You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Repeat this step for each node type that requires disk encryption or mirroring.
291
291
292
+
. If you enable encryption, edit the manifest that was produced by the previous step and replace the cipher `aes-cbc-essiv:sha256` with `aes-xts-plain64`.
293
+
The following excerpt shows a sample encryption configuration after this change:
294
+
+
295
+
[source,yaml]
296
+
----
297
+
# ...
298
+
luks:
299
+
# ...
300
+
options:
301
+
- --cipher
302
+
- aes-xts-plain64
303
+
----
304
+
292
305
. Save the Butane configuration file in case you need to update the manifests in the future.
293
306
294
307
. Continue with the remainder of the {product-title} installation.
@@ -357,7 +370,6 @@ In such situations, it is possible to access nodes using `ssh core@<node>.<clust
357
370
<1> The encryption format.
358
371
When the TPM v2 or Tang encryption modes are enabled, the {op-system} boot disks are encrypted using the LUKS2 format.
359
372
<2> The encryption algorithm used to encrypt the LUKS2 volume.
360
-
The `aes-cbc-essiv:sha256` cipher is used if FIPS mode is enabled.
361
373
<3> The device that contains the encrypted LUKS2 volume.
362
374
If mirroring is enabled, the value will represent a software mirror device, for example `/dev/md126`.
0 commit comments