Overview
Volume encryption provides transparent at-rest protection for block storage data. Encryption is configured per volume type — all volumes created from an encrypted type are automatically encrypted without any additional action from you. Encryption keys are managed by the Xloud Key Management service and retrieved at volume attach time by the volume service, ensuring keys are never stored on the compute node’s disk.- XDeploy
- CLI
Disk encryption is enabled through the XDeploy Configuration panel:
Enable KMS first
Navigate to XDeploy → Configuration → Advance Features and ensure
Enable KMS is set to Yes. Disk encryption requires the Xloud Key
Management service to store and manage encryption keys.
Prerequisites
- Administrator credentials with the
adminrole - Xloud Key Management service deployed and accessible
- At least one unencrypted volume type to apply encryption to (or create a new type)
- All compute nodes must be able to reach the Key Management service API
Encryption Architecture
| Component | Role |
|---|---|
| Block Storage API | Creates volume with encryption metadata; requests key from KMS |
| Key Management Service | Generates and stores the encryption key; returns it at attach time |
| Volume Service | Provisions the volume on the backend with encryption metadata |
| Hypervisor (dm-crypt) | Applies LUKS encryption/decryption at the block device layer |
Configure Volume Type Encryption
- Dashboard
- CLI
Select the volume type to encrypt
Log in to the Xloud Dashboard (
https://connect.<your-domain>) and navigate to
Admin → Volumes → Volume Types. Click the volume type name to open its
details page.Create encryption settings
Click Create Encryption. Configure the parameters:
Click Create Volume Type Encryption.
| Field | Recommended Value | Description |
|---|---|---|
| Provider | LuksEncryptor | LUKS-based encryption via dm-crypt |
| Cipher | aes-xts-plain64 | AES-XTS — FIPS-compatible, hardware-accelerated |
| Key Size | 256 | Key length in bits (256 for AES-256) |
| Control Location | front-end | Encryption applied at the hypervisor layer |
Test Encryption
Verify that encryption is working end-to-end by creating and attaching a test volume:Verify LUKS inside the instance
SSH into the instance and check the block device:
Check LUKS header
Device reports LUKS encryption — volume is encrypted at rest.
Key Management Dependency
If the Key Management service is unavailable, attaching an encrypted volume will fail with an authentication or connectivity error.Per-Volume Selective Encryption
Xloud-Developed — This capability is developed by Xloud and ships with XAVS / XPCI.
- Per-tenant key isolation — each tenant’s encryption keys are stored and managed independently in the Xloud Key Management service. Tenants cannot access each other’s keys, even if they share the same storage backend.
- Three independent encryption layers — Xloud provides encryption at three distinct levels that can be enabled independently or together:
| Layer | Scope | Encryption Point |
|---|---|---|
| Storage device encryption | Full disk on physical storage nodes | Hardware or dm-crypt on the OSD device |
| Block volume encryption | Individual persistent volumes | LUKS at the hypervisor (dm-crypt) per volume type |
| Compute ephemeral disk encryption | Instance root and ephemeral disks | LUKS at the hypervisor for ephemeral storage |
Next Steps
Key Manager User Guide
Manage encryption keys and secrets in the Xloud Key Management service
Volume Types & QoS
Create and manage volume types with backend associations
Security Hardening
Additional security policies for Block Storage
Admin Guide
Return to the Block Storage administration overview