Encryption

Encryption at Rest

SingleStore is compatible with at-rest disk-based encryption via LUKS (Linux Unified Key Setup). SingleStore is also compatible with other encryption solutions that may have different security characteristics. Please see our partner integrations documentation or contact us if you have questions about using SingleStore with other encryption technologies.

To use SingleStore with LUKS, configure your block device to be encrypted with LUKS, and then simply install SingleStore on the encrypted volume.

For more information about how to implement LUKS with different versions of Linux, see the links in the section below. Note that ecryptfs should never be used - only volume or block level encryption.

Example Setup Process

  • Prepare block device

  • Encrypt block device with LUKS

  • Create filesystem (i.e., mkfs.ext4 /dev/mapper/myencryptedvolume)

  • Mount filesystem (i.e., mount /dev/mapper/myencryptedvolume /data)

  • Install SingleStore normally to encrypted location using the SingleStore management tools

How to Use LUKS With Different Versions of Linux

In this section

Last modified: July 29, 2024

Was this article helpful?

Verification instructions

Note: You must install cosign to verify the authenticity of the SingleStore file.

Use the following steps to verify the authenticity of singlestoredb-server, singlestoredb-toolbox, singlestoredb-studio, and singlestore-client SingleStore files that have been downloaded.

You may perform the following steps on any computer that can run cosign, such as the main deployment host of the cluster.

  1. (Optional) Run the following command to view the associated signature files.

    curl undefined
  2. Download the signature file from the SingleStore release server.

    • Option 1: Click the Download Signature button next to the SingleStore file.

    • Option 2: Copy and paste the following URL into the address bar of your browser and save the signature file.

    • Option 3: Run the following command to download the signature file.

      curl -O undefined
  3. After the signature file has been downloaded, run the following command to verify the authenticity of the SingleStore file.

    echo -n undefined |
    cosign verify-blob --certificate-oidc-issuer https://oidc.eks.us-east-1.amazonaws.com/id/CCDCDBA1379A5596AB5B2E46DCA385BC \
    --certificate-identity https://kubernetes.io/namespaces/freya-production/serviceaccounts/job-worker \
    --bundle undefined \
    --new-bundle-format -
    Verified OK