UBC Physics & Astronomy
kratos.phas.ubc.ca
142.103.236.15 (PUBLIC) - 192.168.1.15 (server) - 10.20.14.15 (nas)

Machine Type: 7944-AC1, Serial No.:KQ55F8D Product name: IBM System x3550 M3 server
Warranty expires July 8 2014, 1-800-426-7378

UpdateXpress (http://www-933.ibm.com/support/fixcentral/systemx/downloadFixes)
/opt/ibm/uxspi440.rhel6

IMM Management (http://www-933.ibm.com/support/fixcentral/systemx/downloadFixes)
IMM Users Guide (pdf)

MegaRAID Applications -> System Tools -> MegaRAID Storage Manager StartUpGuiUsername: rootPwd:root passwd
/usr/local/MegaRAID Storage Manager/startupui.sh

Local system engineers: Dave Peterson 604-297-2410(o), 604-551-5116(c) or Duncan Furniss
F1 - Setup     Alt-F1 - Sysboot
To start IBM Director Server manually, run /opt/ibm/director/bin/twgstart

ServeRAID Adapter Quick Reference
DISKS Info
kratos.png
---------------------------------------------------------------------------------
|     146GB     |      146GB     |                                                    |
--------------------------------  -----------------------                             |
|     146GB     |      empty     |           DVD         |                            |
-------------------------------------------------------------------------------------- 

MegaRaid Storage Manager - /usr/local/MegaRAID\ Storage\ Manager/startupui.sh
MegaRAID_monitorconfig.xml file   
MegaRaid Guide    MegaCLI Guide   

/dev/sdb mounted from XRAID
[root@kratos log]# gdisk -l /dev/sdb
GPT fdisk (gdisk) version 0.8.6

Partition table scan:
  MBR: protective
  BSD: not present
  APM: not present
  GPT: present

Found valid GPT with protective MBR; using GPT.
Disk /dev/sdb: 4883808256 sectors, 2.3 TiB
Logical sector size: 512 bytes
Disk identifier (GUID): 9823DDE2-6DFF-4AA6-AF6B-85A8E4F6591A
Partition table holds up to 128 entries
First usable sector is 34, last usable sector is 4883808222
Partitions will be aligned on 8-sector boundaries
Total free space is 0 sectors (0 bytes)

Number  Start (sector)    End (sector)  Size       Code  Name
   1              34      4883808222   2.3 TiB     8E00  
/etc/fstab:
[root@kratos log]# cat /etc/fstab
# Accessible filesystems, by reference, are maintained under '/dev/disk'
# See man pages fstab(5), findfs(8), mount(8) and/or blkid(8) for more info
#
/dev/mapper/rhel_kratos-root /                   xfs     defaults        1 1
UUID=8530b48b-5b56-4200-bd6f-b8212e7b2b21 /boot  xfs     defaults        1 2
UUID=26DA-0C3A          /boot/efi                vfat    umask=0077,shortname=winnt 0 0
#/dev/mapper/rhel_kratos-home /home              xfs     defaults        1 2
/dev/mapper/rhel_kratos-swap swap                swap    defaults        0 0
/dev/mapper/VolGroup02-LogVol00 /khome2          ext4 defaults 1 2
/dev/mapper/VolGroup02-LogVol01 /khome           ext4 defaults 1 2
#/dev/mapper/VolGroup02-LogVol02 /newton         ext4 defaults 1 2
/dev/mapper/VolGroup02-LogVol03 /kahome          ext4 defaults 1 2
/libvirt /export/libvirt none bind
192.168.1.29:/home   /home  nfs4 rw,rsize=32768,wsize=32768,hard,intr,bg,tcp,acl
192.168.1.29:/home2  /home2 nfs4 rw,rsize=32768,wsize=32768,hard,intr,bg,tcp,acl
192.168.1.29:/ahome  /ahome nfs4 rw,rsize=32768,wsize=32768,hard,intr,bg,tcp,acl


System Info
empty DIMM slots:  1,4,7,10-18

F1 - Setup    F2 - Diagnostics    F12 - Select boot device
               |
               |--> Ctl-H  =>  WebBIOS  <--- allows RAID configuration
System x3550 M3
UEFI Build Ver: 1.19  IMM Build Ver:  1.42  Diagnostics Build Ver: 3.46
1 CPU Package Available at 5.86GT/s Link Speed

