How to replace Faulty Linux RAID disk Suppose that a disk in the RAID array failed. In that case, you need replace Faulty Linux RAID disk. You must have seen my post about creating RAID 1 array same way I have created Raid 5 array with below command, so that I can demonstrate how we can replace […]
Setting up Linux RAID 1 Configuring LINUX RAID 1 is very essential as its provides redundancy. RAID partitions allows advanced features such as redundancy and better performance. So lets describe how to implement RAID, let’s look at the different types of RAID: ■ RAID 0 (Striping) disks are grouped together to form one large drive. This offers […]
Execute commands on Multiple UNIX servers To get the output from single server we can get it very easily by just executing particular command but what if we would like execute commands on multiple UNIX servers. Use ssh to fulfill above requirement of remote execution. System Scenario: kalwa1 ip 192.168.216.130 kalwa2 ip 192.168.216.131 SSH client is […]
We all know that, sometimes we get NFS Stale File Handle error when we try to access the NFS mount point on the client machine. Error: ” mount.nfs: Stale file handle ” This NFS Stale File Handle error occurs due to following reasons: A file handle becomes stale when the file or directory referenced by the handle is removed […]
DNS server configuration Please select 720p HD quality in setting for better quality of the video log visualization.
Linux I/O Scheduler is a process of accessing the block I/O from storage volumes. I/O scheduling is sometimes called disk scheduling. Linux I/O scheduler works by managing a block device’s request queue. It selects the order of requests in the queue and at what time each request is sent to the block device. Linux I/O Scheduler manages the request queue with the goal […]
How to change the ssh banner for the linux system. Adding customized Linux login banner on the Linux system adds protection on the legal front & also it acts as the warning information to the user. This banner is shown to the user before the user logged into the system/OS. Since by default system does […]
You always need to think in terms of how can we secure server so that it will not be targeted by the hacker. Here is the simple trick is to restrict users in ssh configuration to secure the server. By default ssh configuration accepts all the users to the server, that’s the biggest loop hole in […]