ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login
    1. Topics
    2. DustinB3403
    3. Best
    • Profile
    • Following 21
    • Followers 20
    • Topics 938
    • Posts 25,971
    • Groups 0

    Posts

    Recent Best Controversial
    • RE: Building Out XenServer 6.5 with USB Boot and Software RAID 10

      Taken and simplified from here.

      RAID 10 is a combination of RAID 0 and RAID 1 to form a RAID 10. To setup Raid 10, we need at least 4 disks.

      Here we will use both RAID 0 and RAID 1 to perform a Raid 10 setup with minimum of 4 drives. Assume, that we’ve some data saved to logical volume, which is created with RAID 10. Just for an example, if we are saving a data “apple” this will be saved under all 4 disk by this following method.

      Creating RAID 10
      Using RAID 0 it will save as “A” in first disk and “p” in the second disk, then again “p” in first disk and “l” in second disk. Then “e” in first disk, like this it will continue the Round robin process to save the data. From this we come to know that RAID 0 will write the half of the data to first disk and other half of the data to second disk.
      In RAID 1 method, same data will be written to other 2 disks as follows. “A” will write to both first and second disks, “P” will write to both disk, Again other “P” will write to both the disks. Thus using RAID 1 it will write to both the disks. This will continue in round robin process.
      Now you all came to know that how RAID 10 works by combining of both RAID 0 and RAID 1. If we have 4 number of 20 GB size disks, it will be 80 GB in total, but we will get only 40 GB of Storage capacity, the half of total capacity will be lost for building RAID 10.

      Requirements
      In RAID 10, we need minimum of 4 disks, the first 2 disks for RAID 0 and other 2 Disks for RAID 1. Like I said before, RAID 10 is just a Combine of RAID 0 & 1. If we need to extended the RAID group, we must increase the disk by minimum 4 disks.
      My Server Setup
      Operating System : CentOS 6.5 Final
      IP Address : 192.168.0.229
      Hostname : rd10.tecmintlocal.com
      Disk 1 [20GB] : /dev/sdd
      Disk 2 [20GB] : /dev/sdc
      Disk 3 [20GB] : /dev/sdd
      Disk 4 [20GB] : /dev/sde
      There are two ways to setup RAID 10, but here I’m going to show you both methods, but I prefer you to follow the first method, which makes the work lot easier for setting up a RAID 10.

      Method 1: Setting Up Raid 10

      1. First, verify that all the 4 added disks are detected or not using the following command.

         ls -l /dev | grep sd    
        
      2. Once the four disks are detected, it’s time to check for the drives whether there is already any raid existed before creating a new one.

        mdadm -E /dev/sd[b-e]
        mdadm --examine /dev/sdb /dev/sdc /dev/sdd /dev/sde
        

      Verify 4 Added Disks
      Note: In the above output, you see there isn’t any super-block detected yet, that means there is no RAID defined in all 4 drives.

      Step 1: Drive Partitioning for RAID

      1. Now create a new partition on all 4 disks (/dev/sdb, /dev/sdc, /dev/sdd and /dev/sde) using the ‘fdisk’ tool.

         fdisk /dev/sdb
         fdisk /dev/sdc
         fdisk /dev/sdd
         fdisk /dev/sde
        

      Create /dev/sdb Partition
      Let me show you how to partition one of the disk (/dev/sdb) using fdisk, this steps will be the same for all the other disks too.

         fdisk /dev/sdb
      

      Please use the below steps for creating a new partition on /dev/sdb drive.

      1. Press ‘n‘ for creating new partition.
      2. Then choose ‘P‘ for Primary partition.
      3. Then choose ‘1‘ to be the first partition.
      4. Next press ‘p‘ to print the created partition.
      5. Change the Type, If we need to know the every available types Press ‘L‘.
      6. Here, we are selecting ‘fd‘ as my type is RAID.
      7. Next press ‘p‘ to print the defined partition.
      8. Then again use ‘p‘ to print the changes what we have made.
      9. Use ‘w‘ to write the changes.

