Re: CPU Steal on Linux Guest

2016-12-19 Thread Alan Altmark
On Monday, 12/19/2016 at 10:21 GMT, Victor Echavarry Diaz wrote: > Can someone explain why CPU steal is? We believe that when the VM LPAR is using almost all is IFL's > CPU stealing begins between guests. But today this specific LPAR has 4 IFL and is using 350% and

Re: Expanding root file system

2016-12-19 Thread Mark Post
>>> On 12/19/2016 at 06:07 AM, Benjamin Block >>> wrote: > AFAIK its the same for btrfs as for the first case you mentioned. If you > change rootfs-dependencies, you'll need to make sure you rebuild the > "stage1"-initramfs.. so call grub2-install. And then you'll

Re: Expanding root file system

2016-12-19 Thread Mark Post
>>> On 12/16/2016 at 01:54 PM, Marcy Cortes >>> wrote: > It's more complicated with SLES 12 and grub. > I managed to change it but I'm not sure if all is exactly right. > > UUID's changed so the boot didn't work. > > I changed /etc/default/grub to >

Re: CPU Steal on Linux Guest

2016-12-19 Thread Barton Robinson
How much of your IFLs are in use by the other LPAR(s)? On 12/19/2016 2:19 PM, Victor Echavarry Diaz wrote: Can someone explain why CPU steal is? We believe that when the VM LPAR is using almost all is IFL's CPU stealing begins between guests. But today this specific LPAR has 4 IFL and is

CPU Steal on Linux Guest

2016-12-19 Thread Victor Echavarry Diaz
Can someone explain why CPU steal is? We believe that when the VM LPAR is using almost all is IFL's CPU stealing begins between guests. But today this specific LPAR has 4 IFL and is using 350% and one of the server, that has a one the highest share is having a steal of 70%. Regards, Victor

Re: systemd Failed unmounting /usr

2016-12-19 Thread Marcy Cortes
> Again, I'm not seeing that on any of my test systems, so there is something > about your (and Marcy's) particular setups that is triggering a bug. Not sure. My setup was ext3. /usr was on a LVM logical volume. SP1 didn't have an issue, but SP2 does. The server did boot so it didn't seem

Re: Root, sudo, su and preserving audit trail

2016-12-19 Thread Marcy Cortes
While sudo is certainly better than sharing a password, it isn't like Mark said, going to provide you with a good audit trail. If someone managed to get root access on your server to do something malicious, you can bet they also know how to remove the audit trail if it's on that server. And

Re: systemd Failed unmounting /usr

2016-12-19 Thread Mark Post
>>> On 12/16/2016 at 04:46 AM, "van Sleeuwen, Berry" >>> wrote: > But I do wonder, there are a lot of shops that use a separate partition for > /usr so I would expect to have seen more about this. In our linux group they Believe me, this got talked about a lot,

Re: Root, sudo, su and preserving audit trail

2016-12-19 Thread Mark Post
>>> On 12/19/2016 at 09:12 AM, Michael MacIsaac wrote: > Hi, > > We cannot SSH as root in our organization which is good for preserving > audit trail because all users must use their own credentials. > > I (but not all users) can then 'su to root', and my login user is

Re: Root, sudo, su and preserving audit trail

2016-12-19 Thread Michael MacIsaac
Steve, Yes, I just confirmed the same results on RHEL, SLES and Ubuntu (in alphabetical order :)) -Mike On Mon, Dec 19, 2016 at 9:21 AM, Gentry, Steve < steve.gen...@westernsouthernlife.com> wrote: > Mike, is this distro dependent or does it affect all distros? > Thanks, > Steve > >

Re: Root, sudo, su and preserving audit trail

2016-12-19 Thread Gentry, Steve
Mike, is this distro dependent or does it affect all distros? Thanks, Steve -Original Message- From: Linux on 390 Port [mailto:LINUX-390@VM.MARIST.EDU] On Behalf Of Michael MacIsaac Sent: Monday, December 19, 2016 9:12 AM To: LINUX-390@VM.MARIST.EDU Subject: Root, sudo, su and preserving

Re: Root, sudo, su and preserving audit trail

2016-12-19 Thread Michael MacIsaac
Christian, Thanks for the quick reply. That is good input. -Mike On Mon, Dec 19, 2016 at 9:28 AM, Christian Ehrhardt < christian.ehrha...@canonical.com> wrote: > On Mon, Dec 19, 2016 at 3:12 PM, Michael MacIsaac > wrote: > > > # env | grep mike > > USER=mike > > ... >

Re: Root, sudo, su and preserving audit trail

2016-12-19 Thread Christian Ehrhardt
On Mon, Dec 19, 2016 at 3:12 PM, Michael MacIsaac wrote: > # env | grep mike > USER=mike > ... > # sudo -i > mike's password: > # env | grep mike > SUDO_USER=mike > # su - zadmin > env | grep mike > > > Please don't say just don't allow root to su to another user - it is

Root, sudo, su and preserving audit trail

2016-12-19 Thread Michael MacIsaac
Hi, We cannot SSH as root in our organization which is good for preserving audit trail because all users must use their own credentials. I (but not all users) can then 'su to root', and my login user is preserved in the environment variable SUDO_USER. However, then as root I can 'su to another

Re: Expanding root file system

2016-12-19 Thread Benjamin Block
Hey Mark, On Thu, Dec 15, 2016 at 11:16:04AM -0700, Mark Post wrote: > >>> On 12/15/2016 at 12:26 PM, Marcy Cortes > >>> wrote: > > > Hey Mark Post, > > > > You wrote this nice guide to doing it in SLES 11. > > Do you have a SLES 12 process? > > No. If you did