Unix, Linux, DevOps , Cloud computing and BigData Knowledge-Base


Experience LINUX LVM (Logical Volume Manager) with real time examples

1.) What LVM is? 2.) Terminology 3.) Creation of Physical Vol, Volume Group, Logical Volume, Filesystem creation, Mount and making the FS entry in /etc/fstab 4.) Add new disk under existing Volume Group 5.) Filesystem extension in Linux 6.) Filesystem shrinking in Linux 7.) Removing disk...


ORACLE-SUN Hardware Reference

Current trend of System Administration is Remote System Administration, and as a remote system administrator most of us having very less exposure to the Server hardware and their architecture.  For a system administrator it is always beneficial to know about the hardware that he is supporting remotely, this...


VCS (Veritas Cluster Services ) Beginners Lesson – Cluster Communications

    In our previous post “Beginners Lesson – Veritas Cluster Services for System Admin” we have discussed the fundamentals of clustering and it’s purpose. In this post I would like to take you little deep inside of the clusters just to explore how the VCS...


Step By Step Procedure for Replacement of a Failed Disk in Solaris (SVM – In Solaris Volume Manager)

In this post we are basically covering the procedure to replace a failed disk under SVM in solaris.    Replacement of a Failed Disk in Solaris (SVM – In Solaris Volume Manager) TO REPLACE FAILED DISK IN THE SYSTEM: First of all take the backups of...


VxVM Beginners – Commands and Examples – Part 2

This is a continuation post for our previous post Beginner’s Lesson – VERITAS Volume Manager for Solaris Learning VxVM administration will be much easier by understanding below three things> 1. How Veritas Volume Manager treats Operating System Native Disks into Veritas Volumes 2. What are the...


Beginners Lesson – Veritas Cluster Services for System Admin

The purpose of this post is to make the Cluster concept easy for those young brothers who have just started their career as System Administrator. while writing this post I have only one thing in mind, i.e. explain the entire cluster concept with minimum usage of technical jargon...


Someone could be eavesdropping on you right now (man-in-the-middle attack)! – It is SSH thing

    How many of you noticed  below warning message during your attempt to connect remote hosts using SSH ” Someone could be eavesdropping on you right now (man-in-the-middle attack)! “ If you are the one wondering the meaning of this warning, you should go through this...


Get every new post delivered to your Inbox

Join other followers

Page 2973 of 2989