This document explains how to configure LUKS encryption on a non boot disk using a key stored in /root. This assumes that your root partition is encrypted to ensure the key is completely secured at an at rest state. We will consider /dev/sdb1 to be the secondary partition in this article. It is also assumed that your partition is already created.
yum install -y cryptsetup-luks
cryptsetup luksFormat --type luks2 /dev/sdb1
cryptsetup luksOpen /dev/sdb1 backups
dd if=/dev/zero of=/dev/mapper/backups && mkfs.ext4 /dev/mapper/backups
dd if=/dev/urandom of=/root/keyfile bs=1024 count=4
chmod 0400 /root/keyfile
cryptsetup luksAddKey /dev/sdb1 /root/keyfile
echo "backups /dev/sdb1 /root/keyfile luks" >> /etc/crypttab
echo "/dev/mapper/backups /backups ext4 defaults 0 2" >> /etc/fstab
systemctl enable clevis-luks-askpass.path
shutdown -r now