<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>BTRFS &amp;mdash; G&#39;s Blog</title>
    <link>https://blog.marcg.pizza/marcg/tag:BTRFS</link>
    <description>Just a place to post random things. Enjoy your stay.</description>
    <pubDate>Fri, 17 Apr 2026 02:07:29 -0300</pubDate>
    <item>
      <title>Migrate all the things!!</title>
      <link>https://blog.marcg.pizza/marcg/migrate-all-the-things</link>
      <description>&lt;![CDATA[Migrate all the things!!&#xA;&#xA;As i stated in my previous post my primary harddrive is failing on me. To be proactive i am replacing it before it fully dies. &#xA;&#xA;So this will be a somewhat technical post where I will outline the steps I took to migrate to my new HDD. Some of these steps will be specific to my setup but most could be applied to other situations. Hope you find some of this useful or at least informational.&#xA;&#xA;First some details on the setup. I use BTRFS as my filesystem on all my drives. BTRFS provides a subvolume functionality. Subvolumes are similar to partitions in which they can be mounted/accessed independently from the main/root of the filesystem. So my old drive was setup with the following subvolumes:&#xA;&#x9;&#xA;table border=&#34;1&#34;&#xA;thSubvolume/th&#xA;thDescription/th&#xA;tr&#xA;td@Home/td&#xA;tdThis contains my Home partition/td&#xA;/tr&#xA;tr&#xA;td@Storage/td&#xA;tdThis contains my primary storage (Hold Downloads,Wallpapers and other general data)/td&#xA;/tr&#xA;tr&#xA;td@HomestBU/td&#xA;td This was used to make backups(More will be explained on how to handle backups with BTRFS subvolumes/snapshots)/td&#xA;/tr&#xA;/table&#xA;&#xA;This same layout will be replicated on the new drive later.&#xA;&#xA;To avoid any data loss I had moved my @Home subvolume to my raid5 array(Called Storage2) which typically holds my media files and my @Storage subvolume to my external storage device(called Storage3) that normally holds my backups. Now the task will be to move those subvolumes to the new harddrive. So lets get on with it.&#xA;&#xA;This is the drive I am migrating stuff to&#xA;&#xA;HarddriveImagegoeshere&#xA;&#xA;Lets begin the migration.&#xA;&#xA;Since I have all my storage encrypted the first step is to setup the encryption container. This is done by issuing the following cammand:&#xA;&#x9;&#xA;cryptsetup -v --type luks --cipher anubis-xts-plain64 --keysize 640 --hash whirlpool --iter-time 5000 --use-random -d /etc/homest luksFormat&#xA;&#x9;&#xA;Lets breakdown that command a bit shall we&#xA;&#xA;table&#xA;thOption/th&#xA;thDesctiption/th&#xA;tr&#xA;td-v/td&#xA;tdThis simply makes the cryptsetup command output mor detailed information about what it does/td&#xA;/tr&#xA;tr&#xA;td --type luks/td&#xA;tdThis instructs cryptsetup that we are working in luks mode instead of plain mode (See a href=&#34;https://www.linode.com/docs/security/encrypt-data-disk-with-dm-crypt/#dm-crypt-in-plain-mode-vs-dm-crypt-with-luks-extension&#34; target=&#34;blank&#34;here/a for an explanation of the differences between plain and luks mode.)/td&#xA;/tr&#xA;tr&#xA;td--cipher anubis-xts-plain64/td&#xA;tdThis is defining the cipher to be used for the encryption operation. I always use a cipher that is not as mainstream. In this case i am using the anubis cipher. I like this cipher for a few reasons. One of them being that it is named after an egyptian god and the creator has stated that anyone who breaks it will be cursed./td&#xA;/tr&#xA;tr&#xA;td--keysize 640/td&#xA;tdThis defines the size(in bits) of the key used for encryption. The bigger the key the stronger the encryption. Anubix has a