/srv/irclogs.ubuntu.com/2020/02/21/#ubuntu-server.txt

Isla_de_MuerteHi, a quick n00b question. I've currently got 3 HDDs which are pointing at the same /datafolder through LVM but I've noticed that one of them is dying (according to HDSentinel) and it's the one with the Ubuntu installed on it. Is there a way to check which files are on that HDD and move them out somehow? Plus from my understanding (now..) LVM is not such a good idea after all?01:44
compdocI never learned LVM because years ago utilities like clonezilla didnt work with it02:05
=== SuperKaramba is now known as BenderRodriguez
lordievaderIsla_de_Muerte: How is the volume configured?06:47
=== Wryhder is now known as Lucas_Gray
=== lotuspsychje_ is now known as lotuspsychje
=== Wryhder is now known as Lucas_Gray
Isla_de_Muertelordievader, How can I show you? Really can't recall..10:40
lordievaderIsla_de_Muerte: `lvdisplay -ma <path-to-logical-volume>` shows a lot of details.10:41
Isla_de_Muertelordievader, here was a df -h a while back https://pastebin.com/TWz474TK (almost nothing changed) and here is lvdisplay https://pastebin.com/RGYtWnqj10:46
lordievaderYou have a very strange LVM setup. This volume is spread (linearly) over /dev/sda1, /dev/sdb1, and a logical volume /dev/ubuntu-vg/sdc3.10:53
lordievaderNow you also need to figure out where the sdc3 LV is located. Then you can do some pvmove-ing to move the data off the bad disk. After doing that you can replace the bad disk.10:55
Isla_de_MuerteIf I am not mistaken the sdc3 is the new HDD I've temporarily mounted to see what files it got10:58
Isla_de_MuerteAh no, that is sdd1 nvm that10:58
Isla_de_MuerteThe sdc3 got the ubuntu installation10:59
lordievaderCould you provide the output of `sudo pvs`?10:59
lordievaderOh, and what is the bad disk?10:59
Isla_de_Muertehttps://pastebin.com/nHzMZ6bV and the sdc is the problematic one11:02
lordievaderYou don't have free space in your volume group? Brr, this is going to be tricky.11:04
lordievaderEssentially what you want to do is move the logical volumes ubuntu-lv and vg01-lv01 from sdc. That way you can replace disk.11:05
Isla_de_MuerteYeah that thing is full -.-'11:09
Isla_de_MuerteDo you also recommend me to split them up or something? Because I read that if one of the HDDs die the whole lvm is useless :/11:09
lordievaderUnless the underlaying storage is in raid one... yes, you would be in bad weather if one of the HDDs dies.11:11
lordievaderBest case scenario you just loose the data which was on that particular drive.11:11
lordievaderA better approach would be to bundle drives in twos and put the logical volumes in raid1 config.11:12
lordievaderI personally have the strategy of keeping volumes as small as possible. This allows me to move things around if I need to.11:13
=== bpsecret- is now known as bpsecret
Isla_de_MuerteI backup the whole box, so I don't mind if I use the maximum capacity I can.11:17
Isla_de_MuerteI currently got an old backup though that's why I'm a bit worried..11:17
lordievader<Isla_de_Muerte "I backup the whole box, so I don"> But you do throw away your flexibility with this.11:40
vlmwith iproute or ip command can make routed tunnels,is its possible to add some auth function to this?14:12
sdezielvlm: auth as in authenticated peers?14:13
vlmsdeziel: like the HE tunnels ,a username and password for the tunnel itself,dont need different users dunno if that counts as a peer?14:15
vlmdont need many different users i ment,just need one username/pw14:16
sdezielvlm: for HE tunnels, the username/password is only to allow yourself to whitelist/re-associate your IPv4 as your tunnel endpoint14:18
Triffid_Huntervlm: https://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/ may interest you14:18
vlmsdeziel: ohh i got it all wrong then,i thought it was a means of authing the tunnel itself hmm,so i guess it might not be possible then?14:19
sdezielvlm: what you describe sounds like a VPN to me14:20
vlmwhen i think of it it indeed does hehe14:20
sdezielvlm: are your tunnel peers using static IPs that you know already?14:21
vlmsdeziel: i dont got it setup yet though,was just thinking about setup one,just that if i setup one i dont feel like sharing it about,id like to be the only user,but then again others trying to use it would have to know the network of the endpoint to be able to use it?14:24
vlmthink ill have to do some more reading on the matter thanks for help atleast14:27
sdezielvlm: yes, with static tunnels, both sides need to be aware of each others. With a VPN, the peering can be more dynamic14:28
=== Wryhder is now known as Lucas_Gray
evitIf I'm using fail2ban and UFW can I use UFW rate limiting at the same time as fail2ban?16:37
jdstrandevit: yes17:25
jdstrandevit: it may be best to rely on fail2ban though since ufw's rate limiting isn't configurable (depends on if it works for you as is or not)17:26
evitBut I can configure SSH server rate limiting on the daemon instead right?17:26
jdstrandevit: (ie, just use ufw allow <thing> instead of ufw limit <thing>)17:27
