Skip to main content

Posts

Showing posts from January, 2018

Ceph Single Node Setup Ubuntu

Single Node Ceph Install A quick guide for installing Ceph on a single node for demo purposes. It almost goes without saying that this is for tire-kickers who just want to test out the software. Ceph is a powerful distributed storage platform with a focus on spreading the failure domain across disks, servers, racks, pods, and datacenters. It doesn’t get a chance to shine if limited to a single node. With that said, let’s get on with it. Inspired from:  http://palmerville.github.io/2016/04/30/single-node-ceph-install.html Hardware This example uses a VMware Workstation 11 VM with 4 disks attached (1 for OS/App, 3 for Storage). Those installing on physical hardware for a more permanent home setup will obviously want to increase the OS disks for redundancy. To get started create a new VM with the following specs: ·         Name: ceph-single-node ·         Type: Linux ·         Version: Ubuntu 16.04.03 (64-bit) ·         Memory: 4GB ·         Disk: 25GB (Dynamic) ·

Linus Torvalds explodes at Intel for its recent patches

Given below is the raw mail from Linus Torvalds commenting on Intel's recent patches to fix the Spectre and Meltdown. Have fun reading this... From: Li nus Torvalds <> Date:  Sun, 21 Jan 2018 13:35:59 -0800 Subject:  Re: [RFC 09/10] x86/enter: Create macros to restrict/unrestrict Indirect Branch Speculation On Sun, Jan 21, 2018 at 12:28 PM, David Woodhouse <dwmw2@infradead.org> wrote: > On Sun, 2018-01-21 at 11:34 -0800, Linus Torvalds wrote: >> All of this is pure garbage. >> >> Is Intel really planning on making this shit architectural? Has >> anybody talked to them and told them they are f*cking insane? >> >> Please, any Intel engineers here - talk to your managers. > > If the alternative was a two-decade product recall and giving everyone > free CPUs, I'm not sure it was entirely insane. You seem to have bought into the cool-aid. Please add a healthy dose of critical thinking. Because this isn

Spectre and Meltdown

What Happened? During the Summer of 2017, researchers from around the world discovered a design flaw in the computer chips that serve as the brains for our computers and mobile devices. That design flaw — seen in Intel, AMD and ARM licensed chips — allows for two security vulnerabilities to be run, called “Meltdown” and “Spectre”. Both sound ominous and for good reason: the flaws “could allow hackers to steal the entire memory contents of computers, including mobile devices, personal computers and servers running in so-called cloud computer networks” according to the NY Times. So, uh, yeh: that’s not good. Who and What Caused the Problem? These exploits are based on chip engineering flaws, not on software flaws. Apple, Google, Abode, Microsoft, and other software companies didn’t write poor software or bad Operating Systems to cause these problems to occur. Rather, the chip manufacturers — Intel, AMD and ARM — designed and then engineered computer chips with flaws built int