Re: LUKS in failover cluster

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




> -----Original Message-----
> From: dm-crypt-bounces@xxxxxxxx [mailto:dm-crypt-bounces@xxxxxxxx] On
> Behalf Of Milan Broz
> Sent: Saturday, October 08, 2011 12:51 AM
> To: dm-crypt@xxxxxxxx
> Subject: Re:  LUKS in failover cluster
> 
> 
> On 10/08/2011 06:52 AM, Arno Wagner wrote:
> >> Also, scalability is a requirement in my design, hence XFS. I was
> >> thinking I needed to use multiple LUKS PVs in LVM to grow the
> >> filesystem. But I would end up with multiple LUKS devices to keep
> track
> >> of. I recently found out that LUKS can resize.
> >
> > LUKS _cannot_ resize. The thing is that LUKS does not care about
> > device size. So if you enlarge a device/partition with an intact
> > LUKS header, "cryptsetup luksOpen" will just map the larger
> > device.
> 
> yes, but crytsetup resize is designed that it it supports open
> (active) LUKS containers. You do not need to activate/deactivate,
> resize operation is enough.
> 
> > If you have multiple devices, you can "slave" the additional ones
> > to a "master" device using something like "decrypt_derived".
> > This just takes the master key from the opened "master" container,
> > runns it though a hash and uses this as key for the "slave"
> > device.
> >
> >> Would it be better to
> >> create one LUKS device on top of LVM? Then create a filesystem on
> that?
> >> (Though that would affect resource dependencies.)
> >
> > Sre you sure you need LVM at all?
> 
> LVM is very useful in such configurations, you can dynamically manage
> LVs over encrypted storage.
> Scripts for managing such stack is not complicated but of course
> it is yet another layer to care of.
> 
> Because you mentioned cluster, I will just repeat
> 
> - if you manage it in HA LVM style (the device
> stack is always active exclusively only on one node) it will work.
> (You just need to create own resource for cluster suite - add LUKS
> to the stack. So cluster suite will handle exclusivity and failover
> itself.)

^ HA LVM is what I will be doing.

> 
> For using LUKS in cluster for shared storage (visible to all nodes)
> - if encryption (mapping) runs in server and plaintext device is
> exported
> and shared to nodes (using iscsi + clvm or so) this will work
> 
> - if you want to run dm-crypt on every node (for the same device,
> IOW export ciphertext device) this is not supported.
> 
> (I think that I said on IRC that with proper used cluster fs and
> flush requests this may work - but it is not tested. The problem is of
> course
> with internal crypto queues so without flushing these queues different
> nodes will see different storage content. And moreover, there is no
> cluster
> infrastructure like clvmd to manage such devices consistently.)

Thank you for clarifying this for me, I didn't really understand in IRC
what you meant about "flush requests". I'm not a programmer and don't
really know low-level hardware stuff that much. It's been a lot of stuff
for me to learn.

> 
> Milan



> _______________________________________________
> dm-crypt mailing list
> dm-crypt@xxxxxxxx
> http://www.saout.de/mailman/listinfo/dm-crypt
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux