2012-01-19

Recovering a Linux SW RAID1 volume

I had one disk of a RAID1 set, and wanted to recover the data from some LVMs on it.

Turned out to be quite straightforward:

1. Plugged the drive into another openSUSE 12.1 box with a USB-HDD adapter.

2. As root, did mdadm --assemble --scan

3. 'cat /proc/mdstat' showed me the md devices that were found:Personalities : [linear] [raid1]
md124 : active raid1 sdg1[0]
      506032 blocks super 1.0 [2/1] [U_]
      bitmap: 0/8 pages [0KB], 32KB chunk

md125 : active raid1 sdg2[0]
      155726004 blocks super 1.0 [2/1] [U_]
      bitmap: 19/149 pages [76KB], 512KB chunk

md126 : inactive sdf1[0](S)
      506032 blocks super 1.0
     
md127 : inactive sdf2[0](S)
      155734036 blocks super 1.0
     
unused devices: <none>

4. lvscan showed me the LVs on the volume.
  inactive          '/dev/system1/home' [70.00 GiB] inherit
  inactive          '/dev/system1/lclhome' [30.00 GiB] inherit
  inactive          '/dev/system1/root' [20.00 GiB] inherit
  inactive          '/dev/system1/swap' [4.00 GiB] inherit
  inactive          '/dev/system1/usr' [6.00 GiB] inherit
  ACTIVE            '/dev/system/home' [25.00 GiB] inherit
  ACTIVE            '/dev/system/root' [20.00 GiB] inherit
  ACTIVE            '/dev/system/swap' [2.00 GiB] inherit

5. Activated the LVs using 'vgchange -a y'

6. Ready to mount!

2012-01-13

KDE4 and ssh-agent

Using KDE Wallet to store your SSH passphrase is now quite easy.

You need ksshaskpass installed.


Add a script to ~/.kde4/Autostart/ called (e.g.) ssh-add.sh, with execute permission, containing:

#!/bin/sh
export SSH_ASKPASS=/usr/lib64/ssh/ksshaskpass
/usr/bin/ssh-add

Next time you login, you'll be prompted for your KDE Wallet password, then your password.

Works well. Thanks to this helpful post for getting me started.