Volumes are the Block Storage devices that you attach to instances to enable persistent storage. Users can attach a volume to a running instance or detach a volume and attach it to another instance at any time. For information about using the dashboard to create and manage volumes as an end user, see the OpenStack End User Guide.
As an administrative user, you can manage volumes and volume types for users in various projects. You can create and delete volume types, and you can view and delete volumes. Note that a volume can be encrypted by using the steps outlined below.
Note
A message indicates whether the action succeeded.
Create a volume type using the steps above for Create a volume type.
Click Create Encryption in the Actions column of the newly created volume type.
Configure the encrypted volume by setting the parameters below from available options (see table):
Specifies the class responsible for configuring the encryption.
Specifies whether the encryption is from the front end (nova) or the back end (cinder).
Specifies the encryption algorithm.
Specifies the encryption key size.
Click Create Volume Type Encryption.
The table below provides a few alternatives available for creating encrypted volumes.
Encryption parameters | Parameter options | Comments |
---|---|---|
Provider | nova.volume.encryptors. luks.LuksEncryptor (Recommended) | Allows easier import and migration of imported encrypted volumes, and allows access key to be changed without re-encrypting the volume |
nova.volume.encryptors. cryptsetup. CryptsetupEncryptor | Less disk overhead than LUKS | |
Control Location | front-end (Recommended) | The encryption occurs within nova so that the data transmitted over the network is encrypted |
back-end | This could be selected if a cinder plug-in supporting an encrypted back-end block storage device becomes available in the future. TLS or other network encryption would also be needed to protect data as it traverses the network | |
Cipher | aes-xts-plain64 (Recommended) | See NIST reference below to see advantages* |
aes-cbc-essiv | Note: On the command line, type ‘cryptsetup benchmark’ for additional options | |
Key Size (bits) | 512 (Recommended for aes-xts-plain64. 256 should be used for aes-cbc-essiv) | Using this selection for aes-xts, the underlying key size would only be 256-bits* |
256 | Using this selection for aes-xts, the underlying key size would only be 128-bits* |
* Source NIST SP 800-38E
Note
To see further information and CLI instructions, see Create an encrypted volume type in the OpenStack Configuration Reference.
When you delete a volume type, volumes of that type are not deleted.
Note
A message indicates whether the action succeeded.
When you delete an instance, the data of its attached volumes is not destroyed.
Note
A message indicates whether the action succeeded.
Except where otherwise noted, this document is licensed under Creative Commons Attribution 3.0 License. See all OpenStack Legal Documents.