Re-encrypt Existing Controller and CoPilot Volumes Using a Custom Key
You can re-encrypt your existing Controller and CoPilot volumes using a custom key.
Prerequisites
To proceed with the re-encryption process, check the prerequisites below:
-
Make sure the data on the Controller and CoPilot volumes are fully backed up.
-
Make sure your custom key meet the encryption standards and is stored securely.
Re-encrypt Existing Controller and CoPilot Volumes
-
Log into CoPilot, from Settings > Resources > Index Management, click the download button to download the index lists.
-
Identify your old volume ID. Go to your cloud service provider console. Select your Aviatrix CoPilot deployment and under the Storage section, locate and note down the volume ID you intend to re-encrypt with your custom key.
-
Create a snapshot. Go to Elastic Block Store > Snapshots > Create snapshot. On the Create snapshot page, select the old volume ID from the volume drop-down list to generate a snapshot.
-
Create a volume from snapshot.
-
Once the snapshot is created, select it and then click Action > Create volume from snapshot.
-
On the subsequent volume settings page,specify your custom KMS key. Then click Create volume.
-
-
Detach the old volume. Click the old volume, then click Action > Detach volume, click Detach to confirm.
-
Attach the new volume that you encrypted with your custom KMS key.
-
Go to the Volumes section, click the newly created volume, from Actions > Attach volume.
-
On the Attach volume page, choose the intended instance from the drop-down list.
-
Click Attach volume to confirm the volume attachment.
-
-
Verify the new volume with custom KMS key.
-
Go to EC2 > Instances page, you can check the Storage tab, where the new volumes should be listed.
-
You can also go to CoPilot, from Settings > Resources > Index Management, make sure the listed indices match those previously downloaded.
-