Machine Type/Model	7944AC1
System Serial Number	KQ55F8D
UUID Number		F400E69AB0973D108C3C901D4B90B2C9

Processor Summary
Precessor Speed		2.40 GHz
QPI Link Speed		5.86 GT/s

Memory
Operational Mode	Independent
Operational Speed	1067 MHz
Total Memory Size	24576 MB

12-03-05 nfs Info   

11-12-22 Reboot Problem    - won't shut down properly with reboot command
kratos reboot needs to be done via "/sbin/reboot.orig --force"
Solution (which did not work for me even though appears to be identical problem):
An option in multipath.conf that instructs it to fail I/O when multipathd isn't running -

# See https://bugzilla.redhat.com/show_bug.cgi?id=662433
# System hang on shutdown when iSCSI devices in use. Comment 32 suggests this.
        queue_without_daemon no

It would appear the problem is that just before shutdown the kernel sends a sync to all block devices. Even though file systems (except /) are unmounted , multipathd and the network are down at this point, the iSCSI block devices still exist. So the kernel sends off a sync to the (disconnected) iSCSI devices. The kernel side of the multipath driver then blocks waiting for a path to the iSCSI devices to complete the sync operation. It will wait forever.

'queue_without_daemon no' makes it fail the I/O to the devices instead of blocking for a path.

11-06-29 Currently E5620 @ 2.40 GHz 2x(4 Core), 24GB RAM, mirrored 146GB disks with hot spare.    3 free memory slots.   146 GB, 10K disks are FRU 43W7538.

Initial Setup for networking and iSCSI

Sales Order Number: xxx,  Date: 2011-06-xx
MAC Address 1: E4:1F:13:B9:DD:C8   eth0
MAC Address 2: E4:1F:13:B9:DD:CA   eth1
MAC Address 3: 5C:F3:FC:39:EC:3C   eth2
MAC Address 4: 5C:F3:FC:39:EC:3E   eth3


eth0      Link encap:Ethernet  HWaddr E4:1F:13:B9:DD:C8  
          inet addr:142.103.236.15  Bcast:142.103.255.255  Mask:255.255.255.0
eth1      Link encap:Ethernet  HWaddr E4:1F:13:B9:DD:CA  
          inet addr:10.20.14.15  Bcast:10.255.255.255  Mask:255.255.255.0
eth2      Link encap:Ethernet  HWaddr 5C:F3:FC:39:EC:3C  
eth3      Link encap:Ethernet  HWaddr 5C:F3:FC:39:EC:3E  


PartNo/
Feature  Qty   Description
-------  ---   ---------------------------------------------------------------
7944D4U   1    x3550 M3, Xeon 6C X5650 95W 2.4GHz/1333MHz/4MB, 1x4GB, 
               O/Bay 2.5in HS SAS/SATA, 675W p/s, Rack
59Y3952   1    x3550 M3 R2 ODD Kit
49Y1406   5    4GB (1x4GB PC3L-10600 CL9 ECC DDR3-1333MHz LP RDIMM
46M1076   1    Dual Port 1GB Eth Daughter Card
42D0677   3    IBM 146GB 15K 6Gbps SAS 2.5" SSF Slim-HS HDD
46M0902   1    IBM UltraSlim Enhanced SATA Multiburner
81Y6558   1    IBM 465W Redundant AC Power Supply
          1    3 year Onsite Repair next day
Disaster Recovery


12-01-10 kerberos/NFSv4 setup
Basically followed method at Kerberos/LDAP/NFSv4 HOWTO) with further info at How to configure nfsv4 with kerberos in RHEL and Part II)
/usr/bin/system-config-date
yum install krb5-server
cd /etc
cp krb5.conf krb5.conf.orig
vim krb5.conf
cd /var/kerberos/krb5kdc/
cp kdc.conf kdc.conf.orig
vim kdc.conf
cp kadm5.acl kadm5.acl.orig
vim kadm5.acl
vim /etc/gssapi_mech.conf 
yum install krb5-libs.x86_64 krb5-workstation.x86_64 pam_krb5.x86_64 cyrus-sasl-gssapi.x86_64 openldap-clients.x86_64
vim kadm5.acl
vim /etc/gssapi_mech.conf 
kdb5_util create -s
vim /etc/krb5.conf
vim /var/kerberos/krb5kdc/kdc.conf
vim /var/kerberos/krb5kdc/kadm5.acl
/usr/bin/authconfig-tui
kadmin.local -q "addprinc root/admin"
chkconfig kadmin on
service kadmin start
chkconfig krb5kdc on
service krb5kdc start
[root@kratos krb5kdc]# kinit
kinit: Client not found in Kerberos database while getting initial credentials
[root@kratos krb5kdc]# kinit root/admin
Password for root/admin@PHAS.UBC.CA: 
[root@kratos krb5kdc]# klist
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: root/admin@PHAS.UBC.CA

