Skip to content

Instantly share code, notes, and snippets.

# vmadm halt <uuid>
# zonecfg -z <uuid>
zonecfg:uuid> add dataset
zonecfg:uuid:dataset> set name=tank
zonecfg:uuid:dataset> end
zonecfg:uuid> commit
zonecfg:uuid> exit
# zfs set mountpoint=legacy tank
# vmadm boot <uuid>
$ ls -l /dev/| grep z
crw-rw-rw- 1 root wheel 3, 3 Jul 16 11:34 zero
crw-rw-rw- 1 root wheel 19, 37 Jul 16 11:34 zfs
$ ls -l /System/Library/Extensions|grep z
drwxr-xr-x@ 3 root wheel 102B Nov 19 2015 AMDMTLBronzeDriver.bundle
drwxr-xr-x@ 3 root wheel 102B Nov 19 2015 AppleIntelFramebufferAzul.kext
$ ls -l /Library/Extensions|grep z
drwxr-xr-x 3 root wheel 102B Apr 29 03:34 zfs.kext
ls -l /Library/LaunchDaemons/ | grep open
-rw-r--r-- 1 root wheel 415B Apr 29 03:34 org.openzfsonosx.InvariantDisks.plist
-rw-r--r-- 1 root wheel 591B Apr 29 03:34 org.openzfsonosx.zconfigd.plist
-rw-r--r-- 1 root wheel 595B Apr 29 03:34 org.openzfsonosx.zed.plist
-rw-r--r-- 1 root wheel 613B Apr 29 03:34 org.openzfsonosx.zpool-import-all.plist
$ sudo launchctl list | grep open
49 0 org.openzfsonosx.zconfigd
51 0 org.openzfsonosx.InvariantDisks
- 0 org.openzfsonosx.zpool-import-all
- 0 com.openssh.sshd
77 0 com.apple.opendirectoryd
$ sudo kextstat|grep lund
118 1 0xffffff7f80a7b000 0x3f8 0x3f8 net.lundman.kernel.dependencies.25 (12.5.0) 677C6A8F-599C-40AD-BBA1-EFEB6599D32B
119 0 0xffffff7f80a7c000 0x51000 0x51000 net.lundman.spl (1.5.2) 270A6F0A-C32A-3592-B58E-0905804250A9 <118 7 5 4 3 1>
@churnd
churnd / upsource.conf
Created July 22, 2016 13:25
upsource upstart script
# upsource startup
description "upsource"
start on filesystem
stop on runlevel [06]
expect fork
respawn
[23/41]: configure dirsrv ccache
[24/41]: enabling SASL mapping fallback
[25/41]: restarting directory server
[26/41]: creating DS keytab
[27/41]: ignore time skew for initial replication
[28/41]: setting up initial replication
Starting replication, please wait until this has completed.
Update in progress, 4 seconds elapsedNo status yet
No status yet
No status yet
@churnd
churnd / github-iptables-rules.sh
Last active May 11, 2020 16:48
Create iptables block from Github IP ranges to integrate into existing firewall rules.
#!/bin/bash
# Configuration
IPTABLES_CONF=/etc/iptables/rules.v4
GITHUB_IPS=/var/tmp/github-ips
GITHUB_BEGIN="^# GITHUB BEGINS$"
GITHUB_END="^# GITHUB ENDS$"
if ! [ -x "$(command -v jq)" ]; then
echo "Cannot find 'jq' in your PATH, exiting..."