Re: LUKS in failover cluster

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

On Fri, Oct 07, 2011 at 05:54:48PM -0700, Sohl, Jacob (LNG-SEA) wrote:
> Hi all,
> 
> I've been working on a design for an encrypted fileserver using RHEL6.x.
> On a single server the stack is pretty simple:
> 
> SAN LUNs > LUKS > LVM > XFS > Samba Server
> 
>  
> 
> But I would like to have a second node for High-Availability failover
> (SAN storage is available to both nodes). I'm looking at Red Hat Cluster
> Suite with corosyn, rgmanager. rgmanager has the ability to manage LVM,
> XFS and Samba resources. In the event of node failure, it will migrate
> all resources to the healthy node. But the resources are only available
> if the SAN volumes are decrypted:
> 
> cryptsetup luksOpen /dev/sdc1 crypt_vol
>
>  
> 
> Is it possible to have the raw volumes decrypted on both systems, maybe
> during boot. So the LUKS device (/dev/mapper/crypt_vol) will be
> available on the backup node in the event of primary node failure. The
> other resources - LVM, XFS, Samba - would only be on one node at a time,
> so no filesystem access from the passive node. If this is not possible
> then can you suggest another solution?

You can map ("decrypt") the devices and never use them. The
LVM/mount/whatever is completely optional.

In fact the mapper tool (cryptsetup) does nothing except
to decrypt the raw encrypted device to a raw decrypted device
under /dev/mapper/.
 
  
> Also, scalability is a requirement in my design, hence XFS. I was
> thinking I needed to use multiple LUKS PVs in LVM to grow the
> filesystem. But I would end up with multiple LUKS devices to keep track
> of. I recently found out that LUKS can resize. 

LUKS _cannot_ resize. The thing is that LUKS does not care about
device size. So if you enlarge a device/partition with an intact
LUKS header, "cryptsetup luksOpen" will just map the larger 
device.

If you have multiple devices, you can "slave" the additional ones
to a "master" device using something like "decrypt_derived". 
This just takes the master key from the opened "master" container,
runns it though a hash and uses this as key for the "slave"
device. 

> Would it be better to
> create one LUKS device on top of LVM? Then create a filesystem on that?
> (Though that would affect resource dependencies.)

Sre you sure you need LVM at all?

> But basically:
> 
> SAN LUNs > LVM > LUKS > XFS > Samba Server
> 
>  
> 
> Other people will be accessing/managing this system, so I want
> manageability through simplicity. 

Hence the question whether you actually need LVM. 
It strikes me that typically LVM is not needed and
just complicates matters. 

> Don't want to have the wrong volumes
> (re)encrypted, headers damaged, etc.

I think this setup is already too complicated for most people
to manage. A full backup should be part of your plans. 
Resize with backup is actually easier, as you can just
backup, kill everything and do a clean new config.

> Anyways, thanks for your help.
> 

Just to make sure: You _have_ read the FAQ?
 
Arno

> 
> Jacob Sohl  |  Systems Engineer
> 
> Applied Discovery(r)
> 
> Mobile: 360-620-2695
> 
>  
> 

> _______________________________________________
> dm-crypt mailing list
> dm-crypt@xxxxxxxx
> http://www.saout.de/mailman/listinfo/dm-crypt


-- 
Arno Wagner, Dr. sc. techn., Dipl. Inform., CISSP -- Email: arno@xxxxxxxxxxx 
GnuPG:  ID: 1E25338F  FP: 0C30 5782 9D93 F785 E79C  0296 797F 6B50 1E25 338F
----
Cuddly UI's are the manifestation of wishful thinking. -- Dylan Evans

If it's in the news, don't worry about it.  The very definition of 
"news" is "something that hardly ever happens." -- Bruce Schneier 
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux