All of lore.kernel.org
 help / color / mirror / Atom feed
* dmcrypt?
@ 2017-09-12 23:45 Two Spirit
  2017-09-13 12:33 ` dmcrypt? Sage Weil
  2017-09-13 15:47 ` dmcrypt? Vasu Kulkarni
  0 siblings, 2 replies; 4+ messages in thread
From: Two Spirit @ 2017-09-12 23:45 UTC (permalink / raw)
  To: Sage Weil; +Cc: ceph-devel

Hi Sage,

I tried to install an encrypted OSD, but I found the documentation to
be light and not finding any examples. I was able to prepare
(ceph-deploy osd prepare --dmcrypt <host>:<relative_device_name>', but
I couldn't activate it. I found a tracker page that listed you as one
of the owners http://tracker.ceph.com/projects/ceph/wiki/Osd_-_simple_ceph-mon_dm-crypt_key_management
that seemed to imply that it was in the 'planning' phase. I was
wondering if this is in planning phase, or if it is fully supported
now ready to begin testing.

I have a requirement to place complete disks in encrypted containers
(including partition tables. kpartx accesses the encrypted partitions.
some versions of Ubuntu I have to do this manually, but newer versions
seem to automatically do this).  I haven't absorbed all the ceph
dmcrypt architecture yet, but I did not feel comfortable that the keys
were available by querying ceph. Not saying I have any idea how to do
it better in a ceph environment. Can you accept a network accessible
keyfile?

I thought I might be able to get some testing by creating my own
encrypted container outside of ceph, which was accessible via
/dev/mapper/lukscontainer. I tried 'ceph-deploy osd prepare
luksosd:/dev/mapper/lukscontainer' and it didn't like that. I saw docs
using absolute references (/dev/sdb) so I thought
/dev/mapper/lukscontainer should be usable. ceph-deploy osd prepare
--dmcrypt luksosd:sdb seemed to work -- maybe it didn't like the fact
the path was an extra level deeper. Where is the encrypted ceph data
partition to activate?

As a temporary workaround, I was thinking I could create a /dev/mdXXX
device using mdadm forcing a single disk raid. This would keep key
management outside of ceph for now. and be able to run the relative
path format 'ceph-deploy osd prepare luksosd:mdXXX'. In theory, this
should work and supported by ceph, right?

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: dmcrypt?
  2017-09-12 23:45 dmcrypt? Two Spirit
@ 2017-09-13 12:33 ` Sage Weil
  2017-09-13 15:00   ` dmcrypt? Two Spirit
  2017-09-13 15:47 ` dmcrypt? Vasu Kulkarni
  1 sibling, 1 reply; 4+ messages in thread
From: Sage Weil @ 2017-09-13 12:33 UTC (permalink / raw)
  To: Two Spirit; +Cc: ceph-devel

On Tue, 12 Sep 2017, Two Spirit wrote:
> Hi Sage,
> 
> I tried to install an encrypted OSD, but I found the documentation to
> be light and not finding any examples. I was able to prepare
> (ceph-deploy osd prepare --dmcrypt <host>:<relative_device_name>', but
> I couldn't activate it. I found a tracker page that listed you as one
> of the owners http://tracker.ceph.com/projects/ceph/wiki/Osd_-_simple_ceph-mon_dm-crypt_key_management
> that seemed to imply that it was in the 'planning' phase. I was
> wondering if this is in planning phase, or if it is fully supported
> now ready to begin testing.

There are still some issues with dmcrypt + bluestore; can you verify it 
works with --filestore?

I was hoping to get ceph-volume support for bluestore ready so that we 
didn't have to deal with ceph-disk, but we didn't get to it before the 
luminous release.  That's still my preferred path...

sage


> I have a requirement to place complete disks in encrypted containers
> (including partition tables. kpartx accesses the encrypted partitions.
> some versions of Ubuntu I have to do this manually, but newer versions
> seem to automatically do this).  I haven't absorbed all the ceph
> dmcrypt architecture yet, but I did not feel comfortable that the keys
> were available by querying ceph. Not saying I have any idea how to do
> it better in a ceph environment. Can you accept a network accessible
> keyfile?
> 
> I thought I might be able to get some testing by creating my own
> encrypted container outside of ceph, which was accessible via
> /dev/mapper/lukscontainer. I tried 'ceph-deploy osd prepare
> luksosd:/dev/mapper/lukscontainer' and it didn't like that. I saw docs
> using absolute references (/dev/sdb) so I thought
> /dev/mapper/lukscontainer should be usable. ceph-deploy osd prepare
> --dmcrypt luksosd:sdb seemed to work -- maybe it didn't like the fact
> the path was an extra level deeper. Where is the encrypted ceph data
> partition to activate?
> 
> As a temporary workaround, I was thinking I could create a /dev/mdXXX
> device using mdadm forcing a single disk raid. This would keep key
> management outside of ceph for now. and be able to run the relative
> path format 'ceph-deploy osd prepare luksosd:mdXXX'. In theory, this
> should work and supported by ceph, right?
> --
> To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> 
> 

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: dmcrypt?
  2017-09-13 12:33 ` dmcrypt? Sage Weil
@ 2017-09-13 15:00   ` Two Spirit
  0 siblings, 0 replies; 4+ messages in thread
From: Two Spirit @ 2017-09-13 15:00 UTC (permalink / raw)
  To: Sage Weil; +Cc: ceph-devel

