I just checked. Giving the permission for kill CAP_KILL in
/lib/systemd/system/openvpn-client@.service
resolves the problem.
But besides kill there are other ways to see if a process exists e.g.
ps -o pid= -p
However, by replaing the relevant line in /sbin/resolvconf still resulted
in the er
or make it adjustable?
Dominik
Am Mi., 20. Jan. 2021 um 08:05 Uhr schrieb Dominik Reusser <
dr896...@gmail.com>:
>
>
> Dear Sebastian,
>
> most likely, the daemon is swapped out. We are talking about a memory
> restricted system with the obligation to run daily scans on the
Package: libvirt-daemon-system
Version: 5.0.0-4
Followup-For: Bug #890084
Dear Maintainer,
this happened yesterday again. It is most likely related to a restart
of the host system.
After removing the apparmor.d profiles with zero length, the vm started as
expected.
The bug report asks about th
t 11:29:49AM +0200, Dominik Reusser wrote:
> >
> >
> > value='secret,id=sec0,file=/etc/libvirt/secrets/Feigenbaum.secret'/>
> >
> > value='driver=qcow2,file.filename=/var/lib/libvirt/images/Feigenbaum.qcow2,encrypt.key-secre
Tue, Jul 30, 2019 at 10:43:25AM +0200, Dominik Reusser wrote:
> > Thanks for your reply
> >
> > On 30.07.19 09:00, Guido Günther wrote:> Hi,
> > > On Tue, Jul 30, 2019 at 07:36:18AM +0200, Dominik wrote:
> > >> Package: libvirt-daemon
> >
Thanks for your reply
On 30.07.19 09:00, Guido Günther wrote:> Hi,
> On Tue, Jul 30, 2019 at 07:36:18AM +0200, Dominik wrote:
>> Package: libvirt-daemon
>> Version: 5.0.0-4
>> Severity: normal
>>
>> Dear Maintainer,
>>
>> after upgrading to buster, the encrypted kvm-guests stop to work. An
error i
The problem can be solved by setting the hard_limit in the guest xml
file as well.
Ideally, the hard_limit would be set automatically and a warning about
the missing entry in the configuration generated.
At least the error message should be more specific.
Package: libvirt-clients
Version: 3.0.0-4+deb9u3
Severity: normal
Dear Maintainer,
I'm trying to limit swap usage of guest systems. Libvirt offers the
memory tuning option 'swap_hard_limit' [1]. To enable setting of the swap
hard limit, we need to enable swap control in the kernel by adding
swapa
allation process.
Kind regards
Dominik Reusser
-- System Information:
Debian Release: 8.7
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)
Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.utf8, LC_CTY
Package: r-cran-rmysql
Version: 0.6.0-1
Severity: important
> library(RMySQL)
Error: package 'DBI' 0.2-1 was found, but >= 0.2.2 is required by 'RMySQL'
-- System Information:
Debian Release: lenny/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'stable')
Architecture: i386 (i686
.4.12-1 Tk toolkit for Tcl and X11,
v8.4 -
ii unixodbc2.2.11-13ODBC tools libraries
ii xterm [x-terminal-emulator] 210-3X terminal emulator
ii zlib1g 1:1.2.3-13 compression library - runtime
grass recommends no packages.
-- no debconf in
11 matches
Mail list logo