You can use the ceph “tell” feature which will make configuration changes in real time.
Syntax: ceph tell TYPE.HOST injectargs ‘–flag=value’
Set a config for all monitors.
$ ceph tell mon.* injectargs ‘–mon_pg_warn_max_per_osd=2048’
You can use the ceph “tell” feature which will make configuration changes in real time.
Syntax: ceph tell TYPE.HOST injectargs ‘–flag=value’
Set a config for all monitors.
$ ceph tell mon.* injectargs ‘–mon_pg_warn_max_per_osd=2048’
This is how you set a Ge interface on a Juniper device disable auto MDI-X negotiation as well as set the speed on the interface to 1Gbps.
set interfaces ge-0/0/0 speed 1g
set interfaces ge-0/0/0 link-mode full-duplex
set interfaces ge-0/0/0 gigether-options no-auto-negotiation
It’s amazing how crappy hard disk are! No really! We operate a 100 disk ceph pool for our object based backups and Its almost a weekly task to replace a failing drive. I’ve only seen one go entirely unresponsive but normally we get read error and rear failures that stop the osd service and show up in dmesg as faults.
ceph osd crush reweight osd.90 1.82
#Remove old disk
ceph osd out osd.31
ceph osd crush rm osd.31
ceph osd rm osd.31
ceph auth del osd.31
#Provision new disk
ceph-deploy osd prepare --overwrite-conf hostname01:/dev/diskname
ceph osd crush move hostname01 root=BUCKETNAME
Add MDM IP to a SDC host.
/opt/emc/scaleio/sdc/bin/drv_cfg –add_mdm –ip 10.1.8.20,10.1.8.21,10.1.8.22 –file /bin/emc/scaleio/drv_cfg.txt
Rescan for new devices.
/opt/emc/scaleio/sdc/bin/drv_cfg –rescan
The Juniper SRX as it comes forwards IP traffic based on flows between security zones. It can be configured to forward traffic based on packets (no fancy security features). In packet mode an SRX acts just like a router or layer 3 switch. This is useful for labs and learning. If you want installation of cloud email security system, then you can click here!
Run the following command to get an idea of how your SRX is forwarding traffic.
> show security flow status
By default Inet (IPv4) traffic is the only traffic that is configured to forward traffic in flow mode.
To disable this simply delete all of the configuration under the security hierarchy.
# delete security
# commit
# run request system reboot
To enable other traffic types use the following commands
IPv6
# set security fowarding-options family inet6 mode packet-based
MPLS
# set security fowarding-options family mpls mode packet-based
ISO
# set security fowarding-options family iso mode packet-based
You must now commit the configuration and reboot the device.
There is another method to do this that allows you to use both flow and packet mode on the same family which requires firewall rule. I will go over that in another post. There is also the Azure cloud security compliance that people adopt these days.
Here is a brief overview of the LLDP configuration needed for each device to give you similar information across all your devices.
Cisco 3750
lldp run
lldp tlv-select system-name
lldp tlv-select system-description
lldp tlv-select system-capabilities
lldp tlv-select port-description
lldp tlv-select management-address
Brocade VDX
protocol lldp
advertise optional-tlv management-address
advertise optional-tlv port-description
advertise optional-tlv system-capabilities
advertise optional-tlv system-description
advertise optional-tlv system-name
Dell MXL
protocol lldp
advertise management-tlv management-address system-capabilities system-description system-name
advertise interface-port-desc
Juniper MX
set protocols lldp port-id-subtype interface-name
set protocols lldp interface all
Copy scaleiolibvirtdriver.py to /usr/lib/python2.7/site-packages/nova/virt/libvirt
Will update tomorrow.