Este contenido no está disponible en el idioma seleccionado.

Chapter 4. User-managed encryption for IBM Cloud


By default, provider-managed encryption is used to secure the following when you deploy an OpenShift Container Platform cluster:

  • The root (boot) volume of control plane and compute machines
  • Persistent volumes (data volumes) that are provisioned after the cluster is deployed

You can override the default behavior by specifying an IBM® Key Protect for IBM Cloud® (Key Protect) root key as part of the installation process.

When you bring our own root key, you modify the installation configuration file (install-config.yaml) to specify the Cloud Resource Name (CRN) of the root key by using the encryptionKey parameter.

You can specify that:

  • The same root key be used be used for all cluster machines. You do so by specifying the key as part of the cluster’s default machine configuration.

    When specified as part of the default machine configuration, all managed storage classes are updated with this key. As such, data volumes that are provisioned after the installation are also encrypted using this key.

  • Separate root keys be used for the control plane and compute machine pools.

For more information about the encryptionKey parameter, see Additional IBM Cloud configuration parameters.

Note

Make sure you have integrated Key Protect with your IBM Cloud Block Storage service. For more information, see the Key Protect documentation.

4.1. Next steps

Install an OpenShift Container Platform cluster:

Red Hat logoGithubRedditYoutubeTwitter

Aprender

Pruebe, compre y venda

Comunidades

Acerca de la documentación de Red Hat

Ayudamos a los usuarios de Red Hat a innovar y alcanzar sus objetivos con nuestros productos y servicios con contenido en el que pueden confiar.

Hacer que el código abierto sea más inclusivo

Red Hat se compromete a reemplazar el lenguaje problemático en nuestro código, documentación y propiedades web. Para más detalles, consulte el Blog de Red Hat.

Acerca de Red Hat

Ofrecemos soluciones reforzadas que facilitan a las empresas trabajar en plataformas y entornos, desde el centro de datos central hasta el perímetro de la red.

© 2024 Red Hat, Inc.