This script will let you make backups of live VMs running on KVM, using libvirt.
The backup job will suspend the VM for the time it takes to copy the RAM to disk.
Credits: Luca Lazzeroni
I've made some minor adjustments.
| # 0 is too far from ` ;) | |
| set -g base-index 1 | |
| # Automatically set window title | |
| set-window-option -g automatic-rename on | |
| set-option -g set-titles on | |
| #set -g default-terminal screen-256color | |
| set -g status-keys vi | |
| set -g history-limit 10000 |
| #! /bin/sh | |
| if [ $# -eq 0 ] | |
| then | |
| echo "No arguments supplied" | |
| exit 1 | |
| fi | |
| if [ -z "$1" ] |
| #!/bin/bash | |
| # | |
| BACKUPDEST="$1" | |
| DOMAIN="$2" | |
| MAXBACKUPS="$3" | |
| if [ -z "$BACKUPDEST" -o -z "$DOMAIN" ]; then | |
| echo "Usage: ./vm-backup <backup-folder> <domain> [max-backups]" | |
| exit 1 |
This script will let you make backups of live VMs running on KVM, using libvirt.
The backup job will suspend the VM for the time it takes to copy the RAM to disk.
Credits: Luca Lazzeroni
I've made some minor adjustments.
To install tcptraceroute on Debian/Ubuntu:
$ sudo apt-get install tcptracerouteTo install tcptraceroute on CentOS/REHL, first set up RepoForge on your system, and then:
$ sudo yum install tcptracerouteopenssl req -new -sha256 -key /etc/pki/ovirt-engine/keys/apache.key.nopass -out /tmp/engine.csr
| CREATE USER 'backupadmin'@'localhost' IDENTIFIED BY '<secret_password>'; | |
| GRANT LOCK TABLES, SELECT ON <DB_NAME>.* TO 'backupadmin'@'localhost'; | |
| GRANT RELOAD ON *.* TO 'backupadmin'@'localhost'; | |
| GRANT CREATE, INSERT, DROP ON mysql.ibbackup_binlog_marker TO 'backupadmin'@'localhost'; | |
| GRANT CREATE, INSERT, DROP ON mysql.backup_progress TO 'backupadmin'@'localhost'; | |
| GRANT CREATE, INSERT, SELECT, DROP ON mysql.backup_history TO 'backupadmin'@'localhost'; | |
| GRANT REPLICATION CLIENT ON *.* TO 'backupadmin'@'localhost'; | |
| GRANT SUPER ON *.* TO 'backupadmin'@'localhost'; | |
| GRANT CREATE TEMPORARY TABLES ON mysql.* TO 'backupadmin'@'localhost'; | |
| FLUSH PRIVILEGES; |
| # Kernel sysctl configuration file for Red Hat Linux | |
| # | |
| # For binary values, 0 is disabled, 1 is enabled. See sysctl(8) and | |
| # sysctl.conf(5) for more details. | |
| # Turn on execshield | |
| # 0 completely disables ExecShield and Address Space Layout Randomization | |
| # 1 enables them ONLY if the application bits for these protections are set to “enable” | |
| # 2 enables them by default, except if the application bits are set to “disable” | |
| # 3 enables them always, whatever the application bits |
As per Kubernetes.io/docs/getting-started-guides/ubuntu/manual
UNFINISHED!!
curl -s -S -L https://raw.githubusercontent.com/webplatform/salt-states/master/webplatform/files/screenrc.jinja -o .screenrc