maximum key size of 320 but since the xtx cipher mode splits the key in 2 we specify 640 here./td&#xA;/tr&#xA;tr&#xA;td--hash whirlpool/td&#xA;tdThis defines what hash function(default sha256) will be used the hash the passphrase./td&#xA;/tr&#xA;tr&#xA;td--iter-time 5000/td&#xA;tdThis defines how long(in miliseconds) cryptsetup will spend processing the keyphrase. Default is 1 second I make it go for 5./td&#xA;/tr&#xA;tr&#xA;td--use-random/td&#xA;tdThis define the source used for the generation of random numbers used by the format process. Choices are urandom or random. I always use random as it produces a more random result/td&#xA;/tr&#xA;tr&#xA;td-d /etc/homest/td&#xA;tdThis defines a keyfile to use instead of prompting for a passphrase. That key file is a giant string of random characters/td&#xA;/tr&#xA;tr&#xA;tdluksFormat/td&#xA;tdThis just says to format the device that follows/td&#xA;/tr&#xA;tr&#xA;td/dev/sdxY/td&#xA;tdThe device to format/td&#xA;/tr&#xA;/table&#xA;&#xA;Now that the encrypted container is ready we can open it to use it:&#xA;&#x9;&#xA;cryptsetup open -d /etc/homest /dev/sdxY homest&#xA;&#x9;&#xA;&#xA;Now we can format the container with a filesystem:&#xA;&#x9;&#xA;mkfs.btrfs /dev/mapper/homest&#xA;&#x9;&#xA;And mount it:&#xA;&#x9;&#xA;fstab entry&#xA;/dev/mapper/homest                              /mnt/btrfsroot           btrfs           compress=zlib,spacecache=v2       0 0&#xA;&#x9;&#xA;mount /mnt/btrfsroot&#xA;&#x9;&#xA;&#xA;Starting with my @Storage subvolume we will now move it to the new drive&#xA;&#xA;First we create a read-only snapshot of the subvolume:&#xA;&#x9;&#xA;btrfs subvol snap -r \@Storage/ \@Storage.migrate&#xA;&#x9;&#xA;A snapshot is like a picture of the data currently in that subvolume.&#xA;&#xA;Now we send it over to the new drive:&#xA;&#x9;&#xA;btrfs send -vvv \@Storage.migrate/ | btrfs receive -vvv /mnt/btrfsroot/&#xA;&#x9;&#xA;&#xA;Once this is complete we update the fstab entry to mount the subvolume from it&#39;s new location:&#xA;&#xA;/dev/mapper/homest                              /media/Storage  btrfs           compress=zlib,spacecache=v2,subvol=@Storage    0 0&#xA;&#x9;&#xA;Notice how this entry is similar to the previouse with the differences being the mountpoint(/media/Storage) and that we specify the subvolume to mount.&#xA;&#xA;Now we do the same thing with the @Home subvolume.&#xA;&#xA;First we create a read-only snapshot of the subvolume:&#xA;&#x9;&#xA;btrfs subvol snap -r \@Home/ \@Home.migrate&#xA;&#x9;&#xA;&#xA;Now we send it over to the new drive:&#xA;&#x9;&#xA;btrfs send -vvv \@Home.migrate/ | btrfs receive -vvv /mnt/btrfsroot/&#xA;&#x9;&#xA;&#xA;Once this is complete we update the fstab entry to mount the subvolume from it&#39;s new location:&#xA;/dev/mapper/homest                              /Home  btrfs           compress=zlib,space_cache=v2,subvol=@Home    0 0&#xA;&#x9;&#xA;Now the subvolumes on the receive side(now in /mnt/btrfsroot) are still in read-only mode which wont work. To resolve that we simply take a read-write snapshot of the subvolume:&#xA;&#x9;&#xA;btrfs subvol snap \@Home.migrate \@Home&#xA;btrfs subvol snap \@Storage.migrate \@Storage&#xA;&#xA;And That is it. Migration complete. All that is left to do is reboot to start using the new drive. Hope you maybe found this post informational.&#xA;&#xA;Have a great day.&#xA;&#xA;G&#xA;&#xA;#Tech #Migration #Linux #BTRFS&#xA;&#xA;Until next time. Stay safe!&#xD;&#xA;&#xD;&#xA;G&#xD;&#xA;@mgrondin@youdabomb.social]]&gt;</description>
      <content:encoded><![CDATA[<h3 id="migrate-all-the-things">Migrate all the things!!</h3>

