Ran into slow boot on ubuntu 18.04 with local keys for usb drives with luks
the magic to avoid slow boot if usb is missing is to add the noauto option in /etc/crypttab
e.g. crypt tab entry
foo UUID=bar /root/.bletch luks,noauto
Ran into slow boot on ubuntu 18.04 with local keys for usb drives with luks
the magic to avoid slow boot if usb is missing is to add the noauto option in /etc/crypttab
e.g. crypt tab entry
foo UUID=bar /root/.bletch luks,noauto
Using data reported by Depository Trust & Clearing Corporation during the 155 weeks ending June 28, 2013, there were credit default swaps traded on only 13 reference names among U.S. banking firms:
Bank of America Corporation
Morgan Stanley
The Goldman Sachs Group, Inc.
JPMorgan Chase & Co.
Citigroup Inc.
Wells Fargo & Co. (NYSE:WFC)
MetLife, Inc. (NYSE:MET)
Ally Financial, Inc.
iStar Financial Inc. (SFI)
American Express Company (NYSE:AXP)
Capital One Financial Corporation (NYSE:COF)
Capital One Bank (USA), National Association
Citigroup Japan Holdings Corp.
from: https://seekingalpha.com/article/1635052-u-s-bank-credit-default-swaps-only-those-too-big-too-fail-can-be-hedged
After many days of banging my head against how to get 18.04 installed with raid1, crypt, and lvm on new disks from alternative server iso, the crux was the 1mb bios boot partition at the beginning of both disks.
Without that I’d get all the way through the install and – can’t install grub “you’re f’d”
What I did:
partition 1mb bios boot partition 1mb into the disk – offset by 2048 bytes from beginning of disk for size of 2048 bytes. type is bios boot.
then I did a generous boot partition of 732MB as raid, then the rest of the disk as a raid partition.
setup raid on sd[a,b]2 as md0, sd[a,b]3 as md1
setup ext4 on md0 mount as /boot
setup crypt on md1
setup lvm on crypt
setup swap on lvm, setup root on lvm
assign swap as swap
setup ext4 on lvm-root mount on /
finish install
https://www.linkedin.com/pulse/move-running-process-screen-bruce-werdschinski/
https://tutorials.technology/tutorials/move-luks-encrypted-disk.html
#take a snapshot
xe vm-snapshot new-name-label= vm=
#convert back to a vm
xe template-param-set is-a-template=false uuid=
#export
xe vm-export vm=(newname) filename=
#cleanup-snapshot
xe vm-uninstall uuid=
from: http://serverfault.com/questions/489184/export-xenserver-snapshot-as-file-via-console
I was used to using smartctl -a -d megaraid,0 /dev/sda to get SMART info from my physical disks
now with the LSISAS1068E (perc 6) I can get it with:
smartctl -a /dev/sg0
or
smartctl -a /dev/sg1
to see the physical disks
/dev/sg2 is just about the same as /dev/sda
https://docs.citrix.com/content/dam/docs/en-us/xenserver/xenserver-7-0/downloads/xenserver-7-0-installation-guide.pdf states:
The Control Domain: Also known as 'Domain0', or 'dom0', the Control Domain is a secure, privileged Linux VM (based on a CentOS 7.2 distribution) that runs the XenServer management toolstack. Besides providing XenServer management functions, the Control Domain also runs the driver stack that provides user created Virtual Machines (VMs) access to physical devices.
download a bunch of the buggers
for file in XS*.zip;do foo=`basename -s .zip $file`; unzip $file; bar=`xe patch-upload file-name=${foo}.xsupdate`;xe patch-apply uuid=$bar host-uuid=YOUR_HOST_UUID;done
you’ll probably want to add an rm of the zip file and an rm of the xsupdate file (exercise for the reader)
This won’t work for XS70E002 and XS70E003 until you apply XS70E004 (read the release notes).