Unix, Linux, DevOps , Cloud computing and BigData Knowledge-Base
VCS requires you to set up a private network between the systems that form a cluster. You can use either NICs or aggregated interfaces to set up private network. You can use network switches instead of hubs. However, Sun systems assign the same MAC address to...
Our Unixadmin, John from xyz company, recently upgraded one of his server’s network interface card from the old one with 100MB speed to a new one with 10Gig speed , and the reason is to improve the speed for the backup of the server. After the NIC Upgrade john found that the server network...
Udev is the mechanism used to create and name the /dev device nodes corresponding to the devices that are added to the system during the booting. When a device is added or removed from the system, the kernel creates a device name in the /sys psuedo...
Below procedure explains you about ‘ booting from an alternate boot disk’
Since long time I was thinking to have practical hands-on to how to recover Diskgroup in VXVM (which got faulty and we are unable to import that). But unfortunately I wont have real time outputs with me to show how that can be achieved. But here...
Finally, you can either pipe or redirect the output of a loop within your shell script. You do this by adding the processing command to the end of the done command:
It is considered a ‘Best Practice’ to configure a ‘loghost’s for each server and production domain. A ‘Loghost’ on a Solaris platform can permanently save messages that are logged in the System Controller’s NVRAM buffer. This will insure that they are not lost due to either a...
A Plex will be shown in RECOVER state if its contents are out-of-date with respect to the volume. This can happen if a disk containing one or more plex’s subdisks has been replaced or reattached. If a Plex is shown as being in this state, it...
You know that at some point or another you will need to be able to administer servers remotely, and you wouldn’t want to do this without some sort of security in place, right? SSH can protect the traffic that passes from your computer to a remote...