IBM Cloud Docs
Verifying disk encryption status

Verifying disk encryption status

Both the root disk and data disks in the Hyper Protect Virtual Servers for VPC instance are encrypted with Linux Unified Key Setup (LUKS) Encryption. You can verify the encryption status by checking the messages in the log.

  • The root disk is re-created and encrypted on every boot with the original content. A passphrase for the root disk is not stored.

  • The data disk encryption is configured by using the “seeds” provided in the workload and env sections within the contract and, if you enable the integration, a third seed from Hyper Protect Crypto Services. During the instance initiation, the disks are attached and encrypted by using the seeds to create a LUKS passphrase. If the seed information or the data disk is not configured, the instance fails to initiate. For more information, see The workload - volumes subsection of the contract.

The disk encryption status check daemon checks the crypto headers of the root disk and data disks that are attached to the instance each hour, and then writes the information messages about the disk encryption status into the log.

The following example shows the disk encryption check related messages within the log.

...
Nov 29 10:24:07 hpvs211vsi verify-disk-encryption info HPL13000I: Verify LUKS Encryption...
Nov 29 10:24:07 hpvs211vsi systemd info verify-disk-encryption-invoker.service: Succeeded.
...
Nov 29 10:24:08 hpvs211vsi verify-disk-encryption info Checked for mount point /mnt/data, LUKS encryption with 1 key slot found
Nov 29 10:24:08 hpvs211vsi verify-disk-encryption info HPL13001I: Root disk and all the data disks are encrypted
...

Note:

  1. You can't configure the interval of the disk encryption status checks.

  2. To address Denial-of-Service attacks, requests are throttled at three per five minutes.

  3. To verify that the mounted data volume is encrypted, you can trigger explicitly echo 'HPL13000I' | systemd-cat on the VSI, and the results are captured in the logs.