Posts

Showing posts from April, 2012

Parsing the Multipath

Having worked a little with XIV I have come to like the "xiv_devlist" tool.  "xiv_devlist" lists all the attached disks on the SAN and the number of paths that are currently active.  This is very useful when you want to ensure that all the paths to storage are active. Find latest up-to-date code for this post on my Github profile:  https://github.com/linuxplayground/mpath_devlist It surprised me to find that there are no useful tools to parse the output from Multipath. Here is an example: multipath -ll mpath2 (3600507680191014a3800000000000100) dm-7 IBM,2145 [size=40G][features=1 queue_if_no_path][hwhandler=0][rw] \_ round-robin 0 [prio=100][active] \_ 0:0:1:8 sdaa 65:160 [active][ready] \_ 1:0:1:8 sdbk 67:224 [active][ready] \_ round-robin 0 [prio=20][enabled]

Policing my network

Policing my network - well not actually policing it, just locking it down. I have decided it's time to worry about what my kids might find on the Internet - my oldest is approaching 7 and beginning to spend more time on the 'puter. So here is the plan.  Not completely implemented just yet but getting there. Enable mac address filtering on the router.  Only devices I know about are allowed to connect to the wireless router and a password is still required to gain access and an IP address on my LAN.  - DONE!  It works great and a quick visit to my router admin page shows me who is currently using it.   Look this is just good sense.  If you are not doing mac address filtering book-mark this blog right now, and go and configure your router! Have a conversation with the child about the dangers and pitfalls of the Internet.  NOT DONE YET!  - I am kind of dreading this bit.  How do I explain to a child that it's bad to do something in such a way that they don't immedia