Valid starting     Expires            Service principal
01/12/12 09:55:48  01/13/12 09:55:48  krbtgt/PHAS.UBC.CA@PHAS.UBC.CA
	renew until 01/12/12 09:55:52
[root@kratos krb5kdc]# kadmin.local
Authenticating as principal root/admin@PHAS.UBC.CA with password.
kadmin.local:  addprinc -randkey nfs/kratos.phas.ubc.ca
WARNING: no policy specified for nfs/kratos.phas.ubc.ca@PHAS.UBC.CA; defaulting to no policy
Principal "nfs/kratos.phas.ubc.ca@PHAS.UBC.CA" created.
kadmin.local:  ktadd nfs/kratos.phas.ubc.ca
Entry for principal nfs/kratos.phas.ubc.ca with kvno 2, encryption type aes256-cts-hmac-sha1-96 added to keytab WRFILE:/etc/krb5.keytab.
Entry for principal nfs/kratos.phas.ubc.ca with kvno 2, encryption type aes128-cts-hmac-sha1-96 added to keytab WRFILE:/etc/krb5.keytab.
Entry for principal nfs/kratos.phas.ubc.ca with kvno 2, encryption type des3-cbc-sha1 added to keytab WRFILE:/etc/krb5.keytab.
Entry for principal nfs/kratos.phas.ubc.ca with kvno 2, encryption type arcfour-hmac added to keytab WRFILE:/etc/krb5.keytab.
Entry for principal nfs/kratos.phas.ubc.ca with kvno 2, encryption type des-hmac-sha1 added to keytab WRFILE:/etc/krb5.keytab.
Entry for principal nfs/kratos.phas.ubc.ca with kvno 2, encryption type des-cbc-md5 added to keytab WRFILE:/etc/krb5.keytab.
kadmin.local:  q
Check principal exists:
[root@kratos etc]# klist -k
Keytab name: WRFILE:/etc/krb5.keytab
KVNO Principal
---- --------------------------------------------------------------------------
   2 nfs/kratos.phas.ubc.ca@PHAS.UBC.CA
   2 nfs/kratos.phas.ubc.ca@PHAS.UBC.CA
   2 nfs/kratos.phas.ubc.ca@PHAS.UBC.CA
   2 nfs/kratos.phas.ubc.ca@PHAS.UBC.CA
   2 nfs/kratos.phas.ubc.ca@PHAS.UBC.CA
   2 nfs/kratos.phas.ubc.ca@PHAS.UBC.CA
Create service keys for kadmin/admin and kadmin/changepw. Not sure if this step was really needed.
[root@kratos]# kadmin.local -q "ktadd -k /var/kerberos/krb5kdc/kadm5.keytab kadmin/admin kadmin/changepw"
Authenticating as principal root/admin@PHAS.UBC.CA with password.
Entry for principal kadmin/admin with kvno 3, encryption type aes256-cts-hmac-sha1-96 added to keytab WRFILE:/var/kerberos/krb5kdc/kadm5.keytab.
Entry for principal kadmin/admin with kvno 3, encryption type aes128-cts-hmac-sha1-96 added to keytab WRFILE:/var/kerberos/krb5kdc/kadm5.keytab.
Entry for principal kadmin/admin with kvno 3, encryption type des3-cbc-sha1 added to keytab WRFILE:/var/kerberos/krb5kdc/kadm5.keytab.
Entry for principal kadmin/admin with kvno 3, encryption type arcfour-hmac added to keytab WRFILE:/var/kerberos/krb5kdc/kadm5.keytab.
Entry for principal kadmin/admin with kvno 3, encryption type des-hmac-sha1 added to keytab WRFILE:/var/kerberos/krb5kdc/kadm5.keytab.
Entry for principal kadmin/admin with kvno 3, encryption type des-cbc-md5 added to keytab WRFILE:/var/kerberos/krb5kdc/kadm5.keytab.
Entry for principal kadmin/changepw with kvno 3, encryption type aes256-cts-hmac-sha1-96 added to keytab WRFILE:/var/kerberos/krb5kdc/kadm5.keytab.
Entry for principal kadmin/changepw with kvno 3, encryption type aes128-cts-hmac-sha1-96 added to keytab WRFILE:/var/kerberos/krb5kdc/kadm5.keytab.
Entry for principal kadmin/changepw with kvno 3, encryption type des3-cbc-sha1 added to keytab WRFILE:/var/kerberos/krb5kdc/kadm5.keytab.
Entry for principal kadmin/changepw with kvno 3, encryption type arcfour-hmac added to keytab WRFILE:/var/kerberos/krb5kdc/kadm5.keytab.
Entry for principal kadmin/changepw with kvno 3, encryption type des-hmac-sha1 added to keytab WRFILE:/var/kerberos/krb5kdc/kadm5.keytab.
Entry for principal kadmin/changepw with kvno 3, encryption type des-cbc-md5 added to keytab WRFILE:/var/kerberos/krb5kdc/kadm5.keytab.
Make sure rpcgssd and rpcsvcgssd are configured to start on reboot and then start them.
[root@kratos init.d]# chkconfig --list | grep gss
rpcgssd        	0:off	1:off	2:off	3:on	4:on	5:on	6:off
rpcsvcgssd     	0:off	1:off	2:on	3:on	4:on	5:on	6:off
[root@kratos init.d]# service rpcgssd start
Starting RPC gssd:                                         [  OK  ]
[root@kratos init.d]# service rpcsvcgssd start
Starting RPC svcgssd:                                      [  OK  ]

