On Monday, 12/19/2016 at 10:21 GMT, Victor Echavarry Diaz
wrote:
> Can someone explain why CPU steal is? We believe that when the VM LPAR
is using almost all is IFL's
> CPU stealing begins between guests. But today this specific LPAR has 4
IFL and is using 350% and
>>> On 12/19/2016 at 06:07 AM, Benjamin Block
>>> wrote:
> AFAIK its the same for btrfs as for the first case you mentioned. If you
> change rootfs-dependencies, you'll need to make sure you rebuild the
> "stage1"-initramfs.. so call grub2-install. And then you'll
>>> On 12/16/2016 at 01:54 PM, Marcy Cortes
>>> wrote:
> It's more complicated with SLES 12 and grub.
> I managed to change it but I'm not sure if all is exactly right.
>
> UUID's changed so the boot didn't work.
>
> I changed /etc/default/grub to
>
How much of your IFLs are in use by the other LPAR(s)?
On 12/19/2016 2:19 PM, Victor Echavarry Diaz wrote:
Can someone explain why CPU steal is? We believe that when the VM LPAR is using
almost all is IFL's CPU stealing begins between guests. But today this specific
LPAR has 4 IFL and is
Can someone explain why CPU steal is? We believe that when the VM LPAR is using
almost all is IFL's CPU stealing begins between guests. But today this specific
LPAR has 4 IFL and is using 350% and one of the server, that has a one the
highest share is having a steal of 70%.
Regards,
Victor
> Again, I'm not seeing that on any of my test systems, so there is something
> about your (and Marcy's) particular setups that is triggering a bug.
Not sure.
My setup was ext3. /usr was on a LVM logical volume.
SP1 didn't have an issue, but SP2 does. The server did boot so it didn't seem
While sudo is certainly better than sharing a password, it isn't like Mark
said, going to provide you with a good audit trail.
If someone managed to get root access on your server to do something malicious,
you can bet they also know how to remove the audit trail if it's on that server.
And
>>> On 12/16/2016 at 04:46 AM, "van Sleeuwen, Berry"
>>>
wrote:
> But I do wonder, there are a lot of shops that use a separate partition for
> /usr so I would expect to have seen more about this. In our linux group they
Believe me, this got talked about a lot,
>>> On 12/19/2016 at 09:12 AM, Michael MacIsaac wrote:
> Hi,
>
> We cannot SSH as root in our organization which is good for preserving
> audit trail because all users must use their own credentials.
>
> I (but not all users) can then 'su to root', and my login user is
Steve,
Yes, I just confirmed the same results on RHEL, SLES and Ubuntu (in
alphabetical order :))
-Mike
On Mon, Dec 19, 2016 at 9:21 AM, Gentry, Steve <
steve.gen...@westernsouthernlife.com> wrote:
> Mike, is this distro dependent or does it affect all distros?
> Thanks,
> Steve
>
>
Mike, is this distro dependent or does it affect all distros?
Thanks,
Steve
-Original Message-
From: Linux on 390 Port [mailto:LINUX-390@VM.MARIST.EDU] On Behalf Of Michael
MacIsaac
Sent: Monday, December 19, 2016 9:12 AM
To: LINUX-390@VM.MARIST.EDU
Subject: Root, sudo, su and preserving
Christian,
Thanks for the quick reply. That is good input.
-Mike
On Mon, Dec 19, 2016 at 9:28 AM, Christian Ehrhardt <
christian.ehrha...@canonical.com> wrote:
> On Mon, Dec 19, 2016 at 3:12 PM, Michael MacIsaac
> wrote:
>
> > # env | grep mike
> > USER=mike
> > ...
>
On Mon, Dec 19, 2016 at 3:12 PM, Michael MacIsaac
wrote:
> # env | grep mike
> USER=mike
> ...
> # sudo -i
> mike's password:
> # env | grep mike
> SUDO_USER=mike
> # su - zadmin
> env | grep mike
>
>
> Please don't say just don't allow root to su to another user - it is
Hi,
We cannot SSH as root in our organization which is good for preserving
audit trail because all users must use their own credentials.
I (but not all users) can then 'su to root', and my login user is preserved
in the environment variable SUDO_USER.
However, then as root I can 'su to another
Hey Mark,
On Thu, Dec 15, 2016 at 11:16:04AM -0700, Mark Post wrote:
> >>> On 12/15/2016 at 12:26 PM, Marcy Cortes
> >>> wrote:
>
> > Hey Mark Post,
> >
> > You wrote this nice guide to doing it in SLES 11.
> > Do you have a SLES 12 process?
>
> No. If you did
15 matches
Mail list logo