-
Notifications
You must be signed in to change notification settings - Fork 89
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add persistent and perf options to the luks_device #434
Conversation
I don't know python/ansible well enough so feel free to rewrite PR |
Thanks a lot for the feature! :-) Maybe you can think of some ways to test/ensure this is actually applied? They would go here: https://github.com/ansible-collections/community.crypto/tree/main/tests/integration/targets/luks_device/tasks/tests Also if there are already limitations on Debian11, there might be other ones too, these should be documented at least. |
Regarding Debian 11 - I think it is temporary bug. Cryptsetup supports everything, but crypttab-related scripts where not updated yet. So it doesn't relate to this collection at all. Speaking about test - its quite hard for me: after luks container is opened you must check it with |
3e47349
to
af846d2
Compare
Added some tests, but looks like kernel too old. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for your contribution!
tests/integration/targets/luks_device/tasks/tests/performance.yml
Outdated
Show resolved
Hide resolved
841c4cc
to
f613f0b
Compare
965d9a0
to
f7d5744
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good to me.
Do we also need a changelog fragment? |
Other than that looks good to me too - sorry for causing this much hassle just to add a literal handful of parameters to a command... but in the end it is important that documentation is available and there are no immediate regressions or problems down the line. I'm sure this feature will be appreciated by users, especially since Cloudflare detailed how to actually get decent performance on encrypted setups on modern systems, thanks for adding it! |
890bf02
to
1cd5eae
Compare
Hi!
|
Hmm, that's a tough question (IMO). I wish they'd be more consistent :) Keeping the prefix ensures that these four options will be shown next to each other in the documentation. For me this slightly tips the scale to "keep the prefix". |
Read and write work queue significantly degrades performance on SSD/NVME devices[1]. In Debian 11 crypttab does not support no-read-workqueue and no-write-workqueue flags, so the persistent flag is workaround: once opened with perf parameters persists forever. [1] https://blog.cloudflare.com/speeding-up-linux-disk-encryption/ Signed-off-by: Yauhen Artsiukhou <jsirex@gmail.com>
@jsirex thanks for contributing this! |
Read and write work queue significantly degrades performance on
SSD/NVME devices[1].
In Debian 11 crypttab does not support no-read-workqueue and
no-write-workqueue flags, so the persistent flag is workaround: once
opened with perf parameters persists forever.
[1] https://blog.cloudflare.com/speeding-up-linux-disk-encryption/
Signed-off-by: Yauhen Artsiukhou jsirex@gmail.com
Fixes: #427