kerberos/NFSv4 setup - Client Configuration
phasadmin@javelin:~$ sudo apt-get install krb5-user
phasadmin@javelin:~$ sudo vim /etc/krb5.conf
[libdefaults]
	default_realm = PHAS.UBC.CA

# The following krb5.conf variables are only for MIT Kerberos.
	krb4_config = /etc/krb.conf
	krb4_realms = /etc/krb.realms
	kdc_timesync = 1
	ccache_type = 4
	forwardable = true
	proxiable = true

[realms]
	PHAS.UBC.CA = {
		kdc = kratos.phas.ubc.ca
		kdc = ldap.phas.ubc.ca
		admin_server = kratos.phas.ubc.ca
		default_domain = phas.ubc.ca
	}

[domain_realm]
	.phas.ubc.ca = PHAS.UBC.CA
	phas.ubc.ca = PHAS.UBC.CA
	.physics.ubc.ca = PHAS.UBC.CA
	physics.ubc.ca = PHAS.UBC.CA
	.astro.ubc.ca = PHAS.UBC.CA
	astro.ubc.ca = PHAS.UBC.CA 
Encountered and error when doing client config on ubuntu:
root@javelin:/etc# kadmin
Authenticating as principal root/admin@PHAS.UBC.CA with password.
Password for root/admin@PHAS.UBC.CA: 
kadmin: GSS-API (or Kerberos) error while initializing kadmin interface 
Solved this by getting clocks in sync.
Run kadmin on client:
khroot@javelin:/etc# kadmin
Authenticating as principal root/admin@PHAS.UBC.CA with password.
Password for root/admin@PHAS.UBC.CA: 
kadmin:  addprinc -randkey nfs/javelin.phas.ubc.ca
WARNING: no policy specified for nfs/javelin.phas.ubc.ca@PHAS.UBC.CA; defaulting to no policy
add_principal: Principal or policy already exists while creating "nfs/javelin.phas.ubc.ca@PHAS.UBC.CA".
kadmin:  ktadd -k /etc/krb5.keytab nfs/javelin.phas.ubc.ca
Entry for principal nfs/javelin.phas.ubc.ca with kvno 2, encryption type AES-256 CTS mode with 96-bit SHA-1 HMAC added to keytab WRFILE:/etc/krb5.keytab.
Entry for principal nfs/javelin.phas.ubc.ca with kvno 2, encryption type AES-128 CTS mode with 96-bit SHA-1 HMAC added to keytab WRFILE:/etc/krb5.keytab.
Entry for principal nfs/javelin.phas.ubc.ca with kvno 2, encryption type Triple DES cbc mode with HMAC/sha1 added to keytab WRFILE:/etc/krb5.keytab.
Entry for principal nfs/javelin.phas.ubc.ca with kvno 2, encryption type ArcFour with HMAC/md5 added to keytab WRFILE:/etc/krb5.keytab.
Entry for principal nfs/javelin.phas.ubc.ca with kvno 2, encryption type DES with HMAC/sha1 added to keytab WRFILE:/etc/krb5.keytab.
Entry for principal nfs/javelin.phas.ubc.ca with kvno 2, encryption type DES cbc mode with RSA-MD5 added to keytab WRFILE:/etc/krb5.keytab.
kadmin:  q
root@javelin:/etc# klist -k
Keytab name: WRFILE:/etc/krb5.keytab
KVNO Principal
---- --------------------------------------------------------------------------
