You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-machines/linux/disk-encryption-linux.md
+12-7Lines changed: 12 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -203,9 +203,9 @@ The following table lists Resource Manager template parameters for existing or r
203
203
| keyEncryptionKeyURL | URL of the key encryption key that's used to encrypt the encryption key. This parameter is optional if you select **nokek** in the UseExistingKek drop-down list. If you select **kek** in the UseExistingKek drop-down list, you must enter the _keyEncryptionKeyURL_ value. |
204
204
| volumeType | Type of volume that the encryption operation is performed on. Valid values are _OS_, _Data_, and _All_.
205
205
| forceUpdateTag | Pass in a unique value like a GUID every time the operation needs to be force run. |
206
-
| resizeOSDisk | Should the OS partition be resized to occupy full OS VHD before splitting system volume. |
207
206
| location | Location for all resources. |
208
207
208
+
For more information about configuring the Linux VM disk encryption template, see [Azure Disk Encryption for Linux](https://docs.microsoft.com/azure/virtual-machines/extensions/azure-disk-enc-linux).
209
209
210
210
## Use EncryptFormatAll feature for data disks on Linux VMs
211
211
@@ -215,7 +215,7 @@ The **EncryptFormatAll** parameter reduces the time for Linux data disks to be e
215
215
216
216
>[!WARNING]
217
217
> EncryptFormatAll shouldn't be used when there is needed data on a VM's data volumes. You may exclude disks from encryption by unmounting them. You should first try out the EncryptFormatAll first on a test VM, understand the feature parameter and its implication before trying it on the production VM. The EncryptFormatAll option formats the data disk and all the data on it will be lost. Before proceeding, verify that disks you wish to exclude are properly unmounted. </br></br>
218
-
>If you’re setting this parameter while updating encryption settings, it might lead to a reboot before the actual encryption. In this case, you will also want to remove the disk you don’t want formatted from the fstab file. Similarly, you should add the partition you want encrypt-formatted to the fstab file before initiating the encryption operation.
218
+
>If you're setting this parameter while updating encryption settings, it might lead to a reboot before the actual encryption. In this case, you will also want to remove the disk you don't want formatted from the fstab file. Similarly, you should add the partition you want encrypt-formatted to the fstab file before initiating the encryption operation.
219
219
220
220
### EncryptFormatAll criteria
221
221
The parameter goes though all partitions and encrypts them as long as they meet **all** of the criteria below:
@@ -261,17 +261,22 @@ We recommend an LVM-on-crypt setup. For all the following examples, replace the
261
261
- Add the data disks that will compose the VM.
262
262
- Format, mount, and add these disks to the fstab file.
263
263
264
-
1.Format the newly added disk. We use symlinks generated by Azure here. Using symlinks avoids problems related to device names changing. For more information, see the [Troubleshoot Device Names problems](troubleshoot-device-names-problems.md) article.
264
+
1.Choose a partition standard, create a partition that spans the entire drive, and then format the partition. We use symlinks generated by Azure here. Using symlinks avoids problems related to device names changing. For more information, see the [Troubleshoot Device Names problems](troubleshoot-device-names-problems.md) article.
265
265
266
-
`mkfs -t ext4 /dev/disk/azure/scsi1/lun0`
266
+
```azurepowershell-interactive
267
+
parted /dev/disk/azure/scsi1/lun0 mklabel gpt
268
+
parted -a opt /dev/disk/azure/scsi1/lun0 mkpart primary ext4 0% 100%
0 commit comments