Recent content by isparks_curtis

  1. I

    Proxmox adding a bad route?

    Thanks guys. Since I'm not getting any "me too" responses, I'm guessing this is not a Proxmox issue, but something being configured wrong on our network. I'm moving this discussion to ServerFault: http://serverfault.com/questions/777103/linux-adding-a-bad-route-on-startup And since posting...
  2. I

    Proxmox adding a bad route?

    I've got several Proxmox 3.1 machines that have a peculiar problem. After booting them up, an extra route is created that has to be deleted before the machine can talk to others on the same subnet. After booting, the routes look like this (public IPs masked): # route Kernel IP routing table...
  3. I

    Unable to re-mount /proc in Proxmox 3 containers?

    Thanks for the clarification. Perhaps someone over on the OpenVZ forum will know... https://forum.openvz.org/index.php?t=tree&goto=52226#msg_52226
  4. I

    Unable to re-mount /proc in Proxmox 3 containers?

    I got distracted for a bit and am finally getting back to this. Are you saying that lxc.mount.auto can be used in an openvz configuration file? In my googling, I'm only seeing examples of it being used in lxc container configs. There must be some way to mount /proc in a secure way in...
  5. I

    Unable to re-mount /proc in Proxmox 3 containers?

    Recently I discovered that the default /proc mount inside CentOS containers running under Proxmox 3.1 were mounted insecurely: # mount|grep " /proc" proc on /proc type proc (rw,relatime) Under older versions of Proxmox, I was able to correct this by running: mount -o remount,nosuid,noexec...
  6. I

    Safely remove node from cluster without deleting containers?

    A quick follow up here... I was successfully able to get this done, but there was definitely more to it than what I originally thought. Here's roughly what I did: Run from Node: Remove the master's access from the node: mv /root/.ssh/authorized_keys /root/.ssh/authorized_keys_proxmox # save...
  7. I

    Proxmox 3.1 kernel crash that takes other servers offline too...

    Yes, our main switch is managed, and for some reason it doesn't happen there. But we have sub-groups of servers that we wanted on private switches and we didn't need managed switches for them. If we had time to replace the switches with managed switches, we'd do that, but we don't have time for...
  8. I

    Proxmox 3.1 kernel crash that takes other servers offline too...

    Thanks for the tip on how to upgrade the kernel. Since I'm not finding any evidence that another kernel upgrade will help, my first priority is to get these machines out of the cluster so it doesn't happen again. I've started a separate thread for that...
  9. I

    Safely remove node from cluster without deleting containers?

    Due instability issues we're having with a Proxmox 3.1 cluster, we need to remove several servers from the cluster without migrating the OpenVZ containers off of them. This thread is not about the instability of the cluster, if you want to read about that, go here...
  10. I

    Proxmox 3.1 kernel crash that takes other servers offline too...

    So, if I understand the link you provided, if we want to upgrade our kernel, we have to use the non-production "test" repo or their subscription based one. We don't have time for testing. We need a stable platform and I'm not interested in purchasing a subscription until after we've determined...
  11. I

    Proxmox 3.1 kernel crash that takes other servers offline too...

    apt-get update produces the following error: Err https://enterprise.proxmox.com wheezy/pve-enterprise amd64 Packages...
  12. I

    Proxmox 3.1 kernel crash that takes other servers offline too...

    I thought Proxmox 3.1 would have included the most recent stable kernel. Where do I get the latest kernel? Also, is there a kernel change log somewhere? Thanks again for your response.
  13. I

    Proxmox 3.1 kernel crash that takes other servers offline too...

    It's an unmanaged switch, and so there are no settings to view. The feature list does not mention igmp snooping, however: http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps10863/datasheet_C78-582017.html Thanks for your thoughts. I'm also interested to know if anyone has any ideas...
  14. I

    Proxmox 3.1 kernel crash that takes other servers offline too...

    Thanks for your response. The NICs are onboard... Supermicro X9SCL-F. The motherboard specs say they are Intel 82579LM and 82574L (2x Gigabit Ethernet LAN ports). The switch that the affected servers are connected to is a Cisco SG102-24. However, we are on our third switch... this same...
  15. I

    Proxmox 3.1 kernel crash that takes other servers offline too...

    We have a couple dozen Proxmox servers, and about once a month, one of them will have a kernel panic and lock up. The worst part about these lock ups is that when it's a node that is on a separate switch, all other Proxmox servers on that switch will stop responding until we can find the server...