      Disk sdb Partition

      Note: Please use the above same instructions for creating partitions on other disks (sdc, sdd sdd sde).
      4. After creating all 4 partitions, again you need to examine the drives for any already existing raid using the following command.

          mdadm -E /dev/sd[b-e]
          mdadm -E /dev/sd[b-e]1
      

      OR

         mdadm --examine /dev/sdb /dev/sdc /dev/sdd /dev/sde
         mdadm --examine /dev/sdb1 /dev/sdc1 /dev/sdd1 /dev/sde1
      

      Check All Disks for Raid
      Note: The above outputs shows that there isn’t any super-block detected on all four newly created partitions, that means we can move forward to create RAID 10 on these drives.

      Step 2: Creating ‘md’ RAID Device

      1. Now it’s time to create a ‘md’ (i.e. /dev/md0) device, using ‘mdadm’ raid management tool. Before, creating device, your system must have ‘mdadm’ tool installed, if not install it first.

        yum install mdadm           
        

      Once ‘mdadm’ tool installed, you can now create a ‘md’ raid device using the following command.

         mdadm --create /dev/md0 --level=10 --raid-devices=4 /dev/sd[b-e]1
      
      1. Next verify the newly created raid device using the ‘cat’ command.

        cat /proc/mdstat

      Loading the modules

      echo "modprobe raid10" > /etc/sysconfig/modules/raid.modules
      modprobe raid10
      chmod a+x /etc/sysconfig/modules/raid.modules
      

      Create md raid Device

      1. Next, examine all the 4 drives using the below command. The output of the below command will be long as it displays the information of all 4 disks.

        mdadm --examine /dev/sd[b-e]1
        
      2. Next, check the details of Raid Array with the help of following command.

        mdadm --detail /dev/md0
        

      Check Raid Array Details
      Note: You see in the above results, that the status of Raid was active and re-syncing.

      Step 3: Creating Filesystem

      1. Create a file system using ext4 for ‘md0’ and mount it under ‘/mnt/raid10‘. Here, I’ve used ext4, but you can use any filesystem type if you want.

        mkfs.ext4 /dev/md0
        

      Create md Filesystem
      10. After creating filesystem, mount the created file-system under ‘/mnt/raid10‘ and list the contents of the mount point using ‘ls -l’ command.

           mkdir /mnt/raid10
           mount /dev/md0 /mnt/raid10/
           ls -l /mnt/raid10/
      

      Next, add some files under mount point and append some text in any one of the file and check the content.

          touch /mnt/raid10/raid10_files.txt
          ls -l /mnt/raid10/
          echo "raid 10 setup with 4 disks" > /mnt/raid10/raid10_files.txt
          cat /mnt/raid10/raid10_files.txt
      

      Mount md Device
      11. For automounting, open the ‘/etc/fstab‘ file and append the below entry in fstab, may be mount point will differ according to your environment.

          vim /etc/fstab
      
          /dev/md0                /mnt/raid10              ext4    defaults        0 0
      

      To save and quit type.

          wq!.
      

      AutoMount md Device
      12. Next, verify the ‘/etc/fstab‘ file for any errors before restarting the system using ‘mount -a‘ command.

             mount -av
      

      Check Errors in Fstab

      Step 4: Save RAID Configuration

      1. By default RAID don’t have a config file, so we need to save it manually after making all the above steps, to preserve these settings during system boot.

        mdadm --detail --scan --verbose >> /etc/mdadm.conf
        

      Save Raid10 Configuration

      That’s it, we have created RAID 10 using this method.

      posted in IT Discussion
      DustinB3403D
      DustinB3403
    • RE: FCC Net Neutrality Insanity Continues

      This one abuse I was specifically effected by and never knew it, as in one day I couldn't use my app on my phone at the time any more.

