Unix, Linux, DevOps , Cloud computing and BigData Knowledge-Base
Today I came across very specific problem wherein the application was stopped/shutdown but port used by the application was not released. I tried to find out the process which is using that port but unable to find using normal commands (ps etc.). Then I came across a very...
In our previous post ( RHCS : GFS2 Filesystem configuration in Clustered Environment – Part1 ) we have discussed about the introduction and initial configuration of GFS2. And this post we will go through the administration tasks related to GFS2 filesystems. And this post doesn’t cover entire admin tasks...
What is the Purpose of LVM in Clustered Environment and What are the Limitations? We all know that that purpose of LVM is to create an abstraction layer over physical storage, allowing the creation of logical storage volumes. This provides much greater flexibility in a number...
The utmpx and wtmpx files are extended database files that have superseded the obsolete utmp and wtmp database files. The utmpx database contains user access and accounting information for commands such as who, write, and login. The wtmpx database contains the history of user access and...
It is common for Server environments to configure boot disks on external disks so that they can be easily migrated/moved for different reasons. During those scenarios, sometime we will have trouble to boot from the SAN devices and we will encounter with below kind of errors....
One thing you can do before you finish this weekend, just make sure you have a completed linked-in profile, with proper skills added to your profile. And let your skills endorsed by your connections that will increase your chances to get noticed by recruiters and also...
This is a continuation post for my previous puppetlabs introduction post. In this post, I am explaining you two simple practical scenarios that might help you to get started with puppetlabs. Initially, I thought of sharing information about the core components of the puppet, but...
You might have already read my old post, 7 social engineering tips that new system admins should know in new team ,where I have discussed the social engineering points that helps you to quickly sync with the new team. And this post is the continuation post...
Zones and zone sets are the basic form of data path security within a Fibre Channel environment. A zone set is a collection of zones which in turn have individual members in them. Only those members within the same zone can communicate with...
Similar to 7-mode we have three administrative privilage levels: admin, advanced and diagnostic. Clustered ONTAP system can be managed either from CLI or GUI (system manager or element manager). There are three different shells available with different scopes: Clustershell, nodeshell, systemshell Step:1 Access through CLI Clustershell:=========-SSH...