Re: LUKS in failover cluster

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Yeah, it was a "crazy-fun-project" laugh. An opportunity to learn a lot and create something cool.

> -----Original Message-----
> From: Scott McCarty [mailto:smccarty@xxxxxxxxxx]
> Sent: Wednesday, October 12, 2011 12:55 PM
> To: Sohl, Jacob (LNG-SEA)
> Cc: LNG-SEA Systems Engineers ADI; Arno Wagner; dm-crypt@xxxxxxxx
> Subject: Re:  LUKS in failover cluster
> 
> That was a good laugh, maybe a chuckle even :-)
> 
> Scott McCarty, RHCE, RHCSA, LPIC-1
> Solutions Architect
> Email: smccarty@xxxxxxxxxx
> Phone: 312-660-3535
> Web: http://people.redhat.com/smccarty
> 
> 
> ----- Original Message -----
> From: "Jacob Sohl (LNG-SEA)" <jacob.sohl@xxxxxxxxxxxxxxxxxxxx>
> To: "Arno Wagner" <arno@xxxxxxxxxxx>, dm-crypt@xxxxxxxx
> Cc: "LNG-SEA Systems Engineers ADI" <LNG-
> SEASystemsEngineersADI@xxxxxxxxxxxxxx>, "Scott McCarty"
> <smccarty@xxxxxxxxxx>
> Sent: Wednesday, October 12, 2011 3:20:51 PM
> Subject: RE:  LUKS in failover cluster
> 
> 
> 
> > -----Original Message-----
> > From: dm-crypt-bounces@xxxxxxxx [mailto:dm-crypt-bounces@xxxxxxxx] On
> > Behalf Of Arno Wagner
> > Sent: Tuesday, October 11, 2011 8:13 PM
> > To: dm-crypt@xxxxxxxx
> > Subject: Re:  LUKS in failover cluster
> >
> > On Tue, Oct 11, 2011 at 04:34:21PM -0700, Sohl, Jacob (LNG-SEA)
> wrote:
> > [...]
> > > > You can map ("decrypt") the devices and never use them. The
> > > > LVM/mount/whatever is completely optional.
> > > >
> > > > In fact the mapper tool (cryptsetup) does nothing except
> > > > to decrypt the raw encrypted device to a raw decrypted device
> > > > under /dev/mapper/.
> > > >
> > >
> > > Ok, thank you. That seemed logical, but I just recently started
> > working
> > > with encryption so I'm still learning.
> >
> > That is fine. Making sure now will safe you grief later.
> >
> > > >
> > > > > Also, scalability is a requirement in my design, hence XFS. I
> was
> > > > > thinking I needed to use multiple LUKS PVs in LVM to grow the
> > > > > filesystem. But I would end up with multiple LUKS devices to
> keep
> > > > track
> > > > > of. I recently found out that LUKS can resize.
> > > >
> > > > LUKS _cannot_ resize. The thing is that LUKS does not care about
> > > > device size. So if you enlarge a device/partition with an intact
> > > > LUKS header, "cryptsetup luksOpen" will just map the larger
> > > > device.
> > > >
> > > > If you have multiple devices, you can "slave" the additional ones
> > > > to a "master" device using something like "decrypt_derived".
> > > > This just takes the master key from the opened "master"
> container,
> > > > runns it though a hash and uses this as key for the "slave"
> > > > device.
> > > >
> > > > > Would it be better to
> > > > > create one LUKS device on top of LVM? Then create a filesystem
> on
> > > > that?
> > > > > (Though that would affect resource dependencies.)
> > > >
> > > > Sre you sure you need LVM at all?
> > >
> > > Yes, I do need LVM. I'm dealing with ~50TB of data and the SAN
> admins
> > > can/will only attach storage in 4TB increments. So I have to
> combine
> > all
> > > of the LUNS into one Logical Volume in order to create a 50TB+ XFS
> > > filesystem. That's why I ask about encrypting multiple physical
> LUNS
> > vs
> > > a single Logical Volume.
