Uploaded image for project: 'Couchbase Server'
  1. Couchbase Server
  2. MB-44382

LUKS Documentation

    XMLWordPrintable

Details

    • Task
    • Status: Open
    • Minor
    • Resolution: Unresolved
    • Cheshire-Cat
    • 7.0.0
    • documentation
    • CC
    • 1

    Description

      Update Documentation for LUKS setup

      Attachments

        No reviews matched the request. Check your Options in the drop-down menu of this sections header.

        Activity

          Using this as reference :

          To create and mount a LUKS FS on disk : 

          https://github.com/couchbase/perfrunner/blob/master/scripts/create_luks_fs.sh 

          /dev/sdb1 - Is the partition on which you want LUKS format to be installed/encrypted

          luks_keyfile.key is file containing the key to unlocking/decrypting the LUKS partition

          cbefs is the name of the new filesystem (cb encrypted fs)

          Steps:

          1. LUKS format the partition : sudo cryptsetup luksFormat -d luks_keyfile.key --batch-mode /dev/sdb1
          2. Open the LUKS formatted partition : sudo cryptsetup luksOpen -d luks_keyfile.key /dev/sdb1 cbefs 
          3. Create a new File System : mkfs.xfs /dev/mapper/cbefs
          4. Mount /data to the FS : mount /dev/mapper/cbefs /data
          5. Give couchbase user the permissions to /data: chown couchbase:couchbase /data
          6. Add entries to fstab : sed -i '/data/c\/dev/mapper/cbefs /data xfs defaults 0 2' /etc/fstab
          7. Add entries to crypttab: echo "cbefs /dev/sdb1 /root/luks_keyfile.key luks" > /etc/crypttab

           

          prajwal.kirankumar Prajwal‌ Kiran Kumar‌ (Inactive) added a comment - - edited Using this as reference : To create and mount a LUKS FS on disk :   https://github.com/couchbase/perfrunner/blob/master/scripts/create_luks_fs.sh   /dev/sdb1 - Is the partition on which you want LUKS format to be installed/encrypted luks_keyfile.key is file containing the key to unlocking/decrypting the LUKS partition cbefs is the name of the new filesystem (cb encrypted fs) Steps : LUKS format the partition : sudo cryptsetup luksFormat -d luks_keyfile.key --batch-mode /dev/sdb1 Open the LUKS formatted partition : sudo cryptsetup luksOpen -d luks_keyfile.key /dev/sdb1 cbefs  Create a new File System : mkfs.xfs /dev/mapper/cbefs Mount /data to the FS : mount /dev/mapper/cbefs /data Give couchbase user the permissions to /data: chown couchbase:couchbase /data Add entries to fstab : sed -i '/data/c\/dev/mapper/cbefs /data xfs defaults 0 2' /etc/fstab Add entries to crypttab: echo "cbefs /dev/sdb1 /root/luks_keyfile.key luks" > /etc/crypttab  
          tony.hillman Tony Hillman added a comment - DOC-8587
          tony.hillman Tony Hillman added a comment - PR for review at  https://github.com/couchbase/docs-server/pull/1986

          People

            prajwal.kirankumar Prajwal‌ Kiran Kumar‌ (Inactive)
            prajwal.kirankumar Prajwal‌ Kiran Kumar‌ (Inactive)
            Votes:
            0 Vote for this issue
            Watchers:
            3 Start watching this issue

            Dates

              Created:
              Updated:

              Gerrit Reviews

                There are no open Gerrit changes

                PagerDuty