You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -40,11 +41,16 @@ In a similar way, the RAID device is created on top of the encrypted layer on th
40
41
### Considerations
41
42
42
43
The recommended method to use is LVM-on-Crypt.
44
+
43
45
RAID is considered when LVM can't be used because of specific application/environment limitations.
44
-
You'll use the EncryptFormatAll option, check all the information about this feature here https://docs.microsoft.com/azure/virtual-machines/linux/disk-encryption-linux#use-encryptformatall-feature-for-data-disks-on-linux-vms.
46
+
47
+
You'll use the EncryptFormatAll option, information about this feature is located here: https://docs.microsoft.com/azure/virtual-machines/linux/disk-encryption-linux#use-encryptformatall-feature-for-data-disks-on-linux-vms.
48
+
45
49
While this method can be done when also encrypting the OS, we're just encrypting Data drives.
46
-
This procedure assumes you already reviewed and comply with the pre-requisites mentioned here: https://docs.microsoft.com/en-us/azure/virtual-machines/linux/disk-encryption-linux and here https://docs.microsoft.com/azure/virtual-machines/linux/disk-encryption-cli-quickstart.
47
-
The ADE dual pass version should no longer be used on new ADE encryptions,it is on deprecation path.
50
+
51
+
This procedure assumes you already reviewed the pre-requisites mentioned here: https://docs.microsoft.com/en-us/azure/virtual-machines/linux/disk-encryption-linux and here https://docs.microsoft.com/azure/virtual-machines/linux/disk-encryption-cli-quickstart.
52
+
53
+
The ADE dual pass version is on deprecation path and should no longer be use on new ADE encryptions.
You can notice the file systems were added to /var/lib/azure_disk_encryption_config/azure_crypt_mount (in case of an old encryption) or added to /etc/crypttab file in case or a newer encryption.
216
+
217
+
The extension will add the filesystems to "/var/lib/azure_disk_encryption_config/azure_crypt_mount" (an old encryption) or added to "/etc/crypttab" (new encryptions).
209
218
210
219
Do not modify any of these files.
211
220
212
221
This file is going to be taking care of activating these disks during the boot process so they can be later used by LVM or RAID.
213
222
214
-
Do not worry about the mount points on this file, as ADE will lose the ability to get the disks mounted as a normal file system after we do a pvcreate or mdadm --create on top of those encrypted devices(which will get rid of the file system format we used during the preparation process).
223
+
Do not worry about the mount points on this file, as ADE will lose the ability to get the disks mounted as a normal file system after we do create a physical volume or a raid device on top of those encrypted devices(which will get rid of the file system format we used during the preparation process).
215
224
#### Remove the temp folders and temp fstab entries
216
-
You need to unmount the filesystems on the disks that will be used as part of LVM
225
+
You unmount the filesystems on the disks that will be used as part of LVM
217
226
```bash
218
227
fordiskin c d e f;do umount /tempdata${disk};done
219
228
```
@@ -234,10 +243,12 @@ cat /etc/fstab
234
243
### For LVM-on-Crypt:
235
244
Now that the underlying disks are encrypted, you can proceed to create the LVM structures.
236
245
237
-
Instead of using the device name, use the /dev/mapper paths for each of the disks to perform a pvcreate (on the crypt layer on top of the disk not on the disk itself).
246
+
Instead of using the device name, use the /dev/mapper paths for each of the disks to create a physical volume (on the crypt layer on top of the disk not on the disk itself).
238
247
### Configure LVM on top of the encrypted layers
239
248
#### Create the Physical Volumes
240
-
You'll get a warning asking if it is OK to wipe out the filesystem signature. You may continue by entering 'y' or use the echo "y" as shown:
249
+
You'll get a warning asking if it's OK to wipe out the filesystem signature.
250
+
251
+
You may continue by entering 'y' or use the echo "y" as shown:
On this variation of lsblk, we're listing the devices showing the dependencies on reverse order, this option helps to identify the devices grouped by the logical volume instead of the original /dev/sd[disk] device names.
303
314
304
-
Important: Make sure the nofail option is added to the mount point options of the LVM volumes created on top of an ADE encrypted device. Is important to avoid the OS from getting stuck during the boot process (or in maintenance mode). The encrypted disk will be unlocked at the end of the boot process and the LVM volumes and file systems will be automatically mounted until they're unlocked by ADE, if the nofail option is not used, the OS will never get into the stage where ADE is started, and the data disk(s) are unlocked and mounted.
315
+
Important: Make sure the "nofail" option is added to the mount point options of the LVM volumes created on top of an ADE encrypted device. Is important to avoid the OS from getting stuck during the boot process (or in maintenance mode).
305
316
306
-
You can test rebooting the VM and validating the file systems are also automatically getting mounted after boot time. Take under consideration that this process may take several minutes depending on the number of file systems and the sizes
317
+
The encrypted disk are unlock at the end of the boot process, the LVM volumes and file systems will be automatically mounted.
318
+
319
+
If the nofail option isn't used, the OS will never get into the stage where ADE is started, and the data disk(s) are unlocked and mounted.
320
+
321
+
You can test rebooting the VM and validating the file systems are also automatically getting mounted after boot time.
322
+
323
+
Take under consideration that this process may take several minutes depending on the number of file systems and the sizes
Important: Make sure the "nofail" option is added to the mount point options of the RAID volumes created on top of an ADE encrypted device.
356
375
357
-
Important: Make sure the nofail option is added to the mount point options of the RAID volumes created on top of an ADE encrypted device.
376
+
Is very important to avoid the OS from getting stuck during the boot process (or in maintenance mode).
358
377
359
-
This is very important to avoid the OS from getting stuck during the boot process (or in maintenance mode). The encrypted disk will be unlocked at the end of the boot process and the RAID volumes and file systems will be automatically mounted until they're unlocked by ADE, if the nofail option is not used, the OS will never get into the stage where ADE is started, and the data disks are unlocked and mounted.
378
+
The encrypted disk will be unlock at the end of the boot process and the RAID volumes and file systems will be automatically mounted until they're unlocked by ADE, if the nofail option is not used.
360
379
361
-
You can test rebooting the VM and validating the file systems are also automatically getting mounted after boot time. Please take under consideration that this process may take several minutes depending on the amount of file systems and the sizes
380
+
The OS will never get into the stage where ADE is started, and the data disks are unlocked and mounted.
381
+
382
+
You can test rebooting the VM and validating the file systems are also automatically getting mounted after boot time. Take under consideration that this process may take several minutes depending on the number of file systems and the sizes
0 commit comments