David A. Long wrote:
OK, I have been pulling my hair out for a week trying to get a Fedora 7
server configured to use Postfix SMTP for relaying mail from remote
clients. It seems to handle TLS fine when receiving GNHLUG mail.
testsaslauthd reports successful authentication when given
On Sun, Oct 07, 2007 at 12:19:58AM -0400, Brian Chabot wrote:
Does anyone know of a good source for various Linux stickers/decals?
I'm looking for anything small, like those Made for Windows or Works
with Vista stickers in quantity. I know Ubuntu stickers are around,
but I am looking for
On Tue, 2007-10-09 at 08:23 -0400, Lloyd Kvam wrote:
Could you be rejecting unknown (number-to-name lookup fails) IP addresses?
I've been rejecting those as a relatively easy, effective spam control (
reject_unknown_hostname, reject_unknown_client )
I don't think so. I just added the
I'm planning to set up an HA mysql cluster. The database serves as a
backend to a set of webservers (HW loadbalanced). The DB has light load,
but when it breaks the site breaks, so I can't really get away with it
as a single point of failure.
So here were my options:
Brian,
per the tip I got in my GNHLUG e-mail this morning from Matt Brodur,
I have now filled my
need for stickers by ordering a few "Penguin Power" sticker sheets from
"cheapbytes.com"
-- as well as the latest Suse 10.3 DVD to save the bother of doing a
download then burning one...
On Tuesday 09 October 2007 10:43, Flaherty, Patrick wrote:
I think I've settled on the DRBD method. Using a network block device
and failing back and forth using heartbeat and a floating ip, though log
shipping seems pretty straightforward.
Does anyone have any positive or negative feedback
On 10/8/07, Steven W. Orr [EMAIL PROTECTED] wrote:
if [[ blah1 blah2 ]]
otherwise you'd have to say
if [ blah1 ]] [ blah2 ]
which I'm hoping won't generate a different set of questions.
(I'm assuming, in the second example, the doubled
right-square-bracket after blah1 is a typo.)
Can't
I have a linux box, with a publicly routable class C subnet.
I also have a /28 subnet on the same box in a different address space.
I am trying to setup an apache proxy server on about 100 IP's, where
any one of those IP's can accept an http proxy connection from a
remote user.
I got a
On 10/09/2007 10:43 AM, Flaherty, Patrick wrote:
I'm planning to set up an HA mysql cluster. The database serves as a
backend to a set of webservers (HW loadbalanced). The DB has light load,
but when it breaks the site breaks, so I can't really get away with it
as a single point of failure.
On 10/9/07, Brian [EMAIL PROTECTED] wrote:
I am trying to setup an apache proxy server on about 100 IP's, where
any one of those IP's can accept an http proxy connection from a
remote user.
I got a simple apache proxy setup, and it can accept connections on
one of several IP's (I've setup
On 10/9/07, Flaherty, Patrick [EMAIL PROTECTED] wrote:
I'm planning to set up an HA mysql cluster. The database serves as a
backend to a set of webservers (HW loadbalanced). The DB has light load,
but when it breaks the site breaks, so I can't really get away with it
as a single point of
What about multimaster replication?
Multi Master made me feel a bit icky. Auto-increment offsets the same
logshipping stuff others have had problems with. There are also other
implementations of mmr, but they are just sets of scripts that mimic
heartbeat. In the end, it's the same as normal
On 10/9/07, Brian [EMAIL PROTECTED] wrote:
However, all the outbound connections seem to originate from the
lowest numbered IP on the /28 subnet.
Right. Unless a program takes explicit action to bind its socket to
a particular IP address, the kernel router will choose the source IP
address
On 10/9/07, Ben Scott [EMAIL PROTECTED] wrote:
On 10/9/07, Brian [EMAIL PROTECTED] wrote:
However, all the outbound connections seem to originate from the
lowest numbered IP on the /28 subnet.
Right. Unless a program takes explicit action to bind its socket to
a particular IP address,
On 10/9/07, Thomas Charron [EMAIL PROTECTED] wrote:
+apr_socket_bind(*newsock, conf-bind_addr) != APR_SUCCESS) {
Right, I did RTFS. But it looks like that is done in the context of
a worker. For example:
+if (worker-bind_addr != NULL
+
On Tue, 2007-10-09 at 10:43 -0400, Flaherty, Patrick wrote:
Replication - One master server accepts writes, on write ships it's
logs to the slave server(s). Async may not be a problem, but seems
silly there's no flag to wait for the slaves to report a write was
successful.
Replication is
On Tue, Oct 09, 2007 at 01:02:37PM -0400, Ben Scott wrote:
On 10/8/07, Steven W. Orr [EMAIL PROTECTED] wrote:
if [[ blah1 blah2 ]]
otherwise you'd have to say
if [ blah1 ]] [ blah2 ]
which I'm hoping won't generate a different set of questions.
