This will also prevent the resource to automatically failover if the primary node is back online so keep that in mind when you plan several reboots on primary node and you don't want to be bothered. crm resource migrate nfs-group candy
STONITH is short for "Shoot The Other Node In The Head". It's a technique for fencing in computer clusters.
Fencing is the isolation of a failed node so that it does not cause disruption to a computer cluster. As its name suggests, STONITH fences failed nodes by resetting or powering down the failed node.
Multi-node error-prone contention in a cluster can have catastrophic results, such as if both nodes try writing to a shared storage resource. STONITH provides effective, if rather drastic, protection against these problems.
You are here because sometimes you find the network interfaces renamed after any tiny modification (like kernel upgrade for example). Well, fortunately there are ways to prevent this by binding the mac address to specific names. There are several ways to achieve this. Read on.
If you want to buy a new iPhone second hand, make sure you check it before paying up as you can do nothing with it if it's locked to another apple id.
Up until now there was no page to check if the device is locked or not. Apple has released the "Activation Lock Status" tool which is accesible via iCloud.com which alows users to enter a Device IMEI or Serial Number to check it's activation lock status.
Security researchers from Red Hat have uncovered a new exploit in the common "Bash" command shell found in OS X, Linux, AIX and many other *nix platforms which can be used to deploy malicious code with minimal effort. Due to the ubiquity of the Bash shell, the exploit can also affect a wide variety of different web-connected devices and properties, including unsecured websites, smart home appliances, servers, and more.
As mentioned above, this vulnerability is not limited to only one platform but in the same time in doesn't affect the average consumer because even if they have "bash" in their computers, they do not use it in a way that it can be vulnerable. Unless you are using your computer as a server that accepts commands from untrusted sources (like web servers for example) (and then only if it sets environment variables based on commands from untrusted sources) you do not have to worry about.
I am sure this is well known by the ones working daily with this technology but it's still important to have it around. Of course, those who are not aware have better use for what is written in this article.
A network is a set of devices connected by physical or virtual media links.
A network is a connection of two or more nodes via a physical or virtual link but also two or more networks connected by one or more nodes.