similar to: Bitrot strange behavior

Displaying 20 results from an estimated 2000 matches similar to: "Bitrot strange behavior"

2018 Apr 18
0
Bitrot strange behavior
Hi Cedric, Any file is picked up for signing by the bitd process after the predetermined wait of 120 seconds. This default value is captured in the volume option 'features.expiry-time' and is configurable - in your case, it can be set to 0 or 1. Point 2 is correct. A file corrupted before the bitrot signature is generated will not be successfully detected by the scrubber. That would
2018 Apr 18
1
Bitrot strange behavior
Hi Sweta, Thanks, this drive me some more questions: 1. What is the reason of delaying signature creation ? 2. As a same file (replicated or dispersed) having different signature thought bricks is by definition an error, it would be good to triggered it during a scrub, or with a different tool. Is something like this planned ? Cheers ? C?dric Lemarchand > On 18 Apr 2018, at 07:53, Sweta
2011 Jan 15
4
Sound quality issue
Hello, Our Asterisk runs with multiple remote sites (12 over an MPLS network), everything works fine except for the last site we have juste installed. When VOIP flows comes/goes from/to this site, there are sound quality issues, persistent, 100% reproducible, on every call. This is not a bandwidth or latency or jitter problem, everything is fine on the network. Our MPLS provider does all check
2017 Jan 23
1
nfs-ganesha rsa.pub download give 403
Hello, It seems there is some rights problem with https://download.gluster.org/pub/gluster/glusterfs/nfs-ganesha/rsa.pub <https://download.gluster.org/pub/gluster/glusterfs/nfs-ganesha/rsa.pub> : wget -O /dev/null https://download.gluster.org/pub/gluster/glusterfs/nfs-ganesha/rsa.pub <https://download.gluster.org/pub/gluster/glusterfs/nfs-ganesha/rsa.pub> --2017-01-23 19:28:47--
2013 Jul 24
3
PingTimeout
Hello list, I use tinc with QOS, and since some weeks I got problem with tunnel disconnection because the default "Pingtimeout" of 5 sec is reach. I think it happens because of the QOS shappe the tinc traffic (data here) to let some BP for VOIP, but whate is very strange is that the ICMP protocol is not include in the shapping, so tinc would never 'see' latency on the link,
2018 Apr 18
0
Bitrot - Restoring bad file
On 04/17/2018 06:25 PM, Omar Kohl wrote: > Hi, > > I have a question regarding bitrot detection. > > Following the RedHat manual (https://access.redhat.com/documentation/en-us/red_hat_gluster_storage/3.3/html/administration_guide/bitrot-restore_corrupt_file) I am trying out bad-file-restoration after bitrot. > > "gluster volume bitrot VOLNAME status" gets me the
2018 Apr 17
2
Bitrot - Restoring bad file
Hi, I have a question regarding bitrot detection. Following the RedHat manual (https://access.redhat.com/documentation/en-us/red_hat_gluster_storage/3.3/html/administration_guide/bitrot-restore_corrupt_file) I am trying out bad-file-restoration after bitrot. "gluster volume bitrot VOLNAME status" gets me the GFIDs that are corrupt and on which Host this happens. As far as I can tell
2012 Apr 18
4
FW: tinc Digest, Vol 90, Issue 17
Dear C?dric, If I am using windows version of tinc, how can I check the connection list? Regards, Eric -----Original Message----- From: tinc-bounces at tinc-vpn.org [mailto:tinc-bounces at tinc-vpn.org] On Behalf Of tinc-request at tinc-vpn.org Sent: Wednesday, April 18, 2012 6:00 PM To: tinc at tinc-vpn.org Subject: tinc Digest, Vol 90, Issue 17 Send tinc mailing list submissions to tinc at
2010 Nov 11
1
Tinc and security
Hello, I just read this document, especially the section about Tinc : http://www.cs.auckland.ac.nz/~pgut001/pubs/linux_vpn.txt It's an old one, but i would like to know the state of the Tinc security level for now. I don't scared about possible security weakness of Tinc because i only use it over our internal operator network (MPLS), but maybe one day will come the need to connect a
2011 Jan 14
1
QOS Wishes
Hello all, It would be a great feature if QOS could be implemented in Tinc. It's not to do any sort of comparison, but with OpenVPN, the traffic can be shapped. In the way that tinc works as mesh VPN, the great feature would be to fix a shapping value on each nodes, known and respected by each others. (like MPLS does) As an exemple, you've got 3 nodes A,B and C, you want Tinc flows on A
