Unix, Linux, DevOps , Cloud computing and BigData Knowledge-Base

4

Storage Administration : Netapp Snapmirror

Snap Mirror Basics   1. Snapshot technology is the foundation for SnapMirror 2. SnapMirror is a fast and highly flexible solution for replicating data over LAN, WAN and FC networks. It can also be used for data migration, data distribution for load balancing and remote access. 3. No interruption...

8

Virtual Lab : Get Your hands dirty with grep & RegEx

Regular expressions are extremely useful in extracting information from text such as code, log files, spreadsheets, or even documents. As an unix administrator we do regularly use the regex to perform various problem diagnosis , automation or remediation tasks. And it is almost impossible to imagine...

8

RHEL 6 – ISCSI Administration Series – ISCSI Lun resize

This is second post from the ISCSI administration series ( you can refer the first post here RHEL 6 – ISCSI Administration Series – Configuring ISCSI Server and Client ) . In this post, I will be showing you an hands-on exercise to expand a ISCSI LUN which is already...

22

RHEL 6 – ISCSI Administration Series – Configuring ISCSI Server and Client

  ISCSI Server Configuration on RHEL 6 Overall Steps :  Install the RPM required for ISCSI Target Administration  Enable the ISCSI Target Services  Configure the ISCSI target to share the storage  Attach Luns to the ISCSI Target  Share the ISCSI Target to specific Client Machines  Add...

16

SAN Storage Migration – Solaris with VxVM

This is a following post for my previous SAN migration post  Solaris host level SAN migration (with SVM) from Clariion to VMAX.   As discussed earlier in my previous post,  many organisations started migrating their Server storage from Old legacy SAN devices ( e.g. EMC Clariion )...

0

RHEL 6 : LDAP BUG Tracking and Known issues for each version

This is just a reference document for LDAP administrators who are looking for specific bugs and known issues addressed in version of RHEL6 release so far. And this just gives you the brief overview of the bug/known issue, but for the solution and work around details you...

6

RHEL 6.3 – LDAP Series – Part 3 : LDAP Configuration With Encrypted Communication using TLS/SSL

    LDAP server authentication without encrypted communication is not recommendable for any organization.  In this Post,  I will be discussing the procedure to configure LDAP server and client to use encrypted authentication and communication. This is third  Post  in LDAP implementation Series. Previous posts for...

11

RHEL 6.3 – LDAP Series – Part 2 : Configuration of Certification Authority for LDAP encryption.

In this post, i will be explaining about necessary Certificate authority operations, to continue our actual task i.e. LDAP Configuration with encrypted communication. And this is Second post of LDAP Implemenation Series.  For quick recap you can refer the first post  ” RHEL 6.3 – LDAP Series...

Follow

Get every new post delivered to your Inbox

Join other followers

Page 2959 of 2989