3.6 KiB
Deploy MinIO and KES with Server-Side Encryption using Hashicorp Vault
Prior to starting these steps, create the following folders:
New-Item -Path "|kescertpath|" -ItemType "directory"
New-Item -Path "|kesconfigpath|" -ItemType "directory"
New-Item -Path "|miniodatapath|" -ItemType "directory"
1) Download KES for Windows
2) Generate TLS Certificates for KES and MinIO
Depending on your Vault configuration, you may need to pass the
kes-server.cert
as a trusted Certificate Authority. See the
Hashicorp
Vault Configuration Docs for more information. Defer to the client
documentation for instructions on trusting a third-party CA.
3) Create the KES and MinIO Configurations
Create the KES Configuration File
Create the configuration file using your preferred text editor. The following example uses the Windows Notepad program:
|kesconfigpath|\kes-config.yaml notepad
Set
MINIO_IDENTITY_HASH
to the identity hash of the MinIO mTLS certificate.The following command computes the necessary hash:
kes.exe tool identity of |miniocertpath|/minio-kes.cert
Replace the
REGION
with the appropriate region for AWS Secrets Manager. The value must match for bothendpoint
andregion
.Set
AWSACCESSKEY
andAWSSECRETKEY
to the appropriateAWS Credentials <minio-sse-aws-prereq-aws>
.
Create the MinIO Environment File
Create the environment file using your preferred text editor. The following example uses the Windows Notepad program:
|minioconfigpath|\minio notepad
4) Start KES and MinIO
You must start KES before starting MinIO. The MinIO deployment requires access to KES as part of its startup.
- Start the KES Server
- Start the MinIO Server