(I'm assuming, in the second example,
On 10/9/07, Ben Scott [EMAIL PROTECTED] wrote:
On 10/9/07, Thomas Charron [EMAIL PROTECTED] wrote:
+apr_socket_bind(*newsock, conf-bind_addr) != APR_SUCCESS)
{
Right, I did RTFS. But it looks like that is done in the context of
a worker. For example:
+if
Hi all,
I stopped by Quantum Books in Kendall Sq., Cambridge this morning.
Some of you may remember they bought out SoftPro a couple years ago.
In discussion with the woman who was helping me this morning, I
learned that their lease is up next June and they won't be renewing.
Rent is
On Tue, 2007-10-09 at 14:12 -0400, Flaherty, Patrick wrote:
What about multimaster replication?
Multi Master made me feel a bit icky. Auto-increment offsets the same
logshipping stuff others have had problems with.
A MySQL slave has a single master. A master can have multiple slaves.
On Tue, 2007-10-09 at 10:43 -0400, Flaherty, Patrick wrote:
I'm planning to set up an HA mysql cluster.
Oddly enough, I just got an email from mysql.com advertising high
availability training in Burlington, MA later this month. Let me know
if you want a copy of the email.
--
Lloyd Kvam
Venix
On 10/9/07, Paul Lussier [EMAIL PROTECTED] wrote:
I suppose the demise of the independant book seller, especially in the
technical space, is inevitable.
It's a fair bet that the demise of the printed book is inevitable.
Techies are just a bit ahead of the curve. When faced with a
technical
On 10/9/07, Ben Scott [EMAIL PROTECTED] wrote:
On 10/9/07, Paul Lussier [EMAIL PROTECTED] wrote:
I suppose the demise of the independant book seller, especially in the
technical space, is inevitable.
It's a fair bet that the demise of the printed book is inevitable.
I think the
On Tuesday, Oct 9th 2007 at 16:04 -, quoth Mark E. Mallett:
=On Tue, Oct 09, 2007 at 01:02:37PM -0400, Ben Scott wrote:
= On 10/8/07, Steven W. Orr [EMAIL PROTECTED] wrote:
= if [[ blah1 blah2 ]]
= otherwise you'd have to say
= if [ blah1 ]] [ blah2 ]
= which I'm hoping won't generate a
On Mon, October 8, 2007 2:39 pm, Steven W. Orr said:
The history is that before [ was a builtin, it used to be an external
program. You could look on old unix boxen and there'd be a file called
test which had a hard link to a file called [. The ] at the end of the [
was just syntactic
On 10/9/07, Tom Buskey [EMAIL PROTECTED] wrote:
It's a fair bet that the demise of the printed book is inevitable.
I think the reference book will go 1st. Books you read through, like
novels, will have longer legs.
Right. And even once really good paper replacement technology is
On 10/9/07, John Abreau [EMAIL PROTECTED] wrote:
... I looked in /bin for suspicious files, and that was the
first time I ever noticed the file [ . It looked suspicious, so
of course I deleted it. :-/
Did you know 'rpm' will let you remove every package from the system?
I do. Now. ;-)
On 10/9/07, Lloyd Kvam [EMAIL PROTECTED] wrote:
On Tue, 2007-10-09 at 14:12 -0400, Flaherty, Patrick wrote:
What about multimaster replication?
Multi Master made me feel a bit icky. Auto-increment offsets the same
logshipping stuff others have had problems with.
A MySQL slave has a
On Tuesday 09 October 2007 17:31, Ben Scott wrote:
On 10/9/07, John Abreau [EMAIL PROTECTED] wrote:
... I looked in /bin for suspicious files, and that was the
first time I ever noticed the file [ . It looked suspicious, so
of course I deleted it. :-/
Did you know 'rpm' will let you
On 10/9/07, Neil Joseph Schelly [EMAIL PROTECTED] wrote:
But then again, if you mean to say that rpm won't warn you before doing
something like that, then that is quite scary indeed.
rpm(8) didn't stop and ask Are you sure? when my script invoked
rpm --erase with an argument list explicitly
Tom Buskey writes:
It's similar with Hardware stores. Most constructions guys I know don't
like the mega stores because they wait in line, the quality isn't what they
want and returns take too long for them.
True story: I was standing in a huge hardware store one night, looking
for a
Nine people attended the SLUG meeting last night. After some
announcements, suitable heckling, and the obligatory protector
fussing, Rob Anderson got underway with a presentation on InkScape.
He started out explaining why he started playing with SVG in the first
place. It turns out Rob knows
Ben Scott [EMAIL PROTECTED] writes:
On 10/9/07, John Abreau [EMAIL PROTECTED] wrote:
... I looked in /bin for suspicious files, and that was the
first time I ever noticed the file [ . It looked suspicious, so
of course I deleted it. :-/
Did you know 'rpm' will let you remove every
33 matches
Mail list logo