Creating a KeyControl Mapping

A KeyControl Mapping lets you create a list of KeyControl Vault for VM Encryption IP addresses that you maintain in KeyControl Vault for VM Encryption. Each KeyControl Vault for VM Encryption node in the Mapping is associated with an externally-visible IP address or hostname that the VMs can use to access that KeyControl Vault for VM Encryption node. If you ever change the list of KeyControl Vault for VM Encryption nodes in the Mapping, KeyControl Vault for VM Encryption automatically disseminates the changes to the each associated VM at its next heartbeat.

Associating a Mapping with a VM enables High Availability between the VM and KeyControl Vault for VM Encryption by enabling failover among the KeyControl Vault for VM Encryption nodes, and it means you do not need to update the individual VMs when KeyControl Vault for VM Encryption nodes are added to, or removed from, the cluster.

For more information on High Availability and failover, see High Availability Between a VM and the KeyControl Cluster.

Procedure 

  1. Log into the KeyControl Vault for VM Encryption using an account with Cloud Admin privileges.
  2. In the top menu bar, click Workloads.
  3. Click the Mappings tab.
  4. Select Actions > Create Mapping.
  5. On the Mapping tab, specify the options you want to use.

  6. When you are done, click Next.
  7. On the Servers tab, create an entry for the first KeyControl Vault for VM Encryption node by specifying the options you want to use.

  8. If you want to add another node, click the + button and enter the appropriate information.
  9. When you are done adding nodes, make sure that the order is correct because the order of the IP addresses in the list determines the order of precedence. The first node in a KeyControl Mapping is considered the preferred node, and all VMs will use that node as long as it is available. If the preferred node is offline when a VM heartbeats, the VM will try the other IP addresses in the Mapping, starting with the second IP address in the list and working downwards. Once the VM finds an available KeyControl Vault for VM Encryption node, it will use that node to complete the current heartbeat, and it will continue to use that node until the cluster returns to a healthy state. After the cluster becomes healthy, the VM will resume using the preferred node at its next heartbeat.

    If you need to change the order, click and hold on the arrow icon at the beginning of the line to drag the entry to the proper position. Release the mouse to drop the entry in the new location.

  10. When all nodes are included and the order is correct, click Create.
  11. At the Mapping Successfully Created message, click Close.
  12. If you want to associate the KeyControl Mapping with an existing VM that already has the Policy Agent installed:

    1. Log into the VM as an administrator.
    2. Enter the command hcl updatekc -a and enter the credentials for a KeyControl Vault for VM Encryption user account with Cloud Admin privileges at the prompt. KeyControl Vault for VM Encryption displays a list of available KeyControl Mapping that you can use with the VM.

    3. Select the KeyControl Mapping you want to use from the list. KeyControl Vault for VM Encryption echoes the IP addresses in the list for confirmation.

    Note: For details about specifying a KeyControl Mapping when you install the Policy Agent, see Linux Policy Agent Installation or Windows Policy Agent Installation.