Manage KMS using CLI
Explore commands for managing Key Management System (KMS) integration with the WEKA system using the CLI.
Last updated
Explore commands for managing Key Management System (KMS) integration with the WEKA system using the CLI.
Last updated
Using the CLI, you can:
Command: weka security kms set
To integrate the Key Management Service (KMS) with the WEKA system, use the provided command line for adding or updating the KMS configuration. Ensure that the KMS is preconfigured, and both the key and a valid token are readily available.
Run the following command to establish a connection between the WEKA system and the configured Vault KMS.
weka security kms set <type> <address> <key-identifier> [--token token] [--namespace namespace] [--client-cert client-cert] [--client-key client-key] [--ca-cert ca-cert] [--role-id role-id] [--secret-id secret-id] [--convert-to-cluster-key-on-fs]
Parameters
type
*
Type of the KMS.
Possible values:
vault
or kmip
address
*
KMS server address.
URL
for vault
hostname:port
for kmip
key-identifier
*
Key name for vault
or UID for kmip
to secure filesystem keys.
token
API token to access HashiCorp Vault KMS.
This applies only to vault
.
Prohibited for kmip
.
For cluster-wide encryption, specify the token
.
For per-filesystem encryption, specify the role-id
and secret-id
parameters below instead of the token
.
The access token must have:
Read permissions to transit/keys/<master-key-name>
Write permissions to transit/encrypt/<master-key-name>
and transit/decrypt/<masterkeyname>
Permissions to /transit/rewrap
and auth/token/lookup
namespace
The namespace name in HashiCorp Vault.
Namespace names must not end with "/", avoid spaces, and refrain from using reserved names like root
, sys
, audit
, auth
, cubbyhole
, and identity
.
client-cert
Path to the client certificate PEM file.
Must permit encrypt
and decrypt
permissions.
Mandatory for kmip
.
Prohibited for vault
.
client-key
Path to the client key PEM file.
Mandatory for kmip
.
Prohibited for vault
.
ca-cert
Path to the CA certificate PEM file.
Optional for kmip
.
Prohibited for vault
.
role-id
Role ID for KMS access with per-filesystem encryption.
To obtain the role-id
and secret-id
, see the section below.
Mandatory if KMS Namespace is defined.
secret-id
Secret ID for KMS access with per-filesystem encryption.
Mandatory if KMS Namespace is defined.
You can also specify the secret ID using the environment variable WEKA_KMS_SECRET_ID
.
convert-to-cluster-key-on-fs
Convert all encrypted filesystems to use cluster key.
role-id
and secret-id
from HashiCorp VaultIn environments using HashiCorp Vault for secure credential management, the Vault administrator would provide the role-id
and secret-id
needed for access.
Disclaimer: The following example is provided as a courtesy to illustrate possible integration with HashiCorp Vault and is not part of our product.
Enable AppRole authentication:
Role for cluster:
Retrieve the role-id:
Role for Key1:
Retrieve the role-id and generate a secret-id:
Setting the WEKA system with a HashiCorp Vault KMS for cluster-wide encryption:
Setting the WEKA system with a HashiCorp Vault KMS for per-filesystem encryption:
Setting the WEKA system with a KMIP complaint KMS (SmartKey example):
Command: weka security kms
Use this command to show the details of the configured KMS.
Command: weka security kms unset
Use this command to remove the KMS from the WEKA system. It is only possible to remove a KMS configuration if no encrypted filesystems exist.
To force remove a KMS even if encrypted filesystems exist, use the --allow-downgrade
attribute. In such cases, the encrypted filesystem keys are re-encrypted with local encryption and may be compromised.
Command: weka security kms rewrap
If the KMS key is compromised or requires rotation, the KMS administrator can rotate the key in the KMS. In such cases, this command is used to re-encrypt the encrypted filesystem keys with the new KMS cluster key.
weka security kms rewrap [--new-key-uid new-key-uid] [--all] [--convert-to-cluster-key-on-fs]
Parameters
new-key-uid
*
Unique identifier for the new key to be used to wrap filesystem keys.
Mandatory for kmip
only.
Do not specify any value for vault
.
all
Rewrap all the filesystem encryption keys. Applicable when using HashiCorp Vault for per-filesystem encryption keys.
Without the --all
option, the command re-encrypts only the keys of filesystems that use the cluster key for encryption.
convert-to-cluster-key-on-fs
Convert all encrypted filesystems to use the KMS cluster key.
Unlike HashiCorp Vault KMS, re-wrapping a KMIP-based KMS necessitates generating a new key within the KMS rather than rotating the existing one. Therefore, it is essential to retain the old key in the KMS to ensure the decryption of older Snap-to-Object snapshots.
The expected output is:
Once the transit
secret engine is set up, a master key for use with the WEKA system must be created with this command:
The expected output is:
Related information:
Create a weka_policy.hcl
file with the following content:
This limits the capabilities so there is no permission to destroy the key, using this policy. This protection is important when creating an API token.
Create the policy using the following command:
Verify that thetoken
authentication method in Vault is enabled. This can be performed using the following command:
The expected output is:
To enable the token authentication method use the following command:
Log into the KMS system using any of the identity methods Vault supports. The identity must have permission to use the previously set master key.
Create a token role for the identity using the following command:
Generate a token for the logged-in identity using the following command:
The expected output is:
Each KMS employs a unique process for obtaining a client certificate and key and configuring it through the KMS. The certificate is generated using OpenSSL and utilizes a UID obtained from the KMS.
Example:
Refer to the specific KMS documentation to create a certificate and associate it with the WEKA cluster within the KMS, ensuring it has the necessary privileges for encryption and decryption.
The WEKA system uses capabilities of the KMS to encrypt/decrypt the filesystem keys. This requires the configuration of Vault with the transit
secret engine with this command:
Authentication from the WEKA system to Vault relies on an API token. Since the WEKA system must always be able to communicate with the KMS, a must be used.
For more information on obtaining an API token, refer to .
The WEKA system does not automatically renew the API token lease. It can be renewed using the . It is also possible to define a higher maximum token value (max_lease_ttl)
by changing the .