Solved

GRUB boot problem after LVM Redhat Disk clone (Can the LABEL be changed on lvm2 ?)

Posted on 2011-02-16
3
2,191 Views
Last Modified: 2012-06-21
I have cloned one RedHat disk to another using "dd" but now cannot boot unless one disk or the other is physically removed. The disk uses LVM with the /boot using lvm2 format. I think the problem is that GRUB sees identical boot blocks. Is it possible to change an lvm2 format boot LABEL so that GRUB sees 2 different labels? This is easy for ext2 or ext3 using e2label but I have found no way to change an LVM, lvm2 format, label for /boot.
Thanks in advance,
M
0
Comment
Question by:mmay5
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 40

Accepted Solution

by:
noci earned 500 total points
ID: 34924515
I doubt it is the names.
All info in a LVM container is managed through GUID's (Globaly Unique ID')
The assumption is that at least every LVM object has a unique GUID.

So if you dd copy a disk the volumes have the same GUID and there fore may be considered identical... No doubt this is a recipe for disaster waiting to happen.

The best thing is to create a new Physical volume, + Volume group and create new LV's there (of the same size).
Then you can copy from the originall LV to the new LV.
When mounting based on label then you also need unique labels on the new disks, if mounting by GUID use the new GUID's
0
 

Author Closing Comment

by:mmay5
ID: 34927089
Sounds correct. So my real issue is that I never used LVM commands like pvcreate, lvcreate and just dd cloned the disk.
Without using pvcreate, I ended up with the same GUID. Oh well, LVM is nice for some things but it makes cloning boot disks
a bit more of a headache. Thanks for your help. I accepted that answer.
0
 
LVL 40

Expert Comment

by:noci
ID: 34927835
Maybe this does help:
http://tldp.org/HOWTO/LVM-HOWTO/
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In order for businesses to be compliant with certain information security laws in some countries, you need to be able to prove that a user (which user it was becomes important to the business to take action against the user after an event has occurr…
Are you sitting there reading this and wondering how to get started with Linux? It almost seems like picking the right Linux distribution is about like picking the right college or buying a new car if you read some of the article out there. Relax… l…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.

695 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question