Linux - GeneralThis Linux forum is for general Linux questions and discussion.
If it is Linux Related and doesn't seem to fit in any other forum then this is the place.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I'm running several terminals with a bare-bones Ubuntu 12.04 LTS on them (command line install + X). They are subject to public abuse, and as such cannot rely on being powered down in a proper manner.
What I would like help with is which settings to use with mount and /etc/fstab to give the best reliability under these circumstances? The overriding importance is that the system successfully boot, as generally speaking I can cope with corrupt files once my own programs are running.
Currently I'm using ext4 with the default settings. From man mount I know that means journalling and barrier are enabled, but is there anything else I can do to ensure reliability?
you need to move your important files/programs to another (readonly?) partition therefore they cannot be damaged. The public drive can be cleaned any time (and reformatted, if required)
So, boot from the one partition but make sure all the writes are performed on another? Fair enough.
Is it possible to mount the /root partition (where /bin, etc are) as read only without problems? What would happen to all the log files Linux generates? Or can that be solved by symlinking /var and /tmp to directories on the writeable partition?
I rearranged the partitions so I have an OS partition and a writeable partition, and also mounted /tmp as tmpfs. I've symlinked /var to a directory on the writeable partition.
There's still quite a bit of writing going on on the OS partition though. For one, the MAC address of the machine gets cached in /etc/udev/rules.d/70-persistent-net-rules.
Which other directories should I symlink to the writeable partition?
I don't know of any software that can preserve the files/settings on a system and revert them on reboot (like you see on Windows), but one thing that comes to mind is...
Have you considered making the systems headless and network bootable? Make them bootable only on a network connection, using a gigabit internal link so the machines will boot off of another server. That way the settings are restored on reboot and nothing is overwritten should someone mess with the system.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.