Re: LUKS in failover cluster

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




> -----Original Message-----
> From: dm-crypt-bounces@xxxxxxxx [mailto:dm-crypt-bounces@xxxxxxxx] On
> Behalf Of Arno Wagner
> Sent: Friday, October 07, 2011 9:53 PM
> To: dm-crypt@xxxxxxxx
> Subject: Re:  LUKS in failover cluster
> 
> Hi,
> 
> On Fri, Oct 07, 2011 at 05:54:48PM -0700, Sohl, Jacob (LNG-SEA) wrote:
> > Hi all,
> >
> > I've been working on a design for an encrypted fileserver using
> RHEL6.x.
> > On a single server the stack is pretty simple:
> >
> > SAN LUNs > LUKS > LVM > XFS > Samba Server
> >
> >
> >
> > But I would like to have a second node for High-Availability
failover
> > (SAN storage is available to both nodes). I'm looking at Red Hat
> Cluster
> > Suite with corosyn, rgmanager. rgmanager has the ability to manage
> LVM,
> > XFS and Samba resources. In the event of node failure, it will
> migrate
> > all resources to the healthy node. But the resources are only
> available
> > if the SAN volumes are decrypted:
> >
> > cryptsetup luksOpen /dev/sdc1 crypt_vol
> >
> >
> >
> > Is it possible to have the raw volumes decrypted on both systems,
> maybe
> > during boot. So the LUKS device (/dev/mapper/crypt_vol) will be
> > available on the backup node in the event of primary node failure.
> The
> > other resources - LVM, XFS, Samba - would only be on one node at a
> time,
> > so no filesystem access from the passive node. If this is not
> possible
> > then can you suggest another solution?
> 
> You can map ("decrypt") the devices and never use them. The
> LVM/mount/whatever is completely optional.
> 
> In fact the mapper tool (cryptsetup) does nothing except
> to decrypt the raw encrypted device to a raw decrypted device
> under /dev/mapper/.
> 

Ok, thank you. That seemed logical, but I just recently started working
with encryption so I'm still learning.

> 
> > Also, scalability is a requirement in my design, hence XFS. I was
> > thinking I needed to use multiple LUKS PVs in LVM to grow the
> > filesystem. But I would end up with multiple LUKS devices to keep
> track
> > of. I recently found out that LUKS can resize.
> 
> LUKS _cannot_ resize. The thing is that LUKS does not care about
> device size. So if you enlarge a device/partition with an intact
> LUKS header, "cryptsetup luksOpen" will just map the larger
> device.
> 
> If you have multiple devices, you can "slave" the additional ones
> to a "master" device using something like "decrypt_derived".
> This just takes the master key from the opened "master" container,
> runns it though a hash and uses this as key for the "slave"
> device.
> 
> > Would it be better to
> > create one LUKS device on top of LVM? Then create a filesystem on
> that?
> > (Though that would affect resource dependencies.)
> 
> Sre you sure you need LVM at all?

Yes, I do need LVM. I'm dealing with ~50TB of data and the SAN admins
can/will only attach storage in 4TB increments. So I have to combine all
of the LUNS into one Logical Volume in order to create a 50TB+ XFS
filesystem. That's why I ask about encrypting multiple physical LUNS vs
a single Logical Volume.

> 
> > But basically:
> >
> > SAN LUNs > LVM > LUKS > XFS > Samba Server
> >
> >
> >
> > Other people will be accessing/managing this system, so I want
> > manageability through simplicity.
> 
> Hence the question whether you actually need LVM.
> It strikes me that typically LVM is not needed and
> just complicates matters.
> 
> > Don't want to have the wrong volumes
> > (re)encrypted, headers damaged, etc.
> 
> I think this setup is already too complicated for most people
> to manage. A full backup should be part of your plans.
> Resize with backup is actually easier, as you can just
> backup, kill everything and do a clean new config.
> 

I will be making full backups with xfsdump. But it doesn't seem
practical to be moving 50TB around. Both LVM and XFS allow for designed
for online resize. I was planning to "pvcreate" an encrypted LUN then
expand the Logical Volume and Filesystem.

> > Anyways, thanks for your help.
> >
> 
> Just to make sure: You _have_ read the FAQ?

Yes I have read the FAQ. I guess I am just a little nervous about this
project. This is my first time working with encryption and 50TB of
critical client data is at stake. Just being thorough and making sure I
fully understand everything.
Thanks again,
Jacob Sohl

> 
> Arno
> 
> >
> > Jacob Sohl  |  Systems Engineer
> >
> > Applied Discovery(r)
> >
> > Mobile: 360-620-2695
> >
> >
> >
> 
> > _______________________________________________
> > dm-crypt mailing list
> > dm-crypt@xxxxxxxx
> > http://www.saout.de/mailman/listinfo/dm-crypt
> 
> 
> --
> Arno Wagner, Dr. sc. techn., Dipl. Inform., CISSP -- Email:
> arno@xxxxxxxxxxx
> GnuPG:  ID: 1E25338F  FP: 0C30 5782 9D93 F785 E79C  0296 797F 6B50
1E25
> 338F
> ----
> Cuddly UI's are the manifestation of wishful thinking. -- Dylan Evans
> 
> If it's in the news, don't worry about it.  The very definition of
> "news" is "something that hardly ever happens." -- Bruce Schneier
> _______________________________________________
> dm-crypt mailing list
> dm-crypt@xxxxxxxx
> http://www.saout.de/mailman/listinfo/dm-crypt


_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux