get install cryptsetup

Centos/Redhat:
yum install cryptsetup

~ > apt-get install cryptsetup
Reading package lists... Done
Building dependency tree       
Reading state information... Done
The following additional packages will be installed:
  cryptsetup-bin
Suggested packages:
  keyutils
The following NEW packages will be installed:
  cryptsetup cryptsetup-bin
0 upgraded, 2 newly installed, 0 to remove and 116 not upgraded.
Need to get 244 kB of archives.
After this operation, 828 kB of additional disk space will be used.
Do you want to continue? [Y/n] Y

Step4: Format the LUKS partition with a passphrase:
cryptsetup luksFormat /dev/<device_name>

~ > cryptsetup luksFormat /dev/sdb

WARNING!
========
This will overwrite data on /dev/sdb irrevocably.

Are you sure? (Type uppercase yes): YES
Enter passphrase for /dev/sdb: 
Verify passphrase: 
~ >

Step5: Create a LUKS device mapping
Cryptsetup luksOpen </dev/device_name/> <mapping>

~ > cryptsetup luksOpen /dev/sdb backup
Enter passphrase for /dev/sdb: 
~ >

Step6: Confirm the new LUKS partition by running lsblk command. In our example, mapped as backup.

~ > lsblk 
NAME     MAJ:MIN RM   SIZE RO TYPE  MOUNTPOINT
fd0        2:0    1     4K  0 disk  
loop0      7:0    0   956K  1 loop  /snap/gnome-logs/81
loop1      7:1    0  44.9M  1 loop  /snap/gtk-common-themes/1440
loop2      7:2    0    97M  1 loop  /snap/core/9665
loop3      7:3    0    55M  1 loop  /snap/core18/1880
loop4      7:4    0   4.2M  1 loop  /snap/gnome-calculator/544
loop5      7:5    0   2.2M  1 loop  /snap/gnome-system-monitor/148
loop6      7:6    0  54.7M  1 loop  /snap/core18/1668
loop7      7:7    0 161.4M  1 loop  /snap/gnome-3-28-1804/128
loop8      7:8    0   2.4M  1 loop  /snap/gnome-calculator/748
loop9      7:9    0 255.6M  1 loop  /snap/gnome-3-34-1804/36
loop10     7:10   0   956K  1 loop  /snap/gnome-logs/100
loop11     7:11   0  14.8M  1 loop  /snap/gnome-characters/399
loop12     7:12   0  89.1M  1 loop  /snap/core/8268
loop13     7:13   0 160.2M  1 loop  /snap/gnome-3-28-1804/116
loop14     7:14   0   3.7M  1 loop  /snap/gnome-system-monitor/127
loop15     7:15   0  62.1M  1 loop  /snap/gtk-common-themes/1506
loop16     7:16   0   276K  1 loop  /snap/gnome-characters/550
sda        8:0    0   100G  0 disk  
└─sda1     8:1    0   100G  0 part  /
sdb        8:16   0    50G  0 disk  
└─backup 253:0    0    50G  0 crypt 
sr0       11:0    1  1024M  0 rom   
~ >

Step7: Verify the status of the LUKS partition
cryptsetup -v status <mapping>

~ > cryptsetup -v status backup
/dev/mapper/backup is active.
  type:    LUKS1
  cipher:  aes-xts-plain64
  keysize: 256 bits
  key location: dm-crypt
  device:  /dev/sdb
  sector size:  512
  offset:  4096 sectors
  size:    104853504 sectors
  mode:    read/write
Command successful.
~ >