      "VERIZON: In 2012, the FCC caught Verizon Wireless blocking people from using tethering applications on their phones. Verizon had asked Google to remove 11 free tethering applications from the Android marketplace. These applications allowed users to circumvent Verizon’s $20 tethering fee and turn their smartphones into Wi-Fi hot spots. By blocking those applications, Verizon violated a Net Neutrality pledge it made to the FCC as a condition of the 2008 airwaves auction."

      posted in News
      DustinB3403D
      DustinB3403
    • RE: What Are You Doing Right Now

      @DustinB3403 said:

      Waiting on XenServer updates.... and then checking the array to see if it still finds a bad disk.

      It looks like we might be back in action.

      0_1453823801891_XenCenterMain_2016-01-26_10-54-41.png

      Edit: Yep we're back in action.

      0_1453823861598_XenCenterMain_2016-01-26_10-57-20.png

      posted in Water Closet
      DustinB3403D
      DustinB3403
    • RE: Building Out XenServer 6.5 with USB Boot and Software RAID 10

      That is the data store.

      sda would be the boot device.

      sd[b-e] would be every other disk in the system available.

      posted in IT Discussion
      DustinB3403D
      DustinB3403
    • RE: 3 Cups a Day may help you live longer

      @jaredbusch said in 3 Cups a Day may help you live longer:

      Hi, welcome to yesterday...

      https://www.mangolassi.it/post/316573

      Damn it all, you must drink a lot of coffee as you live in the future. . .

      posted in News
      DustinB3403D
      DustinB3403
    • RE: What Are You Doing Right Now

      @johnhooks Who knew that I was looking for a Man the entire time! The beard really should've given it away.

      posted in Water Closet
      DustinB3403D
      DustinB3403
    • RE: Building Out XenServer 6.5 with USB Boot and Software RAID 10

      @Romo said:

      @DustinB3403 I am actually trying to do exactly that just right now on my test setup. It thought that with this command:
      xe sr-create type=ext device-config:device=/dev/md10 shared=false host-uuid:fba59a9c7e6db5a2d21e40343b415cfd name-label="Array storage"

      It would get added as local storage to xencenter, but I am getting this error :
      The SR operation cannot be performed because a device underlying the SR is in use by the host.

      Don't really know why, I haven't used xenserver before. Any ideas @scottalanmiller

      The reason your target device is in use is you have it mounted. Try dismounting the array and try again.

      posted in IT Discussion
      DustinB3403D
      DustinB3403
    • RE: FCC Net Neutrality Insanity Continues

      @mlnews said in FCC Net Neutrality Insanity Continues:

      https://arstechnica.com/tech-policy/2017/08/the-fcc-is-full-again-with-three-republicans-and-two-democrats/

      That picture of Pai sitting there with a smug look on his face like he just shit his pants and is happy that it's out of him...

      Screw this guy, I hope he gets hit by a bus.

      posted in News
      DustinB3403D
      DustinB3403
    • RE: Random Thread - Anything Goes

      As a friendly Valentines Day Reminder...

      qbUF53c.jpg

      posted in Water Closet
      DustinB3403D
      DustinB3403
    • RE: How do I get the forum heading back?

      @Son-of-Jor-El I was in Ohio 1 time (I live in NY) and we were leaving.

      Told the GPS to take me home... yeah the stupid thing was taking me to the same street address but in Ohio..... fun....

      posted in IT Discussion
      DustinB3403D
      DustinB3403
    • RE: Linux and Windows Both Gaining on the Desktop, Mac the Big Loser

      @fuznutz04 said in Linux and Windows Both Gaining on the Desktop, Mac the Big Loser:

      Great news... Now somebody fix the Korora/Fedora issues for my 2012 Macbook pro, and I will officially convert!

      Ok, get a new piece of hardware. Problem solved.

      posted in News
      DustinB3403D
      DustinB3403
    • RE: What Are You Doing Right Now

      @MattSpeller Have you tried a bigger hammer?

