You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-machines/linux/how-to-configure-lvm-raid-on-crypt.md
+26-21Lines changed: 26 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,25 +42,26 @@ In a similar way, the RAID device is created on top of the encrypted layer on th
42
42
43
43
We recommend that you use LVM-on-crypt. RAID is an option when LVM can't be used because of specific application or environment limitations.
44
44
45
-
You'll use the **EncryptFormatAll** option. For more information, see [Use the EncryptFormatAll feature for data disks on Linux VMs](https://docs.microsoft.com/azure/virtual-machines/linux/disk-encryption-linux#use-encryptformatall-feature-for-data-disks-on-linux-vms).
45
+
You'll use the **EncryptFormatAll** option. For more information about this option, see [Use the EncryptFormatAll feature for data disks on Linux VMs](https://docs.microsoft.com/azure/virtual-machines/linux/disk-encryption-linux#use-encryptformatall-feature-for-data-disks-on-linux-vms).
46
46
47
47
Although you can use this method when you're also encrypting the OS, we're just encrypting data drives here.
48
48
49
-
This procedure assumes you already reviewed the prerequisites mentioned in [Azure Disk Encryption scenarios on Linux VMs](https://docs.microsoft.com/azure/virtual-machines/linux/disk-encryption-linux) and in [Quickstart: Create and encrypt a Linux VM with the Azure CLI](https://docs.microsoft.com/azure/virtual-machines/linux/disk-encryption-cli-quickstart).
49
+
The procedures assume that you already reviewed the prerequisites mentioned in [Azure Disk Encryption scenarios on Linux VMs](https://docs.microsoft.com/azure/virtual-machines/linux/disk-encryption-linux) and in [Quickstart: Create and encrypt a Linux VM with the Azure CLI](https://docs.microsoft.com/azure/virtual-machines/linux/disk-encryption-cli-quickstart).
50
50
51
51
The Azure Disk Encryption dual-pass version is on a deprecation path and should no longer be used on new encryptions.
52
52
53
53
## General steps
54
54
55
-
When you're using the "oncrypt" configurations, use the process outlined in the following procedures.
55
+
When you're using the "on-crypt" configurations, use the process outlined in the following procedures.
56
56
57
57
>[!NOTE]
58
58
>We're using variables throughout the article. Replace the values accordingly.
59
59
60
60
### Deploy a VM
61
-
The following commands are optional, but we recommend that you to apply them on a newly deployed virtual machine (VM).
61
+
The following commands are optional, but we recommend that you apply them on a newly deployed virtual machine (VM).
@@ -154,7 +159,7 @@ for disk in c d e f; do echo mkfs.ext4 -F /dev/sd${disk}; done |bash
154
159
```
155
160

156
161
157
-
Find the universally unique identifier (UUID) of the file systems that you recently created, create a temporary folder to mount it, add the corresponding entries on /etc/fstab, and mount all the file systems.
162
+
Find the universally unique identifier (UUID) of the file systems that you recently created, create a temporary folder, add the corresponding entries on /etc/fstab, and mount all the file systems.
158
163
159
164
This command also iterates on each disk defined on the "in" part of the "for" cycle:
160
165
@@ -172,7 +177,7 @@ lsblk
172
177
```
173
178


226
+

222
227
223
228
Azure CLI:
224
229
225
230
```bash
226
231
az vm encryption show -n ${VMNAME} -g ${RGNAME} -o table
227
232
```
228
-

233
+

229
234
230
235
Portal:
231
236
232
-

237
+

233
238
234
239
OS level:
235
240
236
241
```bash
237
242
lsblk
238
243
```
239
-

244
+

240
245
241
246
The extension will add the file systems to /var/lib/azure_disk_encryption_config/azure_crypt_mount (an old encryption) or to /etc/crypttab (new encryptions).

294
+

290
295
291
296
>[!NOTE]
292
-
>The /dev/mapper/device names here need to be replaced for your actual values based on the output of lsblk.
297
+
>The /dev/mapper/device names here need to be replaced for your actual values based on the output of **lsblk**.
293
298
294
299
#### Verify the information for physical volumes
295
300
```bash
@@ -367,10 +372,10 @@ It's important to make sure that the **nofail** option is added to the mount poi
367
372
368
373
If you don't use the **nofail** option:
369
374
370
-
- The OS will never get into the stage where Azure Disk Encryption is started, and the data disks are unlocked and mounted.
375
+
- The OS will never get into the stage where Azure Disk Encryption is started and the data disks are unlocked and mounted.
371
376
- The encrypted disks will be unlocked at the end of the boot process. The LVM volumes and file systems will be automatically mounted until Azure Disk Encryption unlocks them.
372
377
373
-
You can test rebooting the VM and validate that the file systems are also automatically getting mounted after boot time. This process might take several minutes, depending on the number and the sizes of file systems.
378
+
You can test rebooting the VM and validate that the file systems are also automatically getting mounted after boot time. This process might take several minutes, depending on the number and sizes of file systems.
374
379
375
380
#### Reboot the VM and verify after reboot
376
381
@@ -399,7 +404,7 @@ mdadm --create /dev/md10 \
399
404
>[!NOTE]
400
405
>The /dev/mapper/device names here need to be replaced with your actual values, based on the output of **lsblk**.
401
406
402
-
### Check/monitor the RAID creation
407
+
### Check/monitor RAID creation
403
408
```bash
404
409
watch -n1 cat /proc/mdstat
405
410
mdadm --examine /dev/mapper/[]
@@ -422,7 +427,7 @@ mount -a; \
422
427
done
423
428
```
424
429
425
-
Verify that the new file systems are mounted:
430
+
Verify that the new file system is mounted:
426
431
427
432
```bash
428
433
lsblk -fs
@@ -434,10 +439,10 @@ It's important to make sure that the **nofail** option is added to the mount poi
434
439
435
440
If you don't use the **nofail** option:
436
441
437
-
- The OS will never get into the stage where Azure Disk Encryption is started, and the data disks are unlocked and mounted.
442
+
- The OS will never get into the stage where Azure Disk Encryption is started and the data disks are unlocked and mounted.
438
443
- The encrypted disks will be unlocked at the end of the boot process. The RAID volumes and file systems will be automatically mounted until Azure Disk Encryption unlocks them.
439
444
440
-
You can test rebooting the VM and validate that the file systems are also automatically getting mounted after boot time. This process might take several minutes, depending on the number and the sizes of file systems.
445
+
You can test rebooting the VM and validate that the file systems are also automatically getting mounted after boot time. This process might take several minutes, depending on the number and sizes of file systems.
0 commit comments