   2 nfs/javelin.phas.ubc.ca@PHAS.UBC.CA
   2 nfs/javelin.phas.ubc.ca@PHAS.UBC.CA
   2 nfs/javelin.phas.ubc.ca@PHAS.UBC.CA
   2 nfs/javelin.phas.ubc.ca@PHAS.UBC.CA
   2 nfs/javelin.phas.ubc.ca@PHAS.UBC.CA
   2 nfs/javelin.phas.ubc.ca@PHAS.UBC.CA 
Edit /etc/default/nfs-common and make sure IDMAPD and GSSD lines are as follows:
NEED_IDMAPD=yes
NEED_GSSD=yes
Added this on KDC (kratos):
[root@kratos init.d]# kadmin
Authenticating as principal root/admin@PHAS.UBC.CA with password.
Password for root/admin@PHAS.UBC.CA: 
kadmin:  addprinc -randkey nfs/javelin.phas.ubc.ca
WARNING: no policy specified for nfs/javelin.phas.ubc.ca@PHAS.UBC.CA; defaulting to no policy
add_principal: Principal or policy already exists while creating "nfs/javelin.phas.ubc.ca@PHAS.UBC.CA". 

root@javelin:~# apt-get install libpam-krb5

11-09-22 Will not shutdown

Contacted IBM re shutdown problem. When I do a reboot or a shutdown, it never shuts down. I need to toggle the power swtch. Assigned ref# 41JK4PS.

11-09-22 Disk Failure

Contacted IBM re disk problem. They had me run DSA (/opt/ibm/dsa/ibm_utl_dsa_dsyt85t-3.40_portable_rhel6_x86-64.bin) https://www-947.ibm.com/support/entry/myportal/docdisplay?lndocid=SERV-DSA
He (ptherrie@ca.ibm.com, Phillipe Therrien)emailed back that a disk had failed (I knew this from the noise and yellow light on the drive). They will courier out a new drive today. New drive is S/N

System Info

Please note that portmap service is not required for NFSv4. NFS Server Configuration GUI Tool
# system-config-nfs
Open TCP port # 2049 which is used by NFSv4. Add the following lines, ensuring that they appear before the final LOG and DROP lines for the RH-Firewall-1-INPUT chain:
-A RH-Firewall-1-INPUT -s 192.168.1.0/24 -m state --state NEW -p tcp --dport 2049 -j ACCEPT

A Note About User Management

Use OpenLDAP for user management for large number of users. If you have a small number of NFS clients add them to your systems using the useradd command. Make sure UID and GID matches correctly. For example, if user vivek (UID=500) is part of group vivek (gid=500) and sales group (Gid=502) on the NFSv4 server, then use the following command to add user to NFSv4 client:
# grep -q '^sales' /etc/group || /usr/sbin/groupadd -g 502 sales
# /usr/sbin/useradd -s /bin/bash -d /sales -M -u 500 -g 500 -G 502 sales
# su - sales
$ pwd
$ ls && cd mumbai && >testfile && ls -l testfile && rm testfile
The above command matches client and server UIDs and GIDs. Otherwise you will get permission denied message on NFSv4 clients.