Step8: Verify the status of the device-mapper file
blkid

~ > blkid 
/dev/sda1: UUID="4c274704-27a2-4eb8-a9c5-2e04d45a85bb" TYPE="ext4" PARTUUID="75efceb3-01"
/dev/loop0: TYPE="squashfs"
/dev/loop1: TYPE="squashfs"
/dev/loop2: TYPE="squashfs"
/dev/loop3: TYPE="squashfs"
/dev/loop4: TYPE="squashfs"
/dev/loop5: TYPE="squashfs"
/dev/loop6: TYPE="squashfs"
/dev/loop7: TYPE="squashfs"
/dev/loop8: TYPE="squashfs"
/dev/sdb: UUID="0dd3366d-43ff-455d-b848-dc70713f30ce" TYPE="crypto_LUKS"
/dev/loop9: TYPE="squashfs"
/dev/loop10: TYPE="squashfs"
/dev/loop11: TYPE="squashfs"
/dev/loop12: TYPE="squashfs"
/dev/loop13: TYPE="squashfs"
/dev/loop14: TYPE="squashfs"
/dev/loop15: TYPE="squashfs"
/dev/loop16: TYPE="squashfs"
/dev/mapper/backup: LABEL="cstor-22fe12e0-f554-4f44-8c39-91e5211320ae" UUID="8650845353607662259" UUID_SUB="2557458019853633173" TYPE="zfs_member"
~ >

Step9: Verify the status of the mapper file and the LUKS partition mapping:

~ > ls -lh /dev/mapper/
total 0
lrwxrwxrwx 1 root root       7 Jul 30 19:02 backup -> ../dm-0
crw------- 1 root root 10, 236 Jul 30 17:29 control
~ >

Step10: Now, we are all set to connect this cluster with encrypted disks to Kubera. Please refer to Getting started with Kubera to know the detailed steps.

NOTE: While installing OpenEBS, make sure you make the below mentioned changes.

1.Select the Advanced installation for OpenEBS installation.Install OpenEBS Enterprise Edition on your cluster

2. Specify the namespace, default directory, and docker registry.

Start installation of OpenEBS Enterprise Edition

3. Select the nodes where the control plane components have to be scheduled.

Select the control nodes you want to schedule

4. Select the nodes where the data plane components have to be scheduled.

select the Data Nodes you want to schedule

5. The next step is to setup disk filters. Under Include, add /dev/dm-, this ensures that NDM(Node Disk Manager) looks only for these disks to create block device CR.
Under Exclude, add the disks attached to nodes for LUKS utilization (refer Step 2). In our case, it was /dev/sdb

Setup disk filters

Next, click on Deploy OpenEBS.

Confirmation

Installin OpenEBS Enterprise Edition

Step11: Now, we need to create StoragePool, StorageClass, and PersistentVolumeClaim to be used:

kubectl get blockdevice -n openebs

The output will be similar to the following.

NAME                                           NODENAME                                    SIZE          CLAIMSTATE   STATUS   AGE
blockdevice-1c10eb1bb14c94f02a00373f2fa09b93   gke-ranjith-14-default-pool-da9e1336-mbq9   42949672960   Unclaimed    Active   2m39s
blockdevice-77f834edba45b03318d9de5b79af0734   gke-ranjith-14-default-pool-da9e1336-d9zq   42949672960   Unclaimed    Active   2m47s
blockdevice-936911c5c9b0218ed59e64009cc83c8f   gke-ranjith-14-default-pool-da9e1336-9j2w   42949672960   Unclaimed    Active   2m55s

Use the below YAML for storage pool creation from master node:

#Use the following YAMLs to create a cStor Storage Pool.
apiVersion: openebs.io/v1alpha1
kind: StoragePoolClaim
metadata:
  name: cstor-disk-pool
  annotations:
    cas.openebs.io/config: |
      - name: PoolResourceRequests
        value: |-
            memory: 2Gi
      - name: PoolResourceLimits
        value: |-
            memory: 4Gi
spec:
  name: cstor-disk-pool
  type: disk
  poolSpec:
    poolType: striped
  blockDevices:
    blockDeviceList:
    - blockdevice-1c10eb1bb14c94f02a00373f2fa09b93
    - blockdevice-77f834edba45b03318d9de5b79af0734
    - blockdevice-936911c5c9b0218ed59e64009cc83c8f
kubectl apply -f cstor-pool1-config.yaml

kubectl get spc

The following is an example output.

NAME              AGE
cstor-disk-pool   20s

Verify if cStor Pool is created successfully using the following command.

kubectl get csp

The following is an example output.

