How to replace Faulty Linux RAID disk Suppose that a disk in the RAID array failed. In that case, you need replace Faulty Linux RAID disk. You must have seen my post about creating RAID 1 array same way I have created Raid 5 array with below command, so that I can demonstrate how we can replace […]
Setting up Linux RAID 1 Configuring LINUX RAID 1 is very essential as its provides redundancy. RAID partitions allows advanced features such as redundancy and better performance. So lets describe how to implement RAID, let’s look at the different types of RAID: ■ RAID 0 (Striping) disks are grouped together to form one large drive. This offers […]
Execute commands on Multiple UNIX servers To get the output from single server we can get it very easily by just executing particular command but what if we would like execute commands on multiple UNIX servers. Use ssh to fulfill above requirement of remote execution. System Scenario: kalwa1 ip 192.168.216.130 kalwa2 ip 192.168.216.131 SSH client is […]
DNS server configuration Please select 720p HD quality in setting for better quality of the video log visualization.
Linux I/O Scheduler is a process of accessing the block I/O from storage volumes. I/O scheduling is sometimes called disk scheduling. Linux I/O scheduler works by managing a block device’s request queue. It selects the order of requests in the queue and at what time each request is sent to the block device. Linux I/O Scheduler manages the request queue with the goal […]
How to change the ssh banner for the linux system. Adding customized Linux login banner on the Linux system adds protection on the legal front & also it acts as the warning information to the user. This banner is shown to the user before the user logged into the system/OS. Since by default system does […]
You always need to think in terms of how can we secure server so that it will not be targeted by the hacker. Here is the simple trick is to restrict users in ssh configuration to secure the server. By default ssh configuration accepts all the users to the server, that’s the biggest loop hole in […]
secure ftp port: Making the secure ftp port is more important as you already know that vsftpd use default port 21 for making the connection with the server. So anybody (hacker) can try with the same port for connecting to server. But what if he/she doesn’t know the port for vsftpd for connection, yes off […]