11-09-02
Installing : nscd-2.12-1.25.el6_1.3.x86_64
  Installing : pam_ldap-185-8.el6.x86_64
  Installing : nss-pam-ldapd-0.7.5-7.el6.x86_64

check //usr/share/netcf/iptables-forward-bridged

11-06-28 Run IBM UpdateXpress.
[root@kratos]# /opt/IBM/UpdateXpress/uxspi440.rhel6

Hard Disk Drive		ibm_fw_hdd_sas-1.08.01_linux_32-64			32,927
IMM			ibm_fw_imm_yuoo91k-1.25_linux_32-64			36,050
Converged Netwk Adapter	qlgc_fw_nic_qle8142-1.01.94_linux_32-64			4,323
UXSP			ibm_utl_uxsp_d6sp07a-1.60_rhel6_32-64			1,328
SAS			ibm_fw_mpt2sas_1.07_linux_32-64				1,466
SAS			ibm_fw_sraidbr_10i-2.72_linux_32-64			1,264
SAS			ibm_fw_mptsas_3g-sashba-2.72_linux_32-64		1,109
SAS			ibm_fw_sraidbr_10il-v2-2.72_linux_32-64			1,058
SATA			ibm_fw_pmcraid_1.03_linux_32-64				2,002
ServeRAID		ibm_fw_sraidmr_10i-10is-11.0.1-0033a_linux_32-64	4,643
SAS			ibm_fw_sraidmr_10m-11.0.1-0033a_linux_32-64		4,636
SAS			ibm_fw_sraidmr_m5000-12.12.0-0039_linux_32-64		3,208
Diagnostics		ibm_fw_dsa_dsyt83d-3.33_linux_32-64			96,853
UEFI			ibm_fw_uefi_d6e150c-1.11_linux_32-64			3,653
SAS			ibm_fw_sraidmr_1015-20.10.1-0022_linux_32-64		2,951
Network			brcm_fw_nic_2.1.6a_linux_32-64				8,821
IMM			ibm_fw_imm_yuoo57h_linux_32-64				29,997

11-06-28
useradd rap
vim /etc/inittab  (change initial runlevel to 5)
cd /usr/local/src
wget --no-check-certificate --user=rap --ask-password https://www.phas.ubc.ca/sysadmin/Computers/00_Servers/rhel/satellite_setup.pl
chmod +x satellite_setup.pl 
./satellite_setup.pl 
yum groupinstall "General Purpose Desktop"
yum groupinstall Desktop
cd /opt/IBM/UpdateXpress
./uxspi440.rhel6 
FIX THIS !!! Installed RAID monitoring Software ( ServeRAID MR Support CD)
cd /usr/local/src
mount -o loop ibm_sw_sraidmr_10.35_anyos_32-64.iso /mnt/iso
yum install libXp
yum install net-snmp
cd /mnt/iso/MSM/Linux/
./install.sh 
[root@omega Linux]# rpm -qa | grep -i mega
MegaRAID_Storage_Manager-2.91-03

YYY home
-

ZZZ home
-

NOTES:




UPDATE NEEDED DISASTER RECOVERY
  1. Install a new server.
  2. Load RHEL V6. 
Additional, non-critical items to take care of:
  1. Install APCUPSD
UPDATE NEEDED DISASTER RECOVERY
  1. Install a new server.
  2. Load RHEL V5  (or newer).
  3. Make sure you select to install the web server and associated modules.
  4. Make sure you select to install the mysql server and associated modules.
  5. Copy over backup files from alpha:/home/backups/www (these files are rsync'd daily).
  6. Make sure mysqld and httpd are started.
  7. Make sure to set a root password for mysqld (admin -u root password newpassword).
  8. Install phpMyAdmin. Create phpMyAdmin dbases: mysql -u root -p < create_tables_mysql_4_1_2+.sql
  9. Install php-mbstring package from redhat network package archive so phpMyAdmin doesn't complain.
  10. Get include files installed into /php/includes.
  11. Check /etc/php.ini configuration file.
  12. Check /etc/http/conf configuration files including certificate files.
    /etc/http/conf/ssl.crt/www.phas.ubc.ca.crt
                   /etc/http/conf/ssl.crt/gd_bundle.crt
                   /etc/http/conf/ssl.key/www.phas.ubc.ca.key
              
  13. Install MySQL-zrm.
Additional, non-critical items to take care of:
  1. Install APCUPSD
  2. Check webalizer installation (web stats).


BIOS Settings - 14-07-11


sysadmin@phas.ubc.ca [Dept. Home Page] last updated: 11-06-28