This site is now 100% read-only, and retired.

XML Logo

Posted by gpall on Tue 15 Apr 2008 at 19:41
Tags: ,
I run vmware server 1.0.5 on a linux debian lenny. The VM is also debian lenny.

Without any further confirmation, the clock drifts like crazy!

I tried to run ntpdate on the lenny VM, every 5 minutes for example, but the clock drift was such that ntpdate did not even start!

Not to get long, the solution, after having tried various things, is this:

Boot the kernel of the VM with these options:
kernel /boot/vmlinuz-2.6.24-1-686 root=/dev/sda1 ro clocksource=pit nosmp noapic

and also install the vmware tools onto the VM. Enable clock syncronisation from the vmware tools, and you're done!

 

Posted by gpall on Sat 29 Mar 2008 at 16:54
Tags: ,
Vmware-any-any-update fails... I modified it using info from:
http://communities.vmware.com/message/829747;jsessionid=333851A8BA5885FD2E8649055CCD23C2

and uploaded it here: http://postmortem.csd.auth.gr/webVarious/vmware-any-any-update_for_vmware_1.0.5.tar.bz2

The procedure is: Install server and do not run the config script. Untar the patch, and run runme.pl. That's all!

 

Posted by gpall on Tue 4 Mar 2008 at 19:38
Tags: , ,
I am really curious! Am I the only one suffering from this?

My root fs is on LVM2 and each time I shut down the computer I get:

Can't deactivate volume group "vg-main" with 1 open logical volume(s)

It seems it is annoyed by the fact that lvm must be deactivated, but root fs has not been unmounted...

Any ideas?

 

Posted by gpall on Sun 17 Feb 2008 at 20:54
Tags: , ,
OK, I am paranoid.

The question is: what's the point of having your computer with a full encrypted disk, if the external usb disk next to your computer, is where you store the tar.bz2 backups of your computer?

No point, exactly! That's why I needed a way to keep the backups on the usb disk securely stored.

No need to say much: This is the only way!

# cd /media/my_external_usb_disk/
# tar cpSj --exclude=/tmp --exclude=/proc --exclude=/lost+found --exclude=/dev --exclude=/mnt --exclude=/media --exclude=/sys / | gpg -z 0 -e -r youruserID | tee sysbackup.tbg | md5sum > sysbackup.tbg.md5

This creates without intermediate temporary files, two outputs:
sysbackup.tbg which contains your encrypted backup, and sysbackup.tbg.md5 which contains the md5 hash of sysbackup.tbg

If your need selective restoring, just use:
# gpg -d /media/my_external_usb_disk/sysbackup.tbg | tar xvj etc/X11/xorg.conf

in order to restore for example the /etc/X11/xorg.conf file... so easy!

 

Posted by gpall on Thu 24 Jan 2008 at 14:25
Tags: none.
It's been over a week that I submitted it and it has not been published... Is it that bad?? :-) I am sure that people are interested on how to migrate their debian boxes to a full encrypted LVM system...

 

Posted by gpall on Fri 18 Jan 2008 at 11:10
Tags: none.
is just for testing purposes!