<p>As i stated in my previous post my primary harddrive is failing on me. To be proactive i am replacing it before it fully dies.</p>

<p>So this will be a somewhat technical post where I will outline the steps I took to migrate to my new HDD. Some of these steps will be specific to my setup but most could be applied to other situations. Hope you find some of this useful or at least informational.</p>

<p>First some details on the setup. I use BTRFS as my filesystem on all my drives. BTRFS provides a subvolume functionality. Subvolumes are similar to partitions in which they can be mounted/accessed independently from the main/root of the filesystem. So my old drive was setup with the following subvolumes:</p>

<table>
<th>Subvolume</th>
<th>Description</th>
<tr>
<td>@Home</td>
<td>This contains my Home partition</td>
</tr>
<tr>
<td>@Storage</td>
<td>This contains my primary storage (Hold Downloads,Wallpapers and other general data)</td>
</tr>
<tr>
<td>@HomestBU</td>
<td> This was used to make backups(More will be explained on how to handle backups with BTRFS subvolumes/snapshots)</td>
</tr>
</table>

<p>This same layout will be replicated on the new drive later.</p>

<p>To avoid any data loss I had moved my @Home subvolume to my raid5 array(Called Storage2) which typically holds my media files and my @Storage subvolume to my external storage device(called Storage3) that normally holds my backups. Now the task will be to move those subvolumes to the new harddrive. So lets get on with it.</p>

<p>This is the drive I am migrating stuff to</p>

<p><img src="/img/postimages/newdrive.png" alt="Harddrive_Image_goes_here"></p>

<p>Lets begin the migration.</p>

<p>Since I have all my storage encrypted the first step is to setup the encryption container. This is done by issuing the following cammand:</p>

<pre><code>cryptsetup -v --type luks --cipher anubis-xts-plain64 --keysize 640 --hash whirlpool --iter-time 5000 --use-random -d /etc/homest luksFormat
</code></pre>

<p>Lets breakdown that command a bit shall we</p>

<table>
<th>Option</th>
<th>Desctiption</th>
<tr>
<td>-v</td>
<td>This simply makes the cryptsetup command output mor detailed information about what it does</td>
</tr>
<tr>
<td> --type luks</td>
<td>This instructs cryptsetup that we are working in luks mode instead of plain mode (See <a href="https://www.linode.com/docs/security/encrypt-data-disk-with-dm-crypt/#dm-crypt-in-plain-mode-vs-dm-crypt-with-luks-extension" target="_blank" rel="nofollow noopener">here</a> for an explanation of the differences between plain and luks mode.)</td>
</tr>
<tr>
<td>--cipher anubis-xts-plain64</td>
<td>This is defining the cipher to be used for the encryption operation. I always use a cipher that is not as mainstream. In this case i am using the anubis cipher. I like this cipher for a few reasons. One of them being that it is named after an egyptian god and the creator has stated that anyone who breaks it will be cursed.</td>
</tr>
<tr>
<td>--keysize 640</td>
<td>This defines the size(in bits) of the key used for encryption. The bigger the key the stronger the encryption. Anubix has a maximum key size of 320 but since the xtx cipher mode splits the key in 2 we specify 640 here.</td>
</tr>
<tr>
<td>--hash whirlpool</td>
<td>This defines what hash function(default sha256) will be used the hash the passphrase.</td>
</tr>
<tr>
<td>--iter-time 5000</td>
<td>This defines how long(in miliseconds) cryptsetup will spend processing the keyphrase. Default is 1 second I make it go for 5.</td>
</tr>
<tr>
<td>--use-random</td>
<td>This define the source used for the generation of random numbers used by the format process. Choices are urandom or random. I always use random as it produces a more random result</td>
</tr>
<tr>
<td>-d /etc/homest</td>
<td>This defines a keyfile to use instead of prompting for a passphrase. That key file is a giant string of random characters</td>
</tr>
<tr>
<td>luksFormat</td>
<td>This just says to format the device that follows</td>
</tr>
<tr>
<td>/dev/sdxY</td>
<td>The device to format</td>
</tr>
</table>

