Product SiteDocumentation Site

A.2. Storage and Partitioning

Commands in this section are used to determine your system's storage options and partitioning.

A.2.1. autopart (optional) - Automatic Partitioning

Automatically creates partitions: a root (/) partition (1 GB or larger), a swap partition, and an appropriate /boot partition for the architecture. On large enough drives (50 GB and larger), this also creates a /home partition.


The autopart option cannot be used together with the part/partition, raid, logvol, or volgroup options in the same Kickstart file.
Selects one of the predefined automatic partitioning schemes you want to use. Accepts the following values:
  • lvm: The LVM partitioning scheme.
  • btrfs: The Btrfs partitioning scheme.
  • plain: Regular partitions with no LVM or Btrfs.
  • thinp: The LVM Thin Provisioning partitioning scheme.
The created partitioning scheme will follow the recommended scheme described at Section, “Recommended Partitioning Scheme”.
Specify a supported file system (such as ext4 or xfs) to replace the default when doing automatic partitioning.
Do not use LVM or Btrfs for automatic partitioning. This option is equal to --type=plain.
Encrypts all partitions. This is equivalent to checking the Encrypt partitions check box on the initial partitioning screen during a manual graphical installation.
Provides a default system-wide passphrase for all encrypted devices.
Stores data encryption keys of all encrypted volumes as files in /root, encrypted using the X.509 certificate from the URL specified with URL_of_X.509_certificate. The keys are stored as a separate file for each encrypted volume. This option is only meaningful if --encrypted is specified.
Adds a randomly-generated passphrase to each encrypted volume. Store these passphrases in separate files in /root, encrypted using the X.509 certificate specified with --escrowcert. This option is only meaningful if --escrowcert is specified.
Specifies which type of encryption will be used if the Anaconda default aes-xts-plain64 is not satisfactory. You must use this option together with the --encrypted option; by itself it has no effect. Available types of encryption are listed in the Fedora Security Guide, available at Using either aes-xts-plain64 or aes-cbc-essiv:sha256 is strongly recommended.