Search Results

Search found 42453 results on 1699 pages for 'my question'.

Page 416/1699 | < Previous Page | 412 413 414 415 416 417 418 419 420 421 422 423  | Next Page >

  • Raid1 with active and spare partition

    - by Daniel Baron
    I am having the following problem with a RAID1 software raid partition on my Ubuntu system (10.04 LTS, 2.6.32-24-server in case it matters). One of my disks (sdb5) reported I/O errors and was therefore marked faulty in the array. The array was then degraded with one active device. Hence, I replaced the harddisk, cloned the partition table and added all new partitions to my raid arrays. After syncing all partitions ended up fine, having 2 active devices - except one of them. The partition which reported the faulty disk before, however, did not include the new partition as an active device but as a spare disk: md3 : active raid1 sdb5[2] sda5[1] 4881344 blocks [2/1] [_U] A detailed look reveals: root@server:~# mdadm --detail /dev/md3 [...] Number Major Minor RaidDevice State 2 8 21 0 spare rebuilding /dev/sdb5 1 8 5 1 active sync /dev/sda5 So here is the question: How do I tell my raid to turn the spare disk into an active one? And why has it been added as a spare device? Recreating or reassembling the array is not an option, because it is my root partition. And I can not find any hints to that subject in the Software Raid HOWTO. Any help would be appreciated. Current Solution I found a solution to my problem, but I am not sure that this is the actual way to do it. Having a closer look at my raid I found that sdb5 was always listed as a spare device: mdadm --examine /dev/sdb5 [...] Number Major Minor RaidDevice State this 2 8 21 2 spare /dev/sdb5 0 0 0 0 0 removed 1 1 8 5 1 active sync /dev/sda5 2 2 8 21 2 spare /dev/sdb5 so readding the device sdb5 to the array md3 always ended up in adding the device as a spare. Finally I just recreated the array mdadm --create /dev/md3 --level=1 -n2 -x0 /dev/sda5 /dev/sdb5 which worked. But the question remains open for me: Is there a better way to manipulate the summaries in the superblock and to tell the array to turn sdb5 from a spare disk to an active disk? I am still curious for an answer.

    Read the article

  • Windows 8 Native App in Asp.net MVC?

    - by xiao
    I was not sure if this should be here or stackoverflow. I am looking at developing some windows 8 apps. I come from a web background and was really intrigued that you make them with html and javascript. I started to think though why can't you use asp.net mvc to build a windows 8 application. My question is can you somehow use asp.net mvc to build a native windows 8 application or are you suck with javascript and html?

    Read the article

  • Can i install wamp and xampp on same computer?

    - by mysqllearner
    Currently I am using wamp 2.X, and been using it for 1 year. Recently I found this XAMPP, and it looks pretty good (well, I could say AWESOME), can I install XAMPP and WAMP on same computer? Will it crash or conflict each other? I already back up my wamp files, but I just dont want to waste my time to install and uninstall and install again. Thats why I am asking this question here.

    Read the article

  • Host's sys admins - can they view files?

    - by FullTrust
    Hi, Just a quick question. When using shared hosting, can system admins (employed by the host) access your files and read your database connectionstring details? Can they also access your database, and view the files, without a connectionstring? I'm assuming there's a certain level of trust, but is this possible/common? Thanks

    Read the article

  • Is it possible to download corrupted torrent files, even with a download client builtin checksum verification?

    - by Somebody still uses you MS-DOS
    I downloaded some mkv/mp4 files with my new router (I can download directly from it, using transmission), and all of them seem to be corrupted: lags, strange artifacts when using vlc, crashes with mp4, etc. When a downloaded part is corrupted, transmission warns you and downloads that part again. My question is: even after the transmission verification, is it possible that the downloaded file is still corrupt?

    Read the article

  • Unmanaged Network Switch vs Managed Network Switch

    - by David
    Currently I have an unmanaged POE switch connected to a Linksys router. I am thinking of upgrading my POE switch to a gigabit POE switch, the only problem is that the switch that I want to get is a managed switch. So here's my question: with a managed switch, can I still connect all of my devices to it and have the devices request IP addresses from the DHCP server within the Linksys router or will the devices request IPs from the managed switch since I believe the switch has its own DHCP server as well?

    Read the article

  • How can I automatically update the title in an xterm running screen?

    - by Nathan Fellman
    This is a bit of a followup to this question. I'm working in tcsh within GNU screen in an xterm. I have the following in my .cshrc: alias res_t 'xtset -t %h:%d "(%u:%g)" %e' # reset titlebar res_t # reset title right now alias precmd res_t And this works fine! However, when I run screen I see that the title doesn't get updated with the current directory. How can I make screen update the xterm title?

    Read the article

  • Why does SOS update a file to a previous revision?

    - by mattgately
    This question is about the SOS version control system: I have a file that always updates back to revision 1. For instance, to check out the latest revision I have to specifically ask for that revision. I have checked in several revisions up to revision 5. However, everytime I do an SOS update, it reloads revision 1. How can I request that the file updates to the latest revision rather than an older one?

    Read the article

  • Unicorn: Sub-Url Generated Links Broken

    - by YellowJK
    I am currently trying to stand up an instance of redmine, however currently The generated links in my redmine instance are all broken. I am attempting to serve redmine from a sub-url i.e example.com/redmine I have searched, but I have not found any information on a prefix option (similar to mongrel) I currently have the assets and formatting working properly, from my previous question. Redmine served via Apache / Unicorn My current setup is apache / unicorn Thanks in adavanced

    Read the article

  • SQL Server 2000 -- Log Shipping reliability?

