RAID Model: All models
Host Hardware: AMD/Intel
Operating System: Linux (Ubuntu/CentOS/RHEL)
SupremeRAID Driver: 1.7.x and later versions
This article describes the procedure to encrypt a SupremeRAID Virtual Device (VD) using LUKS (Linux Unified Key Setup) and configure it for automatic mounting at boot.
Due to the initialization time required by the SupremeRAID driver (graid.service), specific systemd parameters must be configured to prevent a race condition where the OS attempts to unlock the encrypted volume before the SupremeRAID VD is fully ready.
Warning: The following steps involve formatting the disk. All existing data on the target Virtual Device will be erased. Please ensure you have backed up any necessary data before proceeding.
Ensure cryptsetup is installed on your system.
Ubuntu/Debian:
sudo apt update
sudo apt install cryptsetupRHEL/CentOS:
sudo yum install cryptsetup-luksAssume the target SupremeRAID VD is /dev/gdg0n1.
Format the device with LUKS:
sudo cryptsetup luksFormat /dev/gdg0n1Type YES (uppercase) when prompted.
Enter and verify your passphrase.
Open (unlock) the encrypted device. Map it to a name (e.g., graiddrive_crypt):
sudo cryptsetup luksOpen /dev/gdg0n1 graiddrive_cryptPerform these operations on the mapped device, not the raw VD.
Create an ext4 filesystem:
sudo mkfs.ext4 /dev/mapper/graiddrive_cryptCreate a mount point:
sudo mkdir /dataTo ensure the system boots correctly, we must configure the dependency chain so that LUKS waits for the graid.service.
Get the UUID of the SupremeRAID VD: Run sudo blkid. Locate /dev/gdg0n1 (Type=crypto_LUKS) and copy its UUID.
Note: Do not copy the UUID of /dev/mapper/graiddrive_crypt.
Edit /etc/crypttab: Add the following line. Ensure you add x-systemd.requires=graid.service.
# <target name> <source device> <key file> <options>
graiddrive_crypt UUID=<UUID_of_gdg0n1> none luks,nofail,x-systemd.requires=graid.service
graiddrive_crypt: The name used in Step 2.
UUID: The UUID of the raw /dev/gdg0n1.
none: Prompts for a password at boot. (Replace with a keyfile path for password-less boot).
x-systemd.requires=graid.service: Ensures LUKS waits for the driver.
Edit /etc/fstab: Add the following line to mount the unlocked mapper device.
# <file system> <mount point> <type> <options> <dump> <pass>
/dev/mapper/graiddrive_crypt /data ext4 defaults,nofail,noatime,nodiratime 0 2
Reload systemd manager configuration:
sudo systemctl daemon-reload
(Optional) Update initramfs to ensure boot-time configuration is applied immediately:
sudo update-initramfs -u
Reboot the system to verify that the password prompt appears and the volume mounts successfully.
Issue: System hangs or enters Emergency Mode at boot.
Cause 1: Incorrect UUID in /etc/crypttab.
Fix: Ensure you are using the UUID of the physical VD (/dev/gdg0n1), NOT the mapper device.
Cause 2: Race condition (LUKS starts before GRAID).
Fix: Verify that x-systemd.requires=graid.service is correctly added to the options column in /etc/crypttab.
Workaround: If the system is old (e.g., Ubuntu 20.04) and ignores systemd flags in crypttab, add noauto to /etc/crypttab and add x-systemd.automount to /etc/fstab.