2012 Apr 17
1
Network management function of tinc
Dear Sir, Any network management function is available on tinc vpn? Such as, how can I check it out how many VPN nodes is connected now? Regards,Eric P Please consider your environmental responsibility. Before printing this e-mail message, ask yourself whether you really need a hard copy. -------------- next part -------------- An HTML attachment was scrubbed... URL:
2011 Feb 15
1
Node removed but still in routing infoormation
Hello, I have removed a nod from my tinc network, but his informations (owned subnet and ip address) are still present in the internal routing table. I think that even if the node is not reachable anymore (his ip is, but not the tinc daemon on it), his routing information "lives" beetween nodes. Is this possible or do i need to sleep a bit !? ;-) Do i need to stop all nodes, then
2023 Jan 19
1
really large number of skipped files after a scrub
Hi, Just to follow up my first observation from this email from december: automatic scheduled scrubs that not happen. We have now upgraded glusterfs from 7.4 to 10.1, and now see that the automated scrubs ARE running now. Not sure why they didn't in 7.4, but issue solved. :-) MJ On Mon, 12 Dec 2022 at 13:38, cYuSeDfZfb cYuSeDfZfb <cyusedfzfb at gmail.com> wrote: > Hi, > > I
2011 Jan 06
3
linux ip command and routing
Hi, I have a routing problem. When i start tinc it creates the following route in the main routing table. 192.168.2.0/24 dev nb003004 proto kernel scope link src 192.168.2.8 The problem is that i want to use extra routing tables for each tinc vpn. When i set the netmask for the tinc device to 255.255.255.255. The route is not created, how can i add it to a another route table. Setting a
2017 Sep 21
2
how to verify bitrot signed file manually?
Hi, I have a file in my brick which was signed by bitrot and latter when running scrub it was marked as bad. Now, I want to verify file again manually. just to clarify my doubt how can I do this? regards Amudhan -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.gluster.org/pipermail/gluster-users/attachments/20170921/f69ff7be/attachment.html>
2012 Jun 07
1
FW: Bad configuration file
??? This is solved. ? Problem was, incorrect settings in slapd.conf and dynamic / config file setup was mixed. ? str2entry: invalid value for attributeType objectClass #1 (syntax?1.3.6.1.4.1.1466.115.121.1.38) slapcat: bad configuration file! The core.schema and the core.ldif are bit different. debian installs slapd with dynamic ( in database ) config, when switch back to config file setup. The
2007 Apr 15
3
Bitrot and panics
IIRC, uncorrectable bitrot even in a nonessential file detected by ZFS used to cause a kernel panic. Bug ID 4924238 was closed with the claim that bitrot-induced panics is not a bug, but the description did mention an open bug ID 4879357, which suggests that it''s considered a bug after all. Can somebody clarify the intended behavior? For example, if I''m running Solaris in a VM,
2017 Sep 22
0
how to verify bitrot signed file manually?
ok, from bitrot code I figured out gluster using sha256 hashing algo. Now coming to the problem, during scrub run in my cluster some of my files were marked as bad in few set of nodes. I just wanted to confirm bad file. so, I have used "sha256sum" tool in Linux to manually get file hash. here is the result. file-1, file-2 marked as bad by scrub and file-3 is healthy. file-1 sha256
2017 Sep 29
1
how to verify bitrot signed file manually?
Hi Amudhan, Sorry for the late response as I was busy with other things. You are right bitrot uses sha256 for checksum. If file-1, file-2 are marked bad, the I/O should be errored out with EIO. If that is not happening, we need to look further into it. But what's the file contents of file-1 and file-2 on the replica bricks ? Are they matching ? Thanks and Regards, Kotresh HR On Mon, Sep 25,
2017 Sep 25
2
how to verify bitrot signed file manually?
resending mail. On Fri, Sep 22, 2017 at 5:30 PM, Amudhan P <amudhan83 at gmail.com> wrote: > ok, from bitrot code I figured out gluster using sha256 hashing algo. > > > Now coming to the problem, during scrub run in my cluster some of my files > were marked as bad in few set of nodes. > I just wanted to confirm bad file. so, I have used "sha256sum" tool in >