On Wed, Sep 13, 2017 at 5:33 AM, Sage Weil <sweil@redhat.com> wrote:
> On Tue, 12 Sep 2017, Two Spirit wrote:
>> Hi Sage,
>>
>> I tried to install an encrypted OSD, but I found the documentation to
>> be light and not finding any examples. I was able to prepare
>> (ceph-deploy osd prepare --dmcrypt <host>:<relative_device_name>', but
>> I couldn't activate it. I found a tracker page that listed you as one
>> of the owners http://tracker.ceph.com/projects/ceph/wiki/Osd_-_simple_ceph-mon_dm-crypt_key_management
>> that seemed to imply that it was in the 'planning' phase. I was
>> wondering if this is in planning phase, or if it is fully supported
>> now ready to begin testing.
>
> There are still some issues with dmcrypt + bluestore; can you verify it
> works with --filestore?
>
> I was hoping to get ceph-volume support for bluestore ready so that we
> didn't have to deal with ceph-disk, but we didn't get to it before the
> luminous release.  That's still my preferred path...
>
> sage
>
>
>> I have a requirement to place complete disks in encrypted containers
>> (including partition tables. kpartx accesses the encrypted partitions.
>> some versions of Ubuntu I have to do this manually, but newer versions
>> seem to automatically do this).  I haven't absorbed all the ceph
>> dmcrypt architecture yet, but I did not feel comfortable that the keys
>> were available by querying ceph. Not saying I have any idea how to do
>> it better in a ceph environment. Can you accept a network accessible
>> keyfile?
>>
>> I thought I might be able to get some testing by creating my own
>> encrypted container outside of ceph, which was accessible via
>> /dev/mapper/lukscontainer. I tried 'ceph-deploy osd prepare
>> luksosd:/dev/mapper/lukscontainer' and it didn't like that. I saw docs
>> using absolute references (/dev/sdb) so I thought
>> /dev/mapper/lukscontainer should be usable. ceph-deploy osd prepare
>> --dmcrypt luksosd:sdb seemed to work -- maybe it didn't like the fact
>> the path was an extra level deeper. Where is the encrypted ceph data
>> partition to activate?
>>
>> As a temporary workaround, I was thinking I could create a /dev/mdXXX
>> device using mdadm forcing a single disk raid. This would keep key
>> management outside of ceph for now. and be able to run the relative
>> path format 'ceph-deploy osd prepare luksosd:mdXXX'. In theory, this
>> should work and supported by ceph, right?
>> --
>> To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
>> the body of a message to majordomo@vger.kernel.org
>> More majordomo info at  http://vger.kernel.org/majordomo-info.html
>>
>>

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: dmcrypt?
  2017-09-12 23:45 dmcrypt? Two Spirit
  2017-09-13 12:33 ` dmcrypt? Sage Weil
@ 2017-09-13 15:47 ` Vasu Kulkarni
  1 sibling, 0 replies; 4+ messages in thread
From: Vasu Kulkarni @ 2017-09-13 15:47 UTC (permalink / raw)
  To: Two Spirit; +Cc: Sage Weil, ceph-devel

On Tue, Sep 12, 2017 at 4:45 PM, Two Spirit <twospirit6905@gmail.com> wrote:
> Hi Sage,
>
> I tried to install an encrypted OSD, but I found the documentation to
> be light and not finding any examples. I was able to prepare
> (ceph-deploy osd prepare --dmcrypt <host>:<relative_device_name>', but
> I couldn't activate it.
What  OS Version is this ? and What is the error?  I dont see any
issues in the nightly runs with CentOS/Ubuntu.
Have you tried osd create --bluestore --dmcrypt  <host>:<block> ?

 I found a tracker page that listed you as one
> of the owners http://tracker.ceph.com/projects/ceph/wiki/Osd_-_simple_ceph-mon_dm-crypt_key_management
> that seemed to imply that it was in the 'planning' phase. I was
> wondering if this is in planning phase, or if it is fully supported
> now ready to begin testing.
>
> I have a requirement to place complete disks in encrypted containers
> (including partition tables. kpartx accesses the encrypted partitions.
> some versions of Ubuntu I have to do this manually, but newer versions
> seem to automatically do this).  I haven't absorbed all the ceph
> dmcrypt architecture yet, but I did not feel comfortable that the keys
> were available by querying ceph. Not saying I have any idea how to do
> it better in a ceph environment. Can you accept a network accessible
> keyfile?
>
> I thought I might be able to get some testing by creating my own
> encrypted container outside of ceph, which was accessible via
> /dev/mapper/lukscontainer. I tried 'ceph-deploy osd prepare
> luksosd:/dev/mapper/lukscontainer' and it didn't like that. I saw docs
> using absolute references (/dev/sdb) so I thought
> /dev/mapper/lukscontainer should be usable. ceph-deploy osd prepare
> --dmcrypt luksosd:sdb seemed to work -- maybe it didn't like the fact
> the path was an extra level deeper. Where is the encrypted ceph data
> partition to activate?
>
> As a temporary workaround, I was thinking I could create a /dev/mdXXX
> device using mdadm forcing a single disk raid. This would keep key
> management outside of ceph for now. and be able to run the relative
> path format 'ceph-deploy osd prepare luksosd:mdXXX'. In theory, this
> should work and supported by ceph, right?
> --
> To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2017-09-13 15:47 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-09-12 23:45 dmcrypt? Two Spirit
2017-09-13 12:33 ` dmcrypt? Sage Weil
2017-09-13 15:00   ` dmcrypt? Two Spirit
2017-09-13 15:47 ` dmcrypt? Vasu Kulkarni

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.