    - by Chris J
    I've been asked to look into log shipping for SQL Server 2000 (yes, 2000): something in my memory tells me that I looked at this years ago and there were question marks over it's reliability. I'm trying to google stuff, but given the age of 2000 now I've put pulled up anything to confirm this -- most seem to say they're using it without problem, so just want confirm whether I'm just being delusional, or whether there were problems, but with a fully patched SP4 box these don't exist any more. Cheers!

    Read the article

  • Edit HTML template on Blogger website

    - by HKK
    This is a question about the website www.blogger.com. I am trying to modify my active template like this: I want to add a github ribbon to my template page, like the ones seen here: https://github.com/blog/273-github-ribbons I have tried pasting in the templates in the head tag and in the body tag, but in both cases I get error messages like this from the blogger site: Is it possible to add such a ribbon to a blogger site by editing the template html, and in that case, where is the correct place to paste in the code snippet?

    Read the article

  • What's the most advanced SIP client for Linux these days?

    - by Stefan
    I'm currently struggling which SIP client software to use with respect to Ubuntu / Gnome. Some clients I've looked so far: Blink, seems promising but the Linux variant lacks a lot of features Twinkle Latest release is ~2 years old. AFAIK the only one capable of encrypting calls using zrtp. Empathy: default tool for IM on ubuntu Ekiga Some features I'd like to see: availablity of buddies conference calls call log chat desktop sharing (Blink seems to do that for Mac) So my question is: what client software do you prefer and for what reason?

    Read the article

  • How to maintain a SSD drive on Ubuntu ?

    - by Julien Nicoulaud
    I am running Ubuntu 10.04 on a Intel X25-M PostVille 160 Go SSD drive. How can I tell if there's something wrong ? What should/can I do to maintain its performance/health ? Should I use TRIM and how often ? This may look as a duplicate of this question, but I am more asking in term of good practices and learning how to use this new technology the right way...

    Read the article

  • Is it a good practice to run identd in 2010?

    - by Alex R
    I know in the "old days" it was good practice to shut this off. But nowadays I have heard that it improves deliverability of email. In the old days people were not worried about spam (or having their outbound email rejected), so that made sense. Of course, the question is only relevant to servers that send email. What is the current, common practice among discerning Linux admins? Run identd or leave it off? Thanks

    Read the article

  • How does Amazon EC2 operating system licensing work?

    - by JP
    Hello, I'm new to the cloud and EC2 and am wondering how licensing of operating systems works. Specifically, i spent some time looking at amazon machine images (ami's) and some contain windows and sql server. My question is how does the licensing work: a) Do I install my own licenses once the boxes are available? b) Are these licenses covered by my Amazon bill c) what are any costs associated with this software? Thank in advance, JP

    Read the article

  • About Eclipse's "Upgrade" menu in Team

    - by djechelon
    I wonder what that command means. I have a project shared on Subversion and this strange menu item appeared to me. I tried to click it, but Eclipse required me a confirmation to proceed because the operation cannot be undone. Eclipse version Eclipse IDE for Java Developers Version: Indigo Service Release 2 Build id: 20120216-1857 I didn't post on SO because my question is related to Eclipse itself and not to programming

    Read the article

  • LDAP users as OU

    - by vpereira
    Hi, i'm facing a strange LDAP configuration. Some admin, just created users as OU in OpenLDAP. To do it, the admin, changed some attributes in the OU like posixAccount, inetOrgPerson, organizationalPerson and person.. my question is what is the advantage to do it? It works, but i would like to know the drawbacks about it.

    Read the article

  • ntbackup with two backup plans?

    - by feklee
    Is it possible to use ntbackup.exe (Windows XP SP3, 32) with two incremental backup plans? An example: "My Documents": every day, incrementally to D:\My_Documents.bkf Drive C: every month, incrementally to D:\All.bkf As far as I understand it, ntbackup.exe marks files as having been backed up in the file system. Thus, two incremental backup plans would interfere in a bad way. So, I assume that the answer to my question is: No But maybe I'm wrong...

    Read the article

  • L2TP and multiple interfaces on the machine

    - by Alex
    We have setup ipsec and l2tp on linux. One question came up (due to firewall management policy) is whether it's possible to have 1 virtual interface instead of one per connected client. Now we have: ppp0 serverip clientip1 ppp1 serverip clientip2 Want to have: l2tp_tun serverip serverip like with OpenVPN's tun interfaces and then to be able to push IP address and route to each client.

    Read the article

  • Oracle 10 g - Unable to free up space in tablespace

    - by Bruno Rothgiesser
    The tablespace in Oracle 10g is almost 100% used. Size (MB) = 571,768.0 Used (MB) = 571,534.0 I just deleted (and committed) thousands of records in a table that belongs to a schema associated with that tablespace. Surprisingly, no space was freed up according to the Tablespaces page on Enterprise Manager. Question: is there anything that I need to do to force Oracle to release the space corresponding to the deleted records?

    Read the article

  • IDS for Windows Server 2008?

    - by Ramaz
    I am sure my Windows Server 2008 box is constantly under attack both at the network level and web application level. QUestion is How do i detect these attacks? is there any light-weight software available? which can monitor the server? Note I am running this on a VPS so the monitor program will have to run on the same server.

    Read the article

< Previous Page | 412 413 414 415 416 417 418 419 420 421 422 423  | Next Page >