evitjdstrand, Yes, I understand17:27
evitjdstrand, UFW doesn't seem to allow a lot of options on rate limiting SSH. I will do some more tweaking in ssh server config. I've already locked it down quite a bit. Just want to make a cybercriminal run home to mommy crying. =)17:28
jdstrandevit: the sshd_config MaxStartups has potential for DoS. it is a little inflexible17:29
jdstrandevit: fail2ban has threshold settings iirc that you can tune flexibly17:30
jdstrandif using fail2ban with ufw, I suggest updating the ufw rules to use 'ufw prepend' if it isn't already doing so17:31
jdstrand(fyi)17:31
jdstrand(eg, in /etc/fail2ban/action.d/ufw.conf; instead of ufw insert...)17:32
jdstrand:q17:33
jdstrandwhoops17:33
evitjdstrand, So make sure the fail2ban config recognizes I'm using UFW vs IPtables?17:34
evitjdstrand, What would you recommend for Maxstartups?17:39
jdstrandevit: I was just saying, if you are going to use the ufw action, make sure it uses 'ufw prepend'. the iptables one is fine to use so long as you use the default ufw config of MANAGE_BUILTINS=no from /etc/default/ufw17:40
jdstrandevit: as for Maxstartups, I find it too difficult to use in production and rely on fail2ban. it takes a while to get Maxstartups set correctly for typical usage and even when you do, someone could dos you17:42
jdstrandhttps://help.ubuntu.com/community/SSH/OpenSSH/Configuring#Rate-limit_the_connections discusses that a bit17:42
jdstrands/and rely/and suggest relying on/17:43
evitjdstrand, I understand17:43
evitooops17:43
evitjdstrand, Thanks17:46
jdstrandyw17:47
evitjdstrand, I use Public Key Auth but wish Ubuntu server had latest SSH version. I'd love to use MFA. It's not perfect either but hey...17:48
evitFIDO/U2F support in 8.2 https://www.openssh.com/releasenotes.html17:53
jdstrandevit: Ubuntu 20.04 LTS is just around the corner :)17:53
evitjdstrand, Yes, and I will be upgrading then. =)17:54
evitlater this year, Q3 or 417:54
jdstrandit still has 1:8.1p1-5, but hopefully it will be new enough for you17:54
jdstrandhopefully focal will be updated and new enough for you*17:55
evitjdstrand, It would be good to have FIDO/U2F support in 8.317:55
evitBut I understand the desire for a focus on stability vs. new features so I can wait if need be17:57
evitjdstrand, Thanks again, enjoy your weekend!17:59
jdstrandyou too! :)17:59
sdezielI believe the plan is to have OpenSSH 8.2 included in 20.0418:17
rbasaksdeziel: on the nginx IPv4 mapped logged, am I right in thinking that the full IPv6 address cannot be reconstructed from the IPv4 mapped address? I have been assuming so because it doesn't have enough bits.18:41
sdezielrbasak: hmm, I don't think we are referring to the same thing. I'm talking about addresses represented like that: "::ffff:192.0.2.1". Those are legitimate IPv4-mapped IPv6 where the first 96 bit uses a known prefix and then the last 32bit represents the IPv419:00
rbasaksdeziel: oh19:37
rbasakIn reverse to what I had assumed. My mistake.19:37
rbasakThat's not so bad.19:37
rbasakAs what I had been thinking it was.19:38
sdezielcool19:38
rbasakThat might be a reasonable change to make in a new Ubuntu release.19:38
rbasak(though not in a stable release)19:38
sdezielare you drawing the line before or after 20.04 ?19:38
rbasakI'm open to doing it in 20.04, subject to others' opinions.19:39
rbasakAny other risks?19:39
sdezielI'm not qualified to asses that but there must be a reason why upstream sets ipv6only=on by default. I also can't explain why they default to listening on IPv4 only...19:41
sdezielI have not contacted them19:41
rbasakThat's a good point.19:41
rbasakWe should ask them.19:41
DammitJimdo you guys have any recommendations on anti malware software for Ubuntu 18 servers?20:13
rbasakDammitJim: clamav is in main in Ubuntu20:15
rbasakIs that sufficient for you?20:15
DammitJimI'll take a look20:15
DammitJimI need to know if there is centralized management for it20:15
rbasakI'm not sure what form that would take.20:15
rbasakWhat sort of management do you mean?20:15
DammitJimso that I have a dashboard to ensure all my servers are up to date with definitions, agent versions, scan results, etc20:16
DammitJimand possible infections20:16
rbasakI'm not aware of that kind of thing being integrated in the package we ship.20:16
rbasakBut I think there's enough access to the pieces that you can do what you need.20:16
DammitJimthanks!20:16
DammitJimwhat do you mean by access to the pieces?20:17
rbasakI mean that clamav definition updates can be scripted, and their status can be accessed via script, etc20:18
rbasakAlso I see that monitoring-plugins-basic (in universe) has a check_clamd plugin20:18
rbasakFor scan results, I expect clamav logs in one of the usual ways20:19
rbasakSo it should integrate with most usual status monitoring and log monitoring systems.20:19
DammitJimthanks rbasak ... sounds like a project, but an option nontheless20:19
rbasakYou're welcome. Hope it works out!20:20
DammitJimty20:20

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!