> >
> > 50TB? Ok, that is a bit larger. I did have such a dataset
> > for research a few years back on tape. Took several days
> > days to get 15TB of it to disk for my largest measurement.
> >
> > Well, yes, I think LVM is the best way here.
> >
> > > >
> > > > > But basically:
> > > > >
> > > > > SAN LUNs > LVM > LUKS > XFS > Samba Server
> > > > >
> > > > >
> > > > >
> > > > > Other people will be accessing/managing this system, so I want
> > > > > manageability through simplicity.
> > > >
> > > > Hence the question whether you actually need LVM.
> > > > It strikes me that typically LVM is not needed and
> > > > just complicates matters.
> > > >
> > > > > Don't want to have the wrong volumes
> > > > > (re)encrypted, headers damaged, etc.
> > > >
> > > > I think this setup is already too complicated for most people
> > > > to manage. A full backup should be part of your plans.
> > > > Resize with backup is actually easier, as you can just
> > > > backup, kill everything and do a clean new config.
> > > >
> > >
> > > I will be making full backups with xfsdump. But it doesn't seem
> > > practical to be moving 50TB around. Both LVM and XFS allow for
> > designed
> > > for online resize. I was planning to "pvcreate" an encrypted LUN
> then
> > > expand the Logical Volume and Filesystem.
> >
> > For that volume, run a full compare as well. I found that
> > with good hardware, and an IBM Tape-Library I still had
> > something like 1 unexplained bit-error every 10TB or so
> > when pulling the data from the tape-library again. That was
> > a few years back, but still.
> >
> 
> Thanks, I've never been very good at doing backups so any advice is
> appreciated.
> 
> > > > > Anyways, thanks for your help.
> > > > >
> > > >
> > > > Just to make sure: You _have_ read the FAQ?
> > >
> > > Yes I have read the FAQ.
> >
> > Good!
> >
> > > I guess I am just a little nervous about this project.
> >
> > Understandable.
> >
> > > This is my first time working with encryption and 50TB of
> > > critical client data is at stake. Just being thorough and making
> sure
> > I
> > > fully understand everything.
> >
> > And that is all you can do. I think you are approaching this
> > perfectly right. I take it the 50TB are alredy on XFS+LVM
> > at this time and you are just adding the encryption layer?
> 
> Currently the data is spread across multiple ext3 volumes of 8TB or
> less
> and is a pain to manage. That is the reason we are moving to XFS. The
> encryption is currently being handled by a Brocade switch blade. The
> encryption blade caused us major issues last year, resulting in a
> multi-day outage. That is the why we are moving to LUKS.
> 
> >
> > Make sure to use XTS mode or plain64 with ESSIV for these
> > volume sizes.
> 
> I don't know what this means. Haha. But I will look it up.
> 
> >
> > And let us know what your expeiences are!
> >
> 
> Sure thing. This project has been my first exposure to XFS, LUKS and
> clustering. And I'm the main Linux guy on my team. I've been working
> with Red Hat, but the solution architect laughed when he saw what we
> were trying to do. Haha. But he's been doing research and talking to
> his
> Red Hat contacts. And you guys have helped out tremendously! Thank you!
> 
> Jacob
> 
> > Arno
> > --
> > Arno Wagner, Dr. sc. techn., Dipl. Inform., CISSP -- Email:
> > arno@xxxxxxxxxxx
> > GnuPG:  ID: 1E25338F  FP: 0C30 5782 9D93 F785 E79C  0296 797F 6B50
> 1E25
> > 338F
> > ----
> > Cuddly UI's are the manifestation of wishful thinking. -- Dylan Evans
> >
> > If it's in the news, don't worry about it.  The very definition of
> > "news" is "something that hardly ever happens." -- Bruce Schneier
> > _______________________________________________
> > dm-crypt mailing list
> > dm-crypt@xxxxxxxx
> > http://www.saout.de/mailman/listinfo/dm-crypt
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux