You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have scenario where we create VM instances from snapshots that contain an encrypted partition. The VM is then unlocked during boot via clevis and a tang server.
Now during the first boot, I would like to resize the encrypted partition to get all available space as VMs might have bigger disks then the original snapshot.
Since the encrypted partition is also the root partition, we are not able to unmount it. As far as I understand, an already unlocked partition should be able to be live resized by running:
Retrieve the luks password with clevis luks pass -d /dev/sdxx -s 1 (if you get an error about the slot, run cryptsetup luksDump /dev/sdxx and check which slot is used by clevis)
cryptsetup resize /dev/mapper/yourdevice might work (for some reason it didnt work for me; command returned 0 but the partition size didnt change)
Resize the partition using gparted. When prompted for the luks password, enter the one from step 1.
Hi,
I have scenario where we create VM instances from snapshots that contain an encrypted partition. The VM is then unlocked during boot via clevis and a tang server.
Now during the first boot, I would like to resize the encrypted partition to get all available space as VMs might have bigger disks then the original snapshot.
Since the encrypted partition is also the root partition, we are not able to unmount it. As far as I understand, an already unlocked partition should be able to be live resized by running:
which gives me the following results:
This is somehow supported by clevis?
Or is the only alternative to store a passphrase to a LUKS slot within the image?
The text was updated successfully, but these errors were encountered: