You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
**This scenario is applicable to ADE dual-pass and single-pass extensions.**
18
+
**This scenario applies for ADE dual-pass and single-pass extensions.**
19
19
This Document scope is to validate the encryption status of a virtual machine using different methods.
20
20
21
21
### Environment
@@ -24,35 +24,54 @@ This Document scope is to validate the encryption status of a virtual machine us
24
24
25
25
### Procedure
26
26
27
-
1. A virtual machine has been encrypted using dual-pass or single-pass.
28
-
2. Once the encryption process is triggered (in progress) or has been completed, we can validate the encryption status using different methods defined below
27
+
A virtual machine has been encrypted using dual-pass or single-pass.
28
+
29
+
The encryption status can be validated during or after the encryption using different methods.
30
+
31
+
>[!NOTE]
32
+
>We're using variables throughout the document, replace the values accordingly.
29
33
30
34
### Verification
31
35
32
-
The encryption status validation can be done from the Portal, PowerShell, AZ CLI and/or within the VM (OS side). Below the different validations methods:
36
+
The verification can be done from the Portal, PowerShell, AZ CLI and, or from the VM OS side.
37
+
38
+
This verification can be done by checking the disks attached to a particular VM.
39
+
40
+
Or by querying the encryption settings on each individual disk whether the disk is attached or unattached.
33
41
34
-
## Using the Portal:
42
+
Below the different validations methods:
35
43
36
-
- You can validate the encryption status of a virtual machine by taking a look at the extensions blade in the corresponding virtual machine from the Portal.
37
-
Inside the **Extensions** blade, you will see the ADE extension listed. You can click it and take a look at the **status message** which will indicate the current encryption status:
44
+
## Using the Portal
45
+
46
+
Validate the encryption status by checking the extensions section on the Azure portal.
47
+
48
+
Inside the **Extensions** section, you'll see the ADE extension listed.
49
+
50
+
Click it and take a look at the **status message**, it will indicate the current encryption status:
38
51
39
52

40
53
41
-
In the list of extensions, you will also be able to see the corresponding ADE extension version. Version 0.x corresponds to ADE Dual-Pass and version 1.x corresponds to ADE Single-pass
42
-
You can also get further details clicking on the extension and then on *View detailed status*, once that's done, you will be able to see a more detailed status of the encryption process in json format as shown in the image below:
54
+
In the list of extensions, you'll see the corresponding ADE extension version. Version 0.x corresponds to ADE Dual-Pass and version 1.x corresponds to ADE Single-pass.
55
+
56
+
You can get further details clicking on the extension and then on *View detailed status*.
57
+
58
+
You'll see a more detailed status of the encryption process in json format:
43
59
44
60

45
61
46
62

47
63
48
-
-Another way of validating the encryption status is by taking a look at the **Disks**blade. Over there, you get to see if encryption is enabled on each disk attached to a particular VM.
64
+
Another way of validating the encryption status is by taking a look at the **Disks**section.
49
65
50
66

51
67
52
68
>[!NOTE]
53
-
> As a warning, this status is not too accurate. This just means the disks have encryption settings stamped but not that they were actually encrypted at OS level. Unfortunately by the way the ADE extension design works today, the disks get stamped first and encrypted later. If the encryption process fails, the disks may end up stamped but not encrypted. To confirm if the disks are truly encrypted, you can double check the encryption of each disk at OS level, following instructions in one of the upcoming sections.
69
+
> This status means the disks have encryption settings stamped but not that they were actually encrypted at OS level.
70
+
> By design, the disks get stamped first and encrypted later.
71
+
> If the encryption process fails, the disks may end up stamped but not encrypted.
72
+
> To confirm if the disks are truly encrypted, you can double check the encryption of each disk at OS level.
54
73
55
-
## Using PowerShell:
74
+
## Using PowerShell
56
75
57
76
You can validate the **general** encryption status of an encrypted VM using the following PowerShell commands:
58
77
@@ -61,17 +80,12 @@ You can validate the **general** encryption status of an encrypted VM using the
You can capture the encryption settings from each individual disk using the following PowerShell commands:
71
86
72
-
**Single-Pass:**
73
-
In the case of single-pass the encryption settings are stamped in each of the disks (OS and Data).
74
-
You can capture the OS disk encryption settings in single pass as follows:
87
+
### Single-Pass
88
+
If single-pass, the encryption settings are stamp on each of the disks (OS and Data), you can capture the OS disk encryption settings in single pass as follows:

250
265
251
-
## From the Linux VM OS:
252
-
Validate if the data disk partitions are encrypted (and the OS disk is not). When a partition/disk is encrypted it's displayed as **crypt** type, when it's not encrypted it is displayed as **part/disk** type
266
+
### Unattached disks
267
+
268
+
Check the encryption settings for disks that aren't attached to a VM.
You can get further details using the following "lsblk" variant. Using this one, you'll see a **crypt** type layer that is mounted by the extension, the following example shows Logical Volumes and normal disks having a **crypto\_LUKS FSTYPE**.
354
+
You can get further details using the following "lsblk" variant.
355
+
356
+
You'll see a **crypt** type layer that is mounted by the extension.
357
+
358
+
The following example shows Logical Volumes and normal disks having a "**crypto\_LUKS FSTYPE**".
0 commit comments