YaK User Documentation
YaK Landing PageVisit dbi-services.comContact us
YaK Release 2.1
YaK Release 2.1
  • Welcome
  • Introduction
    • YaK Core
    • YaK Components
    • Terms and definitions
  • User interface
    • Dashboard
    • Infrastructures
    • Servers
    • Components
    • Jobs
    • Configuration
    • Administration
  • YaK Demo
  • Versioning & Compatibility matrix
  • Release Notes
    • YaK components types
      • PostgreSQL
      • Oracle
  • Installation
    • System requirements
    • Install YaK Core
      • Install YaK on your own K8S cluster
      • Install YaK on Rancher Desktop
      • Uninstall Yak
  • YaK step-by-step usage
  • Configuration
    • Secrets
    • Templates
    • Provider shapes
    • Provider images
    • Artifact providers
  • Manage infrastructures
    • Declare infrastructures
    • Attach Secrets
    • Detach Secrets
  • Manage Servers
    • Declare servers
      • Basics
      • Storage
      • Attach secrets
    • Edit server configuration
    • Deploy servers
    • Destroy servers
    • Delete servers
    • Start / Stop servers
  • Manage Components
    • Artifacts requirements
    • Component types
      • PostgreSQL
        • Description
        • Pre-requisites
        • Component references
          • PostgreSQL 2.0.0
            • Standalone deployment variables
            • HA deployment variables
      • Oracle
        • Description
        • Pre-requisites
        • Component references
          • Oracle 2.0.0
            • Standalone variables
  • Use cases
    • On-Premises
    • AWS
    • Azure
    • OCI
  • Appendix
    • Create SSH Keys with PuTTYgen
    • Roles
Powered by GitBook
On this page
  1. Manage Servers
  2. Declare servers

Storage

PreviousBasicsNextAttach secrets

Last updated 2 months ago

This section allows you to manage the root disk configuration of your server.

The YaK sets default values for your root disk (encryption, size, disk type, deletion policy).

However these values can be changed:

  • by editing the values in the form directly

  • by loading a root disk storage template by clicking the "Load Template" button (a root disk template must have been defined first, see section "").

Encryption settings If your organization is subject to corporate or regulatory policies that require encryption of data, we recommend that you create an encrypted file system.

YaK supports the following encryption methods for each cloud provider:

  • AWS (at-rest): Creates an encrypted file system that encrypts all of your data and metadata at rest using an AES-256 encryption algorithm.

  • OCI (in-transit): Enables or disables in-transit encryption between the instance and its volumes.

  • Azure (at host): Data stored on the VM host is encrypted at rest and flows are encrypted to the storage service. Azure disk encryption parameter must be enabled at subscription level from your Azure account otherwise, the server cannot be encrypted.

Templates