Enable encryption on a running Linux VM.

Last updated: 9/21/2016

This template enables encryption on a running linux vm using AAD client secret.

This Azure Resource Manager template was created by a member of the community and not by Microsoft. Each Resource Manager template is licensed to you under a license agreement by its owner, not Microsoft. Microsoft is not responsible for Resource Manager templates provided and licensed by community members and does not screen for security, compatibility, or performance. Community Resource Manager templates are not supported under any Microsoft support program or service, and are made available AS IS without warranty of any kind.

Parameters

Parameter Name Description
aadClientID Client ID of AAD app which has permissions to KeyVault
aadClientSecret Client Secret of AAD app which has permissions to KeyVault
diskFormatQuery the query string used to identify the disks to format and encrypt. This parameter only works when you set the EncryptionOperation as EnableEncryptionFormat. For example, passing [{"dev_path":"/dev/md0","name":"encryptedraid","file_system":"ext4"}] will format /dev/md0, encrypt it and mount it at /mnt/dataraid. This parameter should only be used for RAID devices. The specified device must not have any existing filesystem on it.
encryptionOperation EnableEncryption would encrypt the disks in place and EnableEncryptionFormat would format the disks directly
volumeType Defines which drives should be encrypted. OS encryption is supported on RHEL 7.2, CentOS 7.2 & Ubuntu 16.04.
keyEncryptionKeyURL URL of the KeyEncryptionKey used to encrypt the volume encryption key
keyVaultName Name of the KeyVault to place the volume encryption key
keyVaultResourceGroup Resource group of the KeyVault
passphrase The passphrase for the disks
sequenceVersion sequence version of the bitlocker operation. Increment this everytime an operation is performed on the same VM
useKek Select kek if the secret should be encrypted with a key encryption key
vmName Name of the virtual machine
_artifactsLocation The base URI where artifacts required by this template are located. When the template is deployed using the accompanying scripts, a private location in the subscription will be used and this value will be automatically generated.
_artifactsLocationSasToken The sasToken required to access _artifactsLocation. When the template is deployed using the accompanying scripts, a sasToken will be automatically generated.

Use the template

PowerShell

New-AzureRmResourceGroupDeployment -Name <deployment-name> -ResourceGroupName <resource-group-name> -TemplateUri https://raw.githubusercontent.com/azure/azure-quickstart-templates/master/201-encrypt-running-linux-vm/azuredeploy.json
Install and configure Azure PowerShell

Command line

azure config mode arm
azure group deployment create <my-resource-group> <my-deployment-name> --template-uri https://raw.githubusercontent.com/azure/azure-quickstart-templates/master/201-encrypt-running-linux-vm/azuredeploy.json
Install and Configure the Azure Cross-Platform Command-Line Interface