      Usually they get so scared that they fix their ways...

      posted in Water Closet
      DustinB3403D
      DustinB3403
    • RE: Topics regarding Inverted Pyramids Of Doom

      Here is yet another one...

      Single Storage node and two compute nodes.

      @scottalanmiller is already on the topic.

      posted in IT Discussion
      DustinB3403D
      DustinB3403
    • RE: Hackers could exploit solar power equipment flaws to cripple green grids

      @dashrender said in Hackers could exploit solar power equipment flaws to cripple green grids:

      @scottalanmiller said in Hackers could exploit solar power equipment flaws to cripple green grids:

      @tim_g said in Hackers could exploit solar power equipment flaws to cripple green grids:

      Maybe a white-hat will "hack" in and patch it... why not?

      Because... better things to do 🙂 And it still gets you arrested, so not worth the risk.

      Yeah - Steve Gibson claimed that he went to the FBI and asked about making a virus that would find Code Red machines and patch them. He was told no, it's illegal.

      More importantly it would make it that much more difficult for the FBI and other agencies to hack into those machines. . .

      posted in News
      DustinB3403D
      DustinB3403
    • RE: What Are You Doing Right Now

      @Minion-Queen I just cleared my driveway, took 40 minutes.

      Good thing I'm off today. 😛

      posted in Water Closet
      DustinB3403D
      DustinB3403
    • Are we encrypting to much at rest

      So it's kind of a funny question, especially when you think about it.

      To use your data, you have to decrypt the information first. Which if your device gets stolen at the point then, well then the thief has your data. Jumping to a item I just came across in *NIX world, you have fstab (file system table) which you can effectively add a network share, but the credentials are stored in plain text.

      Seems silly doesn't it. That in order for the system to use a remote resource that's encrypted, you have to supply credentials, but how else is it supposed to access those resources, unless it has credentials that are either plain text, or decrypted on the remote end?

      Even if you encrypted the credentials for use within fstab, they have to be decrypted so the information can be used to decrypt the information on the remote side.

      Seems like an awful lot of encryption, which adds processing time to both encrypt and decrypt the information for when it's needed.

      I won't go so far as saying that we shouldn't bother encrypting our at Rest Data, but encrypting the communications process seems to be a lot less work.

      What do you think?

      posted in IT Discussion encryption security storage
      DustinB3403D
      DustinB3403
    • RE: Apache Struts - Critical Security Flaw

      Assuming you're running Apache Struts I would think so.

      This isn't normal apache (httpd) that many of us have installed.

      posted in News
      DustinB3403D
      DustinB3403
    • RE: What Are You Doing Right Now

      @coliver I don't know if they could bring "Death" in so soon....

      He disappeared for a year basically as I understood the film.

      Death doesn't really come into the picture unless, he's almost dead and Death comes to collect him, but realizes she can't as he's not dead yet, just recovering.

      Which would make it a love triangle, between Death, Him and the chick in this movie.

      posted in Water Closet
      DustinB3403D
      DustinB3403
    • MDADM Hot-Swap

      Does MDADM support hot swapping of drives?

      posted in IT Discussion md raid software raid linux storage hot swap blind swap
      DustinB3403D
      DustinB3403
    • RE: Equifax Has 143 Million Americans Data Compromised

      @aaronstuder said in Equifax Has 143 Million Americans Data Compromised:

      @dustinb3403 said in Equifax Has 143 Million Americans Data Compromised:

      Unfortunately there is no way to no longer not be compromised.

      Exactly. I have this, and have had it for years.

      https://www.zanderins.com/idtheft2

      Complete and Unlimited Restoration provides true white glove service by transferring the restoration work directly to a Certified Identity Theft Specialist available 24/7/365.

      ID theft protection is worthless when literally every adult in the US is compromised. You literally have to just shut down equifax, and give everyone new information.

      SS numbers weren't meant as a means of identifying who someone is. How the hell can you tell who someone is because they can say number numbers over a phone call...

      posted in News
      DustinB3403D
      DustinB3403
    • 1 / 1