Unix, Linux, DevOps , Cloud computing and BigData Knowledge-Base
Similar to 7-mode we have three administrative privilage levels: admin, advanced and diagnostic. Clustered ONTAP system can be managed either from CLI or GUI (system manager or element manager). There are three different shells available with different scopes: Clustershell, nodeshell, systemshell Step:1 Access through CLI Clustershell:=========-SSH...
NFSv4: 1. Data ONTAP 8.1 cluster-mode introduces support for NFSv4 protocol specification as well as elements of NFSv 4.1 2. cluster mode continues to fully support NFSv2 and NFSv3 although you should not use NFSv2 with cluster mode3. NFSv4 support brings the Data ONTAP 8.1 cluster...
While troubleshooting some of the Live upgrade issues in my test environment, I have come across some important list of known issues which causes the Live Upgrade to fail. Even in the past, I have noticed that many Solaris folks complained about the...
Scenario: a. Create a cluster virtual server (Vserver)b. Create a flex vol Step:1 View the available Vservers in the cluster vserver show “node” Vservers are the scope where vol0 volumes exist and the node management LIFs and cluster LIFs of each node. The “admin” Vserveris the...
I was performing Storage migrations for Linux RHEL 5.x and 6.x having VXVM. Storage have provided the Lun’s and confirmed all is okay from their end. But I was unable to get them visible on Veritas level though the same were visible at OS level....
Regular expressions are extremely useful in extracting information from text such as code, log files, spreadsheets, or even documents. As an unix administrator we do regularly use the regex to perform various problem diagnosis , automation or remediation tasks. And it is almost impossible to imagine...
This is second post from the ISCSI administration series ( you can refer the first post here RHEL 6 – ISCSI Administration Series – Configuring ISCSI Server and Client ) . In this post, I will be showing you an hands-on exercise to expand a ISCSI LUN which is already...
This is just a reference document for LDAP administrators who are looking for specific bugs and known issues addressed in version of RHEL6 release so far. And this just gives you the brief overview of the bug/known issue, but for the solution and work around details you...
LDAP server authentication without encrypted communication is not recommendable for any organization. In this Post, I will be discussing the procedure to configure LDAP server and client to use encrypted authentication and communication. This is third Post in LDAP implementation Series. Previous posts for...
In this post, i will be explaining about necessary Certificate authority operations, to continue our actual task i.e. LDAP Configuration with encrypted communication. And this is Second post of LDAP Implemenation Series. For quick recap you can refer the first post ” RHEL 6.3 – LDAP Series...