Bug 2373703 - cephadm support for NFS BYOK
Summary: cephadm support for NFS BYOK
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Ceph Storage
Classification: Red Hat Storage
Component: Cephadm
Version: 8.1
Hardware: Unspecified
OS: Unspecified
unspecified
high
Target Milestone: ---
: 8.1z1
Assignee: Adam King
QA Contact: Manisha Saini
Rivka Pollack
URL:
Whiteboard:
Depends On:
Blocks: 2389164
TreeView+ depends on / blocked
 
Reported: 2025-06-18 13:58 UTC by Adam King
Modified: 2025-08-18 14:01 UTC (History)
5 users (show)

Fixed In Version: ceph-19.2.1-224
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
: 2389164 (view as bug list)
Environment:
Last Closed: 2025-08-18 14:01:37 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker RHCEPH-11636 0 None None None 2025-06-18 13:59:35 UTC
Red Hat Product Errata RHBA-2025:14015 0 None None None 2025-08-18 14:01:45 UTC

Description Adam King 2025-06-18 13:58:44 UTC
BZ to track the cephadm support for NFS BYOK. Copying the content from the Jira ticket (https://jsw.ibm.com/browse/ISCE-2129)

Many industries now require highest level of information security. We need to protect our users against information / data theft by providing encryption capabilities for NFS shares/exports. Encryption could be managed centrally by an administrator or directly by the user with a user provided encryption key.

User Stories
As an administrator I want to make sure that the users of my FSaaS services can rely on me protecting their data by encryption per NFS-export so that no other users/tenants can see anyone elses data. Each tenant would get their own NFS-export and each export would be encrypted with a different encryption key.
As an administrator I want to manage my encryption keys with a industry standard KMS like e.g. Hashicorp
As an administrator I want to be able to mount encrypted shares and take incremental backups of them, and restore those snapshots as needed (without ever decrypting)
this means defining a file format for those incremental diffs, to be clear
As an integrator, I want to be able to set up encrypted subvolumes, query libcephfs about if a particular directory needs an encryption key, and identify the name of that key so I can provide it from an existing KMS
As a user I want to be able to bring my own encryption keys and encrypt my own data per share or even per directory

Comment 1 Storage PM bot 2025-06-18 13:59:00 UTC
Please specify the severity of this bug. Severity is defined here:
https://bugzilla.redhat.com/page.cgi?id=fields.html#bug_severity.

Comment 7 errata-xmlrpc 2025-08-18 14:01:37 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Red Hat Ceph Storage 8.1 security and bug fix updates), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2025:14015


Note You need to log in before you can comment on or make changes to this bug.