-
Notifications
You must be signed in to change notification settings - Fork 59
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add an LVM devices file by default #1517
Comments
We discussed this in the community meeting today:
|
Populate an lvmdevices(8) file to limit LVM from autoactivating all devices it sees in a system. By default systems will get a "blank" configuration file with a comment in it explaining what it is used for. There is also a one-time "populate" service that will run and add any devices it sees into the devices file. This will serve to import existing devices on upgrading systems or new systems with pre-existing LVM devices attached. See the tracker issue [1] for more information. [1] coreos/fedora-coreos-tracker#1517
Populate an lvmdevices(8) file to limit LVM from autoactivating all devices it sees in a system. By default systems will get a "blank" configuration file with a comment in it explaining what it is used for. There is also a one-time "populate" service that will run and add any devices it sees into the devices file. This will serve to import existing devices on upgrading systems or new systems with pre-existing LVM devices attached. See the tracker issue [1] for more information. [1] coreos/fedora-coreos-tracker#1517
Populate an lvmdevices(8) file to limit LVM from autoactivating all devices it sees in a system. By default systems will get a "blank" configuration file with a comment in it explaining what it is used for. There is also a one-time "populate" service that will run and add any devices it sees into the devices file. This will serve to import existing devices on upgrading systems or new systems with pre-existing LVM devices attached. See the tracker issue [1] for more information. [1] coreos/fedora-coreos-tracker#1517
Populate an lvmdevices(8) file to limit LVM from autoactivating all devices it sees in a system. By default systems will get a "blank" configuration file with a comment in it explaining what it is used for. There is also a one-time "populate" service that will run and add any devices it sees into the devices file. This will serve to import existing devices on upgrading systems or new systems with pre-existing LVM devices attached. See the tracker issue [1] for more information. [1] coreos/fedora-coreos-tracker#1517
Populate an lvmdevices(8) file to limit LVM from autoactivating all devices it sees in a system. By default systems will get a "blank" configuration file with a comment in it explaining what it is used for. There is also a one-time "populate" service that will run and add any devices it sees into the devices file. This will serve to import existing devices on upgrading systems or new systems with pre-existing LVM devices attached. See the tracker issue [1] for more information. [1] coreos/fedora-coreos-tracker#1517
Populate an lvmdevices(8) file to limit LVM from autoactivating all devices it sees in a system. By default systems will get a "blank" configuration file with a comment in it explaining what it is used for. There is also a one-time "populate" service that will run and add any devices it sees into the devices file. This will serve to import existing devices on upgrading systems or new systems with pre-existing LVM devices attached. See the tracker issue [1] for more information. [1] coreos/fedora-coreos-tracker#1517
Populate an lvmdevices(8) file to limit LVM from autoactivating all devices it sees in a system. By default systems will get a "blank" configuration file with a comment in it explaining what it is used for. There is also a one-time "populate" service that will run and add any devices it sees into the devices file. This will serve to import existing devices on upgrading systems or new systems with pre-existing LVM devices attached. See the tracker issue [1] for more information. [1] coreos/fedora-coreos-tracker#1517
Populate an lvmdevices(8) file to limit LVM from autoactivating all devices it sees in a system. By default systems will get a "blank" configuration file with a comment in it explaining what it is used for. There is also a one-time "populate" service that will run and add any devices it sees into the devices file. This will serve to import existing devices on upgrading systems or new systems with pre-existing LVM devices attached. See the tracker issue [1] for more information. [1] coreos/fedora-coreos-tracker#1517
Populate an lvmdevices(8) file to limit LVM from autoactivating all devices it sees in a system. By default systems will get a "blank" configuration file with a comment in it explaining what it is used for. There is also a one-time "populate" service that will run and add any devices it sees into the devices file. This will serve to import existing devices on upgrading systems or new systems with pre-existing LVM devices attached. See the tracker issue [1] for more information. [1] coreos/fedora-coreos-tracker#1517 (cherry picked from commit 693f221)
Populate an lvmdevices(8) file to limit LVM from autoactivating all devices it sees in a system. By default systems will get a "blank" configuration file with a comment in it explaining what it is used for. There is also a one-time "populate" service that will run and add any devices it sees into the devices file. This will serve to import existing devices on upgrading systems or new systems with pre-existing LVM devices attached. See the tracker issue [1] for more information. [1] coreos/fedora-coreos-tracker#1517 (cherry picked from commit 693f221)
Should we close this one now that coreos/fedora-coreos-config#2566 is merged? |
Yes we can. I added the labels so we'll update here when it makes it into the production streams. |
The fix for this went into |
The fix for this went into |
The fix for this went into |
I will mention this breaks one of the use cases I had where there was a second disk attached to the VM that was encrypted with LUKS. pvscan no longer picked up the disk and trying to restore the group failed:
After reading this issue I added the device manually:
after which it was able to be mounted again:
I know this is a unique case and not something that I expect other people are do, but it did break our fleet of servers. (lucky I can fix this with ansible) |
Thanks @Quantum-Sicarius for adding feedback here. We added a one time migration script that should have added any pre-existing LVM devices to the Can you share the journal logs from the boot after the upgrade? If not the whole log then something like |
Not seeing anything in the journal:
Did however appear to run:
For interest sake here is the disk layout:
|
Odd. So does the stamp file exist at Maybe the fact that your LV is on top of luks encryption caused the migration script to not work (i.e. an ordering issue on boot where the migration script ran before the disks are unlocked). |
It does appear to exist. I think you are correct, the ordering is probably the issue. The second disk is decrypted using Tang + Clevis, meaning the OS networking needs to be up first. Which I assume probably occurs after that service has been executed. As I said, I have a unique case, so I doubt this issue will affect other users. (Unless SilverBlue also follows this path perhaps?) |
Ahh, yes. That makes sense. I wish there was a good way I could think of to handle this case. The only thing I can think of is to attempt to do a second import later after networking is up. Either way, thank you for reporting the issue. |
Silverblue is moving away from LVM in general so I don't think we'll make that kind of "Kubernetes" related improvement there. However I don't think your use case is that unique as we advertise Tang/Clevis support in Fedora CoreOS (and RHCOS). |
Populate an lvmdevices(8) file to limit LVM from autoactivating all devices it sees in a system. By default systems will get a "blank" configuration file with a comment in it explaining what it is used for. There is also a one-time "populate" service that will run and add any devices it sees into the devices file. This will serve to import existing devices on upgrading systems or new systems with pre-existing LVM devices attached. See the tracker issue [1] for more information. [1] coreos/fedora-coreos-tracker#1517
Populate an lvmdevices(8) file to limit LVM from autoactivating all devices it sees in a system. By default systems will get a "blank" configuration file with a comment in it explaining what it is used for. There is also a one-time "populate" service that will run and add any devices it sees into the devices file. This will serve to import existing devices on upgrading systems or new systems with pre-existing LVM devices attached. See the tracker issue [1] for more information. [1] coreos/fedora-coreos-tracker#1517
We are seeing some issues where running Virtual Machines inside of your container orchestration (for example Kubevirt allows running VMs on top of Kubernetes) leads to issues where the user may choose to attach block storage and initialize that block storage as LVM physical volumes, later adding volume groups and logical volumes on top. At this point the host (Fedora CoreOS or downstream) and the guest (controlled by the user) both try to manage the block devices that is part of the LVM pool. This is reported downstream in https://issues.redhat.com/browse/OCPBUGS-5223
After some discussion in the downstream ticket we think the current best approach is to use
lvmdevices
to limit the host from trying to access any newly created PV/VG/LV in the guest. This would require:/var/
) thenThe text was updated successfully, but these errors were encountered: