After my power went out here while I was on an extended vacation, I realized the folly in having a completely encrypted drive that could only be unlocked via a locally entered password. Ideally GRUB and the kernel could be configured to probe the network to develop a fingerprint of its devices, and unlock automatically without any further keys if all devices are present. Otherwise, unlock via entered password. This is a task for another day.
My current task is to install a plain, unencrypted Arch Linux installation to my old workstation (lithium). I have a new SSD, and I want to document the process of installation (mainly so I can follow it again). It is adapted from my Encrypted Disk instructions.
# BIOS partition, since all of the systems I'll be installing this in the immediate future are all BIOS, not EFI/UEFI parted -s /dev/sda mklabel gpt mkpart bios 2048s 4096s parted -s /dev/sda set 1 bios_grub on parted -s /dev/sda mkpart primary ext2 6144 100% # Fill the rest of the disk parted -s /dev/sda set 2 lvm on pvcreate /dev/sda2 vgcreate vg /dev/mapper/lvm lvcreate -L 16G vg -n swap lvcreate -L 50G vg -n root lvcreate -l +100%FREE vg -n home mkswap -L swap /dev/mapper/vg-swap mkfs.ext4 /dev/mapper/vg-root mkfs.ext4 /dev/mapper/vg-home mount /dev/mapper/vg-root /mnt mkdir /mnt/home mount /dev/mapper/vg-home /mnt/home swapon /dev/mapper/vg-swap pacman -Syu reflector reflector --country US --verbose -l 10 --sort rate --save /etc/pacman.d/mirrorlist