Before starting, I have to mention this tutorial is not about ZFS Fuse which comes by default with Debian. This is the real deal, the native ZFS for Linux, without fuse support. In theory should be faster and more reliable and according to my tests so far, it is amazing!
First of all, install ZFS:
UPDATE: ZFS packages are included in debian repository. So all you have to do now is:
How to move the services manually, to the secondary node (candy):
This will also prevent the resource to automatically failover if the primary node is back online so keep that in mind when you plan several reboots on primary node and you don't want to be bothered. crm resource migrate nfs-group candy
STONITH is short for "Shoot The Other Node In The Head". It's a technique for fencing in computer clusters.
Fencing is the isolation of a failed node so that it does not cause disruption to a computer cluster. As its name suggests, STONITH fences failed nodes by resetting or powering down the failed node.
Multi-node error-prone contention in a cluster can have catastrophic results, such as if both nodes try writing to a shared storage resource. STONITH provides effective, if rather drastic, protection against these problems.
The examples below are done on an environment where drbd volume resides on lvm logical volume and the filesystem is reiserfs.
a. If you want to shrink it, you will have to reduce first the filesystem on the primary node then the logical volume on both nodes. Afterwards you execute the resize command for drbd on primary node.
Be careful, in order to shrink the filesystem, you will have to umount it and obviously to stop the services before that (nfs, apache, etc.).
In this situation, ssh was unable to start because the wpar was restored from standalone machine backup (mksysb).
However, even if this is not your case, you can try to see if the procedure will fix your ssh.
SSH doesn't want to start:
gzaix@root:/home/root # lssrc -s sshd
Subsystem Group PID Status
sshd ssh inoperative
gzaix@root:/home/root # startsrc -s sshd
0513-059 The sshd Subsystem has been started. Subsystem PID is 18415656.
You have upgraded to Yosemite and found this error while trying to upgrade macports via command line?
fmbp:~ root# port -v selfupdate
Error: Current platform "darwin 14" does not match expected platform "darwin 13"
Error: If you upgraded your OS, please follow the migration instructions: https://trac.macports.org/wiki/Migration
OS platform mismatch
"mportinit ui_options global_options global_variations"
Error: /opt/local/bin/port: Failed to initialize MacPorts, OS platform mismatch
You are here because sometimes you find the network interfaces renamed after any tiny modification (like kernel upgrade for example). Well, fortunately there are ways to prevent this by binding the mac address to specific names. There are several ways to achieve this. Read on.
If you want to buy a new iPhone second hand, make sure you check it before paying up as you can do nothing with it if it's locked to another apple id.
Up until now there was no page to check if the device is locked or not. Apple has released the "Activation Lock Status" tool which is accesible via iCloud.com which alows users to enter a Device IMEI or Serial Number to check it's activation lock status.
Security researchers from Red Hat have uncovered a new exploit in the common "Bash" command shell found in OS X, Linux, AIX and many other *nix platforms which can be used to deploy malicious code with minimal effort. Due to the ubiquity of the Bash shell, the exploit can also affect a wide variety of different web-connected devices and properties, including unsecured websites, smart home appliances, servers, and more.
As mentioned above, this vulnerability is not limited to only one platform but in the same time in doesn't affect the average consumer because even if they have "bash" in their computers, they do not use it in a way that it can be vulnerable. Unless you are using your computer as a server that accepts commands from untrusted sources (like web servers for example) (and then only if it sets environment variables based on commands from untrusted sources) you do not have to worry about.
I am sure this is well known by the ones working daily with this technology but it's still important to have it around. Of course, those who are not aware have better use for what is written in this article.