On Mar 25, 2014, at 3:30 PM, Carlos Espejo <carlosesp...@gmail.com> wrote: > Anybody running their PostgreSQL server from a ecryptfs container? What are > the common production setups out there? What are the drawbacks that people > have experienced with their solution?
We run postgres on XFS on lvm volumes put on top of cloud block devices encrypted with LUKS. It feels like a lot of layers, but it lets us add more encrypted disk space on the fly very easily (especially since I've got all this config set up in a chef cookbook). It seems to work just fine. I haven't done any testing, but I am pretty sure that it adds latency. But hey, if you need crypto, you need it. :-) We currently store the keys to LUKS encrypted with the host's private chef key as a host attribute in the chef-server so that the key data at rest would be safe, and we have an init script that the cookbook installs early in the boot sequence that gets/decrypts the keys from chef, starts crypto up, and mounts the filesystems before postgres starts up. We've got some plans to improve this, but it's a heck of a lot better than storing them locally, and a heck of a lot cheaper than a real HSM. Another option that we liked and tested out, but discarded because of cost, was Gazzang. They have a really slick setup. Pretty much plug n play, and work really well in the cloud, which is where we are. The one thing that I have run into that was a problem with doing this on a loopback device mapped to a file on a host rather than directly on a real block device. We did this on some cassandra servers, and pretty quickly began seeing corruption. We never figured out where the problem was, but it was a real pain to deal with. I'd avoid doing that. Hope that helps. Have fun! -tspencer -- Sent via pgsql-general mailing list (pgsql-general@postgresql.org) To make changes to your subscription: http://www.postgresql.org/mailpref/pgsql-general