NAME                   ALLOCATED   FREE    CAPACITY   STATUS    TYPE      AGE
cstor-disk-pool-2gcb   270K        39.7G   39.8G      Healthy   striped   1m
cstor-disk-pool-9q2f   270K        39.7G   39.8G      Healthy   striped   1m
                                                                                                                                                                                                                                                                                                                                cstor-disk-pool-ilz1   270K        39.7G   39.8G      Healthy   striped   1m

Step12: Creation of StorageClass. Use the below YAML for storageclass creation.

apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
  name: openebs-sc-statefulset
  annotations:
    openebs.io/cas-type: cstor
    cas.openebs.io/config: |
      - name: StoragePoolClaim
        value: "cstor-disk-pool"
      - name: ReplicaCount
        value: "3"
provisioner: openebs.io/provisioner-iscsi
Kubectl get sc

Step13: Now we will use Kubera’s DMaaS feature for backup & restore of applications and its data. For using the DMaaS feature and getting it implemented, you can have a look at DMaaS.
DMaaS will help us migrate the application and its data from non-encrypted volumes in cluster-1 to encrypted volumes in cluster-2.

Step14: Once inside the Kubera UI, click on DMaaS -- > Get started

Once inside the Kubera UI, click on DMaaS -- > Get started

Step15: Click on “Select cluster” and select the source cluster which we need to backup

Select cluster

Step16: Select the application which we need to backup

MySQL Test

Step17: Click on DMaaS -- > New Strategy

Click on DMaaS --> New Strategy

Step18: Create a new backup strategy and add cloud credentials where we will backup the application data. Please make sure to select the “cStor-based” tab and enable it.

Create a new backup strategy and add cloud credentials where we will backup the application data

Step19: Select a region where we want to backup and set the time interval as per choice.

Select a region where we want to backup and set the time interval as per choice

Select a region where we want to backup & set the time interval as per choice

Step20: Select the Restore button by clicking on the backup from where we want to restore.

Select the Restore button by clicking on the backup from where we want to restore.

Step21: Select the destination cluster where we want to restore the application.

Select the destination cluster where we want to restore the application

Step22: Finally, it will go in stages, and at last, the application will be restored. Log in to the destination cluster and try logging in to the application to verify integrity.

Finally, it will go in stages, and at last, the application will be restored

Log in to the destination cluster and try logging in to the application to verify integrity

That's all for today. Hope you found the blog helpful. Do check our HelpCenter articles for more resources.
Please leave your valuable feedback in the comment section below.
Don Williams
Don is the CEO of MayaData and leading the company for last one year. He has an exceptional record of accomplishments leading technology teams for organizations ranging from private equity-backed start-ups to large, global corporations. He has deep experience in engineering, operations, and product development in highly technical and competitive marketplaces. His extensive professional network in several industries, large corporations and government agencies is a significant asset to early stage businesses, often essential to achieve product placement, growth and position for potential exit strategies.
Kiran Mova
Kiran evangelizes open culture and open-source execution models and is a lead maintainer and contributor to the OpenEBS project. Passionate about Kubernetes and Storage Orchestration. Contributor and Maintainer OpenEBS projects. Co-founder and Chief Architect at MayaData Inc.
Murat Karslioglu
VP @OpenEBS & @MayaData_Inc. Murat Karslioglu is a serial entrepreneur, technologist, and startup advisor with over 15 years of experience in storage, distributed systems, and enterprise hardware development. Prior to joining MayaData, Murat worked at Hewlett Packard Enterprise / 3PAR Storage in various advanced development projects including storage file stack performance optimization and the storage management stack for HPE’s Hyper-converged solution. Before joining HPE, Murat led virtualization and OpenStack integration projects within the Nexenta CTO Office. Murat holds a Bachelor’s Degree in Industrial Engineering from the Sakarya University, Turkey, as well as a number of IT certifications. When he is not in his lab, he loves to travel, advise startups, and spend time with his family. Lives to innovate! Opinions my own!