Unix, Linux, DevOps , Cloud computing and BigData Knowledge-Base

3

Basics and Data flow in NetApp Clustered Data OnTAP

 Similar to 7-mode we have three administrative privilage levels: admin, advanced and diagnostic. Clustered ONTAP system can be managed either from CLI or GUI (system manager or element manager). There are three different shells available with different scopes: Clustershell, nodeshell, systemshell Step:1 Access through CLI Clustershell:=========-SSH...

7

Solaris Live Upgrade – Known Issues that frequently fails the Live Upgrade

      While troubleshooting some of the Live upgrade issues in my test environment, I have come across some important list of known issues which causes the Live Upgrade to fail. Even in the past, I have noticed that many Solaris folks complained about the...

6

Unable to get EMC storage Lun's visible under veritas control in Linux.

  I was performing Storage migrations for Linux RHEL 5.x and 6.x having VXVM. Storage have provided the Lun’s and confirmed all is okay from their end. But I was unable to get them visible on Veritas level though the same were visible at OS level....

8

Virtual Lab : Get Your hands dirty with grep & RegEx

Regular expressions are extremely useful in extracting information from text such as code, log files, spreadsheets, or even documents. As an unix administrator we do regularly use the regex to perform various problem diagnosis , automation or remediation tasks. And it is almost impossible to imagine...

8

RHEL 6 – ISCSI Administration Series – ISCSI Lun resize

This is second post from the ISCSI administration series ( you can refer the first post here RHEL 6 – ISCSI Administration Series – Configuring ISCSI Server and Client ) . In this post, I will be showing you an hands-on exercise to expand a ISCSI LUN which is already...

6

RHEL 6.3 – LDAP Series – Part 3 : LDAP Configuration With Encrypted Communication using TLS/SSL

    LDAP server authentication without encrypted communication is not recommendable for any organization.  In this Post,  I will be discussing the procedure to configure LDAP server and client to use encrypted authentication and communication. This is third  Post  in LDAP implementation Series. Previous posts for...

11

RHEL 6.3 – LDAP Series – Part 2 : Configuration of Certification Authority for LDAP encryption.

In this post, i will be explaining about necessary Certificate authority operations, to continue our actual task i.e. LDAP Configuration with encrypted communication. And this is Second post of LDAP Implemenation Series.  For quick recap you can refer the first post  ” RHEL 6.3 – LDAP Series...

Page 70 of 85

[contact-form to='ramkumar.ramadevu@gmail.com' subject='New Learning Request Submitted'][contact-field label='Name' type='name' required='1'/][contact-field label='Email' type='email' required='1'/][contact-field label='Learning Request' type='textarea' required='1'/][contact-field label='Are you Looking for ' type='radio' required='1' options='Paid Training,Free Training'/][/contact-form]

What is your Learning Goal for Next Six Months ? Talk to us