<p>Now that the encrypted container is ready we can open it to use it:</p>

<p><code>cryptsetup open -d /etc/homest /dev/sdxY homest</code></p>

<p>Now we can format the container with a filesystem:</p>

<p><code>mkfs.btrfs /dev/mapper/homest</code></p>

<p>And mount it:</p>

<p>fstab entry</p>

<pre><code>/dev/mapper/homest                              /mnt/btrfsroot           btrfs           compress=zlib,space_cache=v2       0 0
</code></pre>

<p><code>mount /mnt/btrfsroot</code></p>

<p>Starting with my @Storage subvolume we will now move it to the new drive</p>

<p>First we create a read-only snapshot of the subvolume:</p>

<p><code>btrfs subvol snap -r \@Storage/ \@Storage.migrate</code></p>

<p>A snapshot is like a picture of the data currently in that subvolume.</p>

<p>Now we send it over to the new drive:</p>

<p><code>btrfs send -vvv \@Storage.migrate/ | btrfs receive -vvv /mnt/btrfsroot/</code></p>

<p>Once this is complete we update the fstab entry to mount the subvolume from it&#39;s new location:</p>

<pre><code>/dev/mapper/homest                              /media/Storage  btrfs           compress=zlib,space_cache=v2,subvol=@Storage    0 0
</code></pre>

<p>Notice how this entry is similar to the previouse with the differences being the mountpoint(/media/Storage) and that we specify the subvolume to mount.</p>

<p>Now we do the same thing with the @Home subvolume.</p>

<p>First we create a read-only snapshot of the subvolume:</p>

<p><code>btrfs subvol snap -r \@Home/ \@Home.migrate</code></p>

<p>Now we send it over to the new drive:</p>

<p><code>btrfs send -vvv \@Home.migrate/ | btrfs receive -vvv /mnt/btrfsroot/</code></p>

<p>Once this is complete we update the fstab entry to mount the subvolume from it&#39;s new location:</p>

<pre><code>/dev/mapper/homest                              /Home  btrfs           compress=zlib,space_cache=v2,subvol=@Home    0 0
</code></pre>

<p>Now the subvolumes on the receive side(now in /mnt/btrfsroot) are still in read-only mode which wont work. To resolve that we simply take a read-write snapshot of the subvolume:</p>

<p><code>btrfs subvol snap \@Home.migrate \@Home</code>
<code>btrfs subvol snap \@Storage.migrate \@Storage</code></p>

<p>And That is it. Migration complete. All that is left to do is reboot to start using the new drive. Hope you maybe found this post informational.</p>

<p>Have a great day.</p>

<p>G</p>

<p><a href="/marcg/tag:Tech" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">Tech</span></a> <a href="/marcg/tag:Migration" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">Migration</span></a> <a href="/marcg/tag:Linux" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">Linux</span></a> <a href="/marcg/tag:BTRFS" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">BTRFS</span></a></p>

<p>Until next time. Stay safe!</p>

<p>G
<a href="https://blog.marcg.pizza/@/mgrondin@youdabomb.social" class="u-url mention" rel="nofollow">@<span>mgrondin@youdabomb.social</span></a></p>
]]></content:encoded>
      <guid>https://blog.marcg.pizza/marcg/migrate-all-the-things</guid>
      <pubDate>Mon, 31 Dec 2018 05:51:45 -0400</pubDate>
    </item>
  </channel>
</rss>