11.11. 恢复简单的加密加密密钥
从备份中恢复 barbican 数据库和 BarbicanSimpleCryptoKek 密码,以恢复简单的加密加密密钥。
流程
使用 base64 对
BarbicanSimpleCryptoKek键进行编码,并将结果值写入 osp-secret :$ echo <barbican_key> | base64 YmFyYmljYW5fc2ltcGxlX2N5cHRvX2tlawo=将 <barbican_key> 替换为您要恢复的
BarbicanSimpleCryptoKek键打开 osp-secret secret 对象以进行编辑:
$ oc edit secret osp-secret添加第 1 步中的值。编写并保存您的更改:
.... BarbicanDatabasePassword: cGFzc3dvcmQK BarbicanPassword: cGFzc3dvcmQK BarbicanSimpleCryptoKEK: YmFyYmljYW5fc2ltcGxlX2N5cHRvX2tlawo= CeilometerPassword: cGFzc3dvcmQK CinderDatabasePassword: cGFzc3dvcmQK CinderPassword: cGFzc3dvcmQK DatabasePassword: cGFzc3dvcmQK ....检索 barbican 数据库 root 密码:
DB_PASS=$(oc get secret osp-secret -o yaml | grep DbRootPassword | awk '{print $2}' | base64 -d)将备份文件恢复到
barbican数据库:$ oc exec openstack-galera-0 -- mysql -u root -p"${DB_PASS}" barbican < <sql_backup>将 <sql_backup> 替换为 mysql 数据库备份文件的名称。
输出示例
Defaulted container "galera" out of: galera, mysql-bootstrap (init)
验证
您可以使用 openstackclient pod 验证测试 secret 是否已成功恢复:
$ oc exec -n openstack -t openstackclient -- openstack secret list +------------------------------------------------------------------------+------------+---------------------------+--------+-------------------------------------------+-----------+------------+-------------+------+------------+ | Secret href | Name | Created | Status | Content types | Algorithm | Bit length | Secret type | Mode | Expiration | +------------------------------------------------------------------------+------------+---------------------------+--------+-------------------------------------------+-----------+------------+-------------+------+------------+ | http://10.0.0.104:9311/v1/secrets/93f62cfd-e008-401f-be74-bf057c88b04a | testSecret | 2018-06-19T18:25:25+00:00 | ACTIVE | {u'default': u'text/plain'} | aes | 256 | opaque | cbc | None | | http://10.0.0.104:9311/v1/secrets/f664b5cf-5221-47e5-9887-608972a5fefb | swift_key | 2018-06-19T18:24:40+00:00 | ACTIVE | {u'default': u'application/octet-stream'} | aes | 256 | symmetric | ctr | None | +------------------------------------------------------------------------+------------+---------------------------+--------+-------------------------------------------+-----------+------------+-------------+------+------------+