Using CTE with an Exasol Database
This document describes how to integrate CTE with an Exasol database.
Test Environment
-
CTE Agent: 7.2.0.128
-
CipherTrust Manager: 2.8.0
-
OS: RHEL/CentOS 7.9
-
Exasol DB: 7.1.12
-
File System: LVM (raw device)
Steps
To integrate CTE with an Exasol database:
Install and Register the CTE Agent
-
Install the CTE Agent on the client machine where the Exasol database is configured.
-
Register the CTE Agent with the CipherTrust Manager.
Refer to CTE - Agent Quick Start Guide for details.
Configure the Client Settings
-
Log on to the CipherTrust Manager.
-
Open the Transparent Encryption application.
-
Go to Clients > Client and select the Client. This is the client machine where the Exasol database is configured.
-
Click Client Settings.
-
In the Settings field, add the
hddident
andcos_storage
processes as authenticators. -
Click Apply.
Back up the Exasol Database
Now, on the CTE client (like PuTTY or MobaXterm), back up the Exasol database. To do so:
-
Log on to an SSH client.
-
Run the following commands:
Delete the Exasol Database
After backing up, delete the Exasol database that includes the EXAStorage volumes and disks, and then stop the Exasol service. On an SSH client, run the following commands:
Create a GuardPoint
Create the required GuardPoint on the CTE client from the CipherTrust Manager GUI. While creating the GuardPoint:
-
Select the Type of the device as Auto Raw or Block Device.
-
Enter the Path of the logical volume, for example,
/dev/exa1/lvol0
. -
Select the Policy Type as Standard.
-
Create a User Set named
root
and grant it the permission to perform all Actions and Effects.
Refer to Creating GuardPointsfor details.
Update the Secvm Device
On the SSH client:
-
Run the following command:
The output similar to the following is displayed:
In the above sample output,
/dev/secvm/dev/exa1/lvol0
is the Secvm device. -
Copy the Secvm device.
-
Delete the metadata from the
/7.1.12/exa/metadata
folder.Note
It is recommended to delete the metadata before updating the Secvm device.
-
Update the Secvm device in the
EXAConf
file.-
Navigate to
/7.1.12/exa/etc/
. -
Open the
EXAConf
file in a text editor. -
Search for
Disk
, and update the Devices entry with the copied Secvm device. -
Search for
Checksum
and set the value of Checksum as COMMIT. -
Save the changes and close the file.
-
-
Start the Exasol service by running
systemctl start exasol
. -
Verify the status of the Exasol service by running
systemctl status exasol
. The status must beactive (running)
.
Restore the Exasol Database
On the CTE client, restore the Exasol database by running the following commands:
Validations
-
Start a new session on the SSH client.
-
Encrypt the data on the initial device by running
strings /dev/exa1/lvol0|more
. -
Encrypt the data on the guarded device by running
strings /dev/secvm/dev/exa1/lvol0|more
for the following:-
Policy with
all_ops
action, andPermit
andApplyKey
effects. -
Policy with
all_ops
action andPermit
effect. -
Policy with
all_ops
action andDeny
effect.
Refer to Security Rules for more information on actions and effects.
-
-
Encrypt the data on the original hard disk (excluding the disk headers) by running
strings /dev/sdc|more
.
Note
-
LDT is not tested as LDT does not support raw devices.
-
Initial data transformation is not required as the data is deleted during the Exasol installation.