OBSOLETE Xen on Debian Stable gave some mysterious disk-controller errors, thoroughly confirmed not to be hardware problems, at least insofar as lack of HVM support is not a hardware problem. OpenVZ has been chosen instead.
Simple project server, emphasis on availability and uptime.
Most likely, this server will continue operating for several years, even as newer and better servers supplant it.
- 1 Login
- 2 CommandReference
- 3 Characteristics
- 4 Redundancy (RAID)
- 5 Policies
- 6 ChiefAdmin
- 7 Credits
- 8 Special Services
- 9 Funtoo
- 10 Softload
- 11 Reference
On any unix terminal emulator, enter the command:
ssh <userName>@HacDC-shared-m335-1.hacdc.org and
On other platforms, try applications like PuTTY with similar settings.
Routinely important commands unique to this server documented as follows.
- apt-get install xen-linux-system xen-tools git sudo
- dpkg-divert --divert /etc/grub.d/08_linux_xen --rename /etc/grub.d/20_linux_xen
- Installation of hostedXen .
- Uncomment lines referring to "-nat" and comment other vif-script/network-script lines in /etc/xen/xend-config.sxp .
- Uncomment "dir = /home/xen" in /etc/xen-tools/xen-tools.conf .
- ./hxNewUser <userName> # Creates user account with default Xen VM and permissions.
- ./hxDelUser <userName> # Deletes user account, associated VMs, and associated Xen permissions.
- ./hxNewVM <userName> <VM_Number> <dist> # Creates VM accessible to non-root user <userName> .
Through normal reboots, host will suspend/resume any guest VMs. If that is insufficient, the correct way to enable autostarting is through the xm command, documented as method 2 here.
- iptables -t nat -L -n -v #Lists port forwarding rules.
- iptables -t nat -F #Deletes port forwarding rules.
- iptables -D PREROUTING 1 #Deletes port forwarding rule.
/sbin/iptables -P FORWARD ACCEPT /sbin/iptables --table nat -A POSTROUTING -o eth0 -j MASQUERADE
/sbin/iptables -t nat -A PREROUTING -p tcp -i eth0 --dport 20283 -j DNAT --to 10.174.10.5:22
Package iptables-persistent has been installed. Upon installation, existing iptables rules were saved. Edit /etc/iptables/rules.v4 .
List Xen VMs created for you.
Start Xen VM, and launch console.
sudo /usr/sbin/xm create -c /etc/xen/<name>.cfg #Escape with Ctrl+] .
Just start Xen VM. Useful if planning to interact through other means (ie. network).
sudo /usr/sbin/xm create /etc/xen/<name>.cfg
Yes, really, hard shutdown is termed "destroy". Don't worry, not synonymous with "delete".
sudo /usr/sbin/xm destroy <name>
Opens the console of running VM <name> .
sudo /usr/sbin/xm console <name> #Escape with Ctrl+] .
- CPU - E2200 Dual-Core 2.2GHz
- RAM - 1GB
- HDD - 500GB
- Hostname - HacDC-shared-m335-1
- FQDN - HacDC-shared-m335-1.hacdc.org
None yet, keep backups. Nonetheless, hard disk is kept cool, so the server should have a long life ahead of it.
HacDC members with a demonstrable need or willingness to manage non-root users may be given root access. Imperative that root users do not jeopardize uptime.
All HacDC members are welcome to non-root shell accounts, directly provided by the server, and used to manage Xen VMs.
All HacDC members are welcome to Xen Virtual Machines. Resources, including CPU, disk space, and external network ports, will be allocated on an as-needed first-come-first-serve basis.
Root users, please use the provided hostedXen scripts. Following the naming conventions set therein helps account for which resources belong to whom.
Internal server email will notify users, if feasible, on the following schedules, subject to change.
- Three days before planned downtime exceeding one hour.
- One week before planned permanent downtime (obsolescence).
- Three months before removal of ex-member accounts. Exceptions on a case-by-case basis.
- Users should regularly backup critical data offiste.
- Onsite data storage is not guaranteed to be reliable.
- All server data may be deleted after obsolescence.
- Removed accounts may be deleted immediately and permanently upon deactivation.
Machine is physically accessible to all keyholding HacDC members. Although HacDC members are generally responsible, privacy should not be expected.
Sharing of account resources is permitted, however, additional resources will be allocated according to individual member needs for specific purposes. As a reminder, compromised accounts will be immediately removed as discovered.
Hard bandwidth limits have not been set to ease administration of local file servers. However, please configure applications to limit maximum bandwidth use where possible, particularly for web servers.
Hunterkll - Donated core hardware.
Funtoo (enhanced Gentoo) build server is available, with binary packages and weekly full-os tarballs for new installations.