Encryption at Rest
SingleStoreDB is compatible with at-rest disk-based encryption via LUKS (Linux Unified Key Setup). SingleStoreDB is also compatible with other encryption solutions that may have different security characteristics. Please see our partner integrations documentation or contact us if you have questions about using SingleStoreDB with other encryption technologies.
To use SingleStoreDB with LUKS, configure your block device to be encrypted with LUKS, and then simply install SingleStoreDB on the encrypted volume.
For more information about how to implement LUKS with different versions of Linux, see the links in the section below. Note that “ecryptfs” should never be used - only volume or block level encryption.
Example Setup Process
Prepare block device
Encrypt block device with LUKS
Create filesystem (i.e.,
mkfs.ext4 /dev/mapper/myencryptedvolume
)Mount filesystem (i.e.,
mount /dev/mapper/myencryptedvolume /data
)Install SingleStoreDB normally to encrypted location using the SingleStoreDB management tools
How to Use LUKS With Different Versions of Linux
Red Hat Enterprise Linux: For an overview on using LUKS with Red Hat, go here.
Red Hat Enterprise Linux version 5 (Linux kernel 2.6.18-8)
Red Hat Enterprise Linux version 6 (Linux kernel 2.6.32-71)
Red Hat Enterprise Linux version 7 (Linux kernel 3.10.0-123)
Red Hat Enterprise Linux version 8 (Linux kernel 4.18.0-193.65.2.el8_2.x86_64)
SUSE Linux Enterprise Server:
SUSE version 10 (Linux kernel 2.6.16.21-0.8)
SUSE version 11 (Linux kernel 2.6.27.19-5.1)
SUSE version 12 (Linux kernel 3.12.28-4.6)
Ubuntu: For information about implementing LUKS on Ubuntu, go here.
openSUSE: For information about implementing LUKS on openSUSE, go here.