Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Hi All, I inherited a RHEL system with encrypted data disks (JBOD). One of the data disks (not OS) have failed and I am not sure the process to replace it. Do I just umount the current drive, then replacement it? Do I have to re-encrypt the new drive? I have the current password. Any steps would be appreciated.
How close it needs to look like the previous drive depends on what your backup/restore system expects. If you want it to be as close as possible, you need to recreate partitions, logical volumes, and encrypted areas to match the old drive.
It's just a single formatted drive with no partitions. The entire disk is encrypted. So would I just yank the failed disk and add the new one, then format and re-encrypt it? I wasn't sure if there were some steps to do before pulling the failed disk. Thanks
JBOD implies, to me at least, multi disk - that means usually RAID and/or LVM (ignoring ZFS and btrfs). As smallpond mentioned you need to understand, and explain to us, your environment better.
If it is a single disk, I see no harm in just yanking it - but I'd want to be real sure I was right before I did. "lsblk" might be a good start.
Yes it is a single disk as I mentioned above. There are 9 "single" basic (not LVM) disks in the server. The only disks with raid is the OS which is not encrypted. I've never dealt with a crypto disk so did not know if there were steps I should take before pulling it. And what is needed when I add it back.
Once you have loaded your data into the new filesystem, you will probably need to adjust the UUIDs in /etc/crypttab and /etc/fstab to reference the new disk. You can get the new values from the output of "lsblk -f" while the new drive is connected and unlocked.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.