From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from firstgate.proxmox.com (firstgate.proxmox.com [212.224.123.68]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by lists.proxmox.com (Postfix) with ESMTPS id C380F695FE for ; Thu, 6 Aug 2020 09:53:37 +0200 (CEST) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id B2B5F1A2EA for ; Thu, 6 Aug 2020 09:53:07 +0200 (CEST) Received: from proxmox-new.maurer-it.com (proxmox-new.maurer-it.com [212.186.127.180]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by firstgate.proxmox.com (Proxmox) with ESMTPS id 3A8391A2E2 for ; Thu, 6 Aug 2020 09:53:07 +0200 (CEST) Received: from proxmox-new.maurer-it.com (localhost.localdomain [127.0.0.1]) by proxmox-new.maurer-it.com (Proxmox) with ESMTP id F120E42E99 for ; Thu, 6 Aug 2020 09:53:06 +0200 (CEST) From: Fabian Ebner To: pve-devel@lists.proxmox.com Date: Thu, 6 Aug 2020 09:53:02 +0200 Message-Id: <20200806075302.10242-1-f.ebner@proxmox.com> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-SPAM-LEVEL: Spam detection results: 0 AWL -0.010 Adjusted score from AWL reputation of From: address KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment RCVD_IN_DNSWL_MED -2.3 Sender listed at https://www.dnswl.org/, medium trust SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record Subject: [pve-devel] [PATCH docs] Mention that an encrypted dataset needs to be mounted X-BeenThere: pve-devel@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox VE development discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 06 Aug 2020 07:53:37 -0000 Using load-key alone is not enough to be able to use the storage. Signed-off-by: Fabian Ebner --- local-zfs.adoc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/local-zfs.adoc b/local-zfs.adoc index 5474b88..58629d7 100644 --- a/local-zfs.adoc +++ b/local-zfs.adoc @@ -564,10 +564,10 @@ All guest volumes/disks create on this storage will be encrypted with the shared key material of the parent dataset. To actually use the storage, the associated key material needs to be loaded -with `zfs load-key`: +and the dataset needs to be mounted. This can be done in one step with: ---- -# zfs load-key tank/encrypted_data +# zfs mount -l tank/encrypted_data Enter passphrase for 'tank/encrypted_data': ---- -- 2.20.1