How to move the services manually, to the secondary node (candy):
This will also prevent the resource to automatically failover if the primary node is back online so keep that in mind when you plan several reboots on primary node and you don't want to be bothered. crm resource migrate nfs-group candy
STONITH is short for "Shoot The Other Node In The Head". It's a technique for fencing in computer clusters.
Fencing is the isolation of a failed node so that it does not cause disruption to a computer cluster. As its name suggests, STONITH fences failed nodes by resetting or powering down the failed node.
Multi-node error-prone contention in a cluster can have catastrophic results, such as if both nodes try writing to a shared storage resource. STONITH provides effective, if rather drastic, protection against these problems.
The examples below are done on an environment where drbd volume resides on lvm logical volume and the filesystem is reiserfs.
a. If you want to shrink it, you will have to reduce first the filesystem on the primary node then the logical volume on both nodes. Afterwards you execute the resize command for drbd on primary node.
Be careful, in order to shrink the filesystem, you will have to umount it and obviously to stop the services before that (nfs, apache, etc.).
In this situation, ssh was unable to start because the wpar was restored from standalone machine backup (mksysb).
However, even if this is not your case, you can try to see if the procedure will fix your ssh.
SSH doesn't want to start:
gzaix@root:/home/root # lssrc -s sshd
Subsystem Group PID Status
sshd ssh inoperative
gzaix@root:/home/root # startsrc -s sshd
0513-059 The sshd Subsystem has been started. Subsystem PID is 18415656.
This tutorial describes how to configure a two nodes cluster to support NFS server with filesystem on DRBD volume. Without further writing, read on if you are curious ;)
Prepare the disk and create the needed vg/lv on both nodes:
You have upgraded to Yosemite and found this error while trying to upgrade macports via command line?
fmbp:~ root# port -v selfupdate
Error: Current platform "darwin 14" does not match expected platform "darwin 13"
Error: If you upgraded your OS, please follow the migration instructions: https://trac.macports.org/wiki/Migration
OS platform mismatch
while executing
"mportinit ui_options global_options global_variations"
Error: /opt/local/bin/port: Failed to initialize MacPorts, OS platform mismatch
Red Hat Enterprise Linux Workstation release 6.5 (Santiago) comes with python 2.6 and if you want to install 2.7 you will discover you do not have it on repository.
All you have to do is:
1. Add python 2.7 repository:
sudo sh -c 'wget -qO- http://people.redhat.com/bkabrda/scl_python27.repo >> /etc/yum.repos.d/scl.repo'
You are here because sometimes you find the network interfaces renamed after any tiny modification (like kernel upgrade for example). Well, fortunately there are ways to prevent this by binding the mac address to specific names. There are several ways to achieve this. Read on.
If you want to buy a new iPhone second hand, make sure you check it before paying up as you can do nothing with it if it's locked to another apple id.
Up until now there was no page to check if the device is locked or not. Apple has released the "Activation Lock Status" tool which is accesible via iCloud.com which alows users to enter a Device IMEI or Serial Number to check it's activation lock status.
There is a new bash vulnerability for which there are no technical details so I presume it is scarier than the one mentioned few days ago. Fortunately there is already a patch.
Security researchers from Red Hat have uncovered a new exploit in the common "Bash" command shell found in OS X, Linux, AIX and many other *nix platforms which can be used to deploy malicious code with minimal effort. Due to the ubiquity of the Bash shell, the exploit can also affect a wide variety of different web-connected devices and properties, including unsecured websites, smart home appliances, servers, and more.
As mentioned above, this vulnerability is not limited to only one platform but in the same time in doesn't affect the average consumer because even if they have "bash" in their computers, they do not use it in a way that it can be vulnerable. Unless you are using your computer as a server that accepts commands from untrusted sources (like web servers for example) (and then only if it sets environment variables based on commands from untrusted sources) you do not have to worry about.
I am sure this is well known by the ones working daily with this technology but it's still important to have it around. Of course, those who are not aware have better use for what is written in this article.
A network is a set of devices connected by physical or virtual media links.
A network is a connection of two or more nodes via a physical or virtual link but also two or more networks connected by one or more nodes.
What is a Link?
Link is the virtual or physical medium used to connect two or more computers.
What is a node?
Taking as example the response from the question above, the computers are called Nodes.
In this tutorial I will show you how to repair a sparsebundle image. It's not difficult but it can take some time, depending of the size of your image.
Also, please do note that some images are so damaged that they cannot be repaired so do not throw stones at me if you cannot fix yours.