Unix, Linux, DevOps , Cloud computing and BigData Knowledge-Base
Overview If you are managing more than a dozen Linux systems, configuration management is a must. Without configuration management, updating system configuration files and deploying applications can become very challenging. This crash course is about using Puppet configuration management software to deploy and support Linux systems in...
Collisions may occour on ethernet links which are operating at Half Duplex (HDX). They do not occour on links using Full Duplex (FDX). The normal formula to calculate the packet collision rate is: ( collisions / output packets ) * 100 = collision rate For example: #...
This article will help you to gather necessary information required to understand and troubleshoot Solaris Network related issues. And Resolving the issues found during the Data analysis is not covered in this article.
1. SCSI Device Addressing A four-part addressing scheme is used to define the location of SCSI devices within a system. The attributes include: ost: Instance of hostadapter to which device is attached us: SCSI Bus or Channel on the hostadapter arget: SCSI Id assigned to an...
Introduction to Clustered Data OnTAP: Data ONTAP 8 merges the capabilities of Data ONTAP 7G and Data ONTAP GX into a single code base with two distinct operating modes: 7-Mode, which delivers capabilities equivalent to the Data ONTAP 7.3.x releases,...
To initialize a disk for regular use, enter: # /etc/vx/bin/vxdisksetup -i c2t1d0 or if enclosure-based naming is in use: # /etc/vx/bin/vxdisksetup -i sena1_4
The most basic method of passing data to your shell script is to use command line parameters. Command line parameters allow you to add data values to the command line when you execute the script: $ ./addem 10 30 This example passes two command line parameters...
Use the following command to display the current state of the Veritas Cluster Server(VCS) configuration database: # haclus -display | grep ReadOnly ReadOnly 1 A result code of 1 indicates the configuration database is in a closed(ReadOnly) state. A result code of 0 indicates the configuration...
Often, you must iterate through items stored inside a file. This requires combining two of the techniques covered: Using nested loops Changing the IFS environment variable By changing the IFS environment variable, you can force the for command to handle each line in the file as...
Summary of typical IPMP Configurations: 1. Production and test interfaces in the same IP subnet 1.1 With defaultrouter 1.2 Without defaultrouter 1.3 With dedicated hosts acting as test targets with “host-routes” 1.4 Configuration example for 1.1, 1.2 and 1.3 2. Production and test interfaces in different...