Unix, Linux, DevOps , Cloud computing and BigData Knowledge-Base
Zones and zone sets are the basic form of data path security within a Fibre Channel environment. A zone set is a collection of zones which in turn have individual members in them. Only those members within the same zone can communicate with...
Similar to 7-mode we have three administrative privilage levels: admin, advanced and diagnostic. Clustered ONTAP system can be managed either from CLI or GUI (system manager or element manager). There are three different shells available with different scopes: Clustershell, nodeshell, systemshell Step:1 Access through CLI Clustershell:=========-SSH...
Introduction to Clustered Data OnTAP: Data ONTAP 8 merges the capabilities of Data ONTAP 7G and Data ONTAP GX into a single code base with two distinct operating modes: 7-Mode, which delivers capabilities equivalent to the Data ONTAP 7.3.x releases,...
NFSv4: 1. Data ONTAP 8.1 cluster-mode introduces support for NFSv4 protocol specification as well as elements of NFSv 4.1 2. cluster mode continues to fully support NFSv2 and NFSv3 although you should not use NFSv2 with cluster mode3. NFSv4 support brings the Data ONTAP 8.1 cluster...
While troubleshooting some of the Live upgrade issues in my test environment, I have come across some important list of known issues which causes the Live Upgrade to fail. Even in the past, I have noticed that many Solaris folks complained about the...
Scenario: a. Create a cluster virtual server (Vserver)b. Create a flex vol Step:1 View the available Vservers in the cluster vserver show “node” Vservers are the scope where vol0 volumes exist and the node management LIFs and cluster LIFs of each node. The “admin” Vserveris the...
I was performing Storage migrations for Linux RHEL 5.x and 6.x having VXVM. Storage have provided the Lun’s and confirmed all is okay from their end. But I was unable to get them visible on Veritas level though the same were visible at OS level....
Regular expressions are extremely useful in extracting information from text such as code, log files, spreadsheets, or even documents. As an unix administrator we do regularly use the regex to perform various problem diagnosis , automation or remediation tasks. And it is almost impossible to imagine...
This is second post from the ISCSI administration series ( you can refer the first post here RHEL 6 – ISCSI Administration Series – Configuring ISCSI Server and Client ) . In this post, I will be showing you an hands-on exercise to expand a ISCSI LUN which is already...
This is just a reference document for LDAP administrators who are looking for specific bugs and known issues addressed in version of RHEL6 release so far. And this just gives you the brief overview of the bug/known issue, but for the solution and work around details you...