Bookmarks for 8 set 2014 through 9 set 2014

These are my links for 8 set 2014 through 9 set 2014:

  • How to write udev rules – Since the adoption of Kernel 2.6, Linux has used the udev system to handle devices such as USB connected peripherals. If you want to change the behavior when you plug something into a USB port, this section is for you. As an example, we will use a USB thumb drive but these methods should translate to any device handled by udev. As a goal for this exercise we decided to create a symlink and execute a script when a specific thumb drive was loaded.
  • Persistent iSCSI LUN Device Name – jablonskis – […] I spent a bit of time figuring out how to get this achieved, so thought it is worth noting for the future reference. I will try to make this quick assuming you have knowledge about iSCSI software initiators in Linux[…]
  • al3x/sovereign – A set of Ansible playbooks to build and maintain your own private cloud: email, calendar, contacts, file sync, IRC bouncer, VPN, and more.
  • NSA-proof your e-mail in 2 hours | Sealed Abstract – You may be concerned that the NSA is reading your e-mail. Is there really anything you can do about it though? After all, you don’t really want to move off of GMail / Google Apps. And no place you would host is any better. Except, you know, hosting it yourself. The way that e-mail was originally designed to work. We’ve all just forgotten because, you know, webapps-n-stuff. It’s a lot of work, mkay, and I’m a lazy software developer.

Bookmarks for 26 ago 2014 through 27 ago 2014

These are my links for 26 ago 2014 through 27 ago 2014:

  • Regular Expressions – Regular expressions ("regexes") are supercharged Find/Replace string operations. Regular expressions are used when editing text in a text editor, to: check whether the text contains a certain pattern find those pattern matches, if there are any pull information (i.e. substrings) out of the text make modifications to the text. As well as text editors, almost every high-level programming language includes support for regular expressions. In this context "the text" is just a string variable, but the operations available are the same. Some programming languages (Perl, JavaScript) even provide dedicated syntax for regular expression operations.
  • MySQL active-passive cluster | Your IT goes Linux – We will use the iSCSI Lun defined in our iSCSI cluster as a shared storage and we will run MySQL in active-passive (fail-over) mode using Pacemaker and Corosync cluster engine. The cluster will have to connect to the iSCSI target, mount the iSCSI partition on one node and start a MySQL service which has all its data on this partition.
  • Perl – […] Perl has horrors, but it also has some great redeeming features. In this respect it is like every other programming language ever created. This document is intended to be informative, not evangelical. It is aimed at people who, like me: dislike the official Perl documentation at for being intensely technical and giving far too much space to very unusual edge cases learn new programming languages most quickly by "axiom and example" wish Larry Wall would get to the point already know how to program in general terms don't care about Perl beyond what's necessary to get the job done. This document is intended to be as short as possible, but no shorter[…]
  • Linux Performance – This page links to various Linux performance material I've created, including the tools maps on the right, which show: Linux observability tools, Linux benchmarking tools, Linux tuning tools, and Linux observability sar. For more diagrams, see my slide decks below.
  • AIXchange: Useful Storage Links – Here's an assortment of really good storage-related articles — the majority of which are found on IBM developerWorks — that are worth your time. While some of them are a few years old, they still provide relevant information.