Unix, Linux, DevOps , Cloud computing and BigData Knowledge-Base
This is a continuation post to our ISCSI administration series in RHEL6 ( here are the links to my previous posts RHEL 6 – ISCSI Administration Series – Configuring ISCSI Server and Client & RHEL 6 – ISCSI Administration Series – ISCSI Lun resize ). This...
It’s been long time that I have posted something about my funny experiments at home. Today I just spent some time to write this post for those who want to know about creating a new SMF service . This post also covers the procedure to create...
This post will help you resolve the Linux file system issue that causing below errors.
A service group is an instance of a computer service that is made highly available with VCS. A group comprises one or more resources of various resource types, such as disks, volumes, or databases. Use the hagrp command to view information about and manage each group
How to Shut Down a System by Using the shutdown Command Become the root role. For a multiuser timesharing server shutdown, find out if any users are logged in to the system. # who Shut down the system. # shutdown -iinit-state -ggrace-period -y -iinit-state Brings the system...
There are two primary modes of operation of the microprocessor architecture: Long mode (lm) and Legacy mode. Long mode is used by 64-bit operating systems. It combines the processor’s native 64-bit mode and a 32-bit/16-bit compatibility mode. Under this mode, 64-bit, 32-bit and 16-bit applications may...
Here we discuss about some guidelines on how to proceed if you find a Sun X64 server has unexpectedly powered off. The examples offered may be specific to a particular command or firmware version, are provided to illustrate a troubleshooting concept, and may not apply to...
Another feature crucial to any programming language is the ability to manipulate numbers. Unfortunately, for shell scripts this process is a bit awkward. There are two different ways to perform mathematical operations in your shell scripts.
Network Configuration and Firewalls This section provides guidance for secure network and firewall configuration.
I believe, this is one of the long pending post from me. Anyway, before proceeding with the actual cook book first let’s briefly recollect the concept of virtualization. Virtualization is noting but creating an abstraction layer in between the Operating System and Hardware , so that the physical hardware...