How to Create Index Partitions to Ranged Partitioned Table
Starting with Oracle 8, Oracle allows for tables to be divided into different storage areas called partitions. Each …
Starting with Oracle 8, Oracle allows for tables to be divided into different storage areas called partitions. Each …
Starting 12c, Oracle has introduced a new feature for online movement of partitions. In this post we will discuss this …
Add a printer to system Start the printing configure application. Click the “Applications” on the panel, then go to …
The /etc/machine-id file contains the unique machine ID of the local system that is set during installation. The machine …
1. What are the access specifiers present in java? There are four types of access specifier present in java I,e public, …
1. What is Applet? It is a special type of program that is embedded in the webpage to generate the dynamic content.
1. What is array and what is the use? Array is a collection of similar types of elements that have continuous memory …
1. What is the difference between the paint() and repaint() methods? You should call this method if you want a component …
1. Does garbage collection guarantee that a program will not run out of memory? Garbage collection does not guarantee …
1. What are the controls structures present in java? Java supports five type of control structure. Conditional control …
1. What is Exception and why to use? Exception is nothing but a situation where program terminate abnormally. 2. What is …
1. What is File? File is a container which store text or binary information for a permanent period. 2. What are the …
1. How to access the member of a different class? To access the member of different class user may use Aggregation or …
1. Define package? package is a collection of group of similar types of classes , interfaces and sub packages. 2. State …
1. What are the different types of methods in java? There are 6 types of method support by java. They are:
1. What is Thread from java point of view? Thread is a light weight sub process which is suitable for game & network …
1. What is Nested top-level class? A top level class does not appear inside another class or interface. If a type is not …
1. How may number of operators present in java? Java supports 44 number of of operator. 2. How to convert one type to …
1. What is package? Package is a collection of group of similar types of classes, interfaces and sub packages. 2. State …
1. What is Polymorphism and ways to supports in java? Polymorphism is the concept of “one interface and many …
1. What is String and how String differ from C Lang? String is a predefined class present in java.lang package. String …
1. What is the difference between Swing and AWT components? Basically AWT came first and is a set of heavyweight UI …
1. What is variable? A variable is a container that holds values that are used in a Java program. Every variable must be …
1. What is Collection and what is the difference between Collection and Collections? Collection is a group of similar …
1. What is constructor and its types? Constructor a special type of method that is used to initialize the state of an …
The Problem When mounting a remote CIFS shared volume, the following error is shown and the volume is not mounted:
A collection is a group of objects contained in a single object. The Java Collections Framework is a set of classes in …
During its typical operation, YUM will create a cache of metadata and packages that can be found at /var/cache/yum. …
Security-Enhanced Linux (SELinux) brings additional security measures to your Linux system to further protect its …
Methods to relink all binaries Oracle 11gR2 has two methods of relinking all product binaries in a home. 1. Traditional …
The Problem The host ran out of disk space and ASM and the RDBMS were unable to create audit files. The environment was …
This script contains a PL/SQL block to find VARCHAR2 values that cannot be converted to a number. It can be used to help …
The SQL Server Operating System (SQLOS) is a separate application layer at the lowest level of the SQL Server Database …
The compound trigger is a new trigger that has been introduced in 11gR1. The compound trigger makes it easier to program …
Process Definitions The following terms are used to describe Linux processes: Program: A structured set of commands …
What is Smart Scan? The data search and retrieval processing can be offloaded to the Exadata Storage Servers. This …
The Problem Trying to export schema/tables from higher Database version 12.2.0.1.0 and import to version 12.1.0.1.0, …
This post describes how to move the contents of /usr directory to a separate LVM Logical Volume (LV). In the following …
The firewall-cmd command enables you to configure firewalld by querying, adding, modifying, and deleting zones and …
Linux Script: $ cat test.sh echo "HELLO WORLD" wlst script part: $ cat monitor_jdbc.py import os …
The format for an index hint is: select /*+ index(TABLE_NAME INDEX_NAME) */ col1... There are a number of rules that …
We cannot have different retention policies for different backups. The retention policy is always the same for all …
Index skip scans improve index scans against non-prefix columns since it is often faster to scan index blocks than …
How do I get started? Download and install the module and tools rpms. Create cluster.conf and propagate to all nodes. …
On which quote or order line items can a promotion be applied? Bundle Promotions can be applied to root product line …
The TEST1 table will be the parent and therefore must be created as a partitioned table.And table TEST_TAB will be the …
Oracle ASM Configuration Assistant (ASMCA) was introduced in Oracle ASM version 11.2. ASMCA supports installing and …
Reference partitioning provides the ability to partition a table based on the partitioning scheme of the table …
Composite Data Types You learned that variables of the scalar data type can hold only one value, whereas variables of …
This post explains 11gR2 and 12cR1 Grid Infrastructure configuration framework config.sh(config.bat on Windows) which is …
Hint Usage Report is a new feature from 19c which helps to determine from the execution plan output which are all the …
Beginning with Oracle10G, when statistics are gathered for a table, the old statistics are retained so should there be …
Question: How to find the log files for OPatch and OUI ( Oracle Universal Installer)? OPatch (Common for Windows and …
This script shows which tables and indexes are either missing statistics or have stale statistics, and the statistics …
This is a small note for the new features introduced in Oracle 11g related to Relinking. Methods of Relinking Oracle …
Open Database Connectivity (ODBC) provides a standard interface that allows application access to many different …
Block Types A PL/SQL program comprises one or more blocks. These blocks can be entirely separate or nested within …
The Problem When attempting to start the OPMN services the following error occurs: opmnctl: starting opmn and all …
You can specify the maximum size for any PDB database using STORAGE clause in CREATE PLUGGABLE DATABASE command. If we …
The database has a program that performs a huge sort operation (e.g. end of the year reporting process). This may cause …
This post lists out different administrative tasks you can perform in a container database (CDB) and pluggable database …
Question: How to resize the TEMPFILE(s) for a temporary tablespace after they have grown larger than needed? Large sort …
This post explains why and how to create groups of temporary tablespaces. Grouping temporary tablespaces within a single …
The who command shows you: Who is logged in Where users are logged in The who command has three forms.
In this post, you will learn to: State the two types of type casting. Describe implicit type casting. Describe explicit …
Single-line Comments Comments help easy understanding of code. A single-line comment is used to document the …
The lsof command prints a list of all files that are currently opened to all active processes. This can include …
The rpm command is used to manage RPM packages on Red Hat-derived distributions. It includes many different options, …
The grep command, in its most basic form, is a search tool. Unlike find or locate, it is not limited to finding file …
At some point in time, you must have used the ls command if you use UNIX/Linux systems. ls is the most commonly used …
The chattr command is used to change the attributes of a file or directory. The below table describes some of the …
The chmod command enables you to modify the permissions of a file or directory. Only the owner of the file or directory …
User profiles Individual users have personal habits and preferences for their Linux work environment, and so a variety …
Special permissions on files and directories in linux are : SetUID, SetGID and Sticky bit. With the help of “chmod” …
We know that computers operate on one byte at a time i.e. 8 bits of data a manipulated as one unit.
Pointers and functions get on very well. Whenever data is to be passed to a function, especially large amounts of them, …
This is one of the special features available in C, but not found in many other languages. The preprocessor is a part of …
The concept of linked lists is one of the powerful features in C. It will also bring to you some of the powerful …
Pointers are one of the very powerful & special features of C. It simply means instead of using a variable name, you …
Sometimes it is necessary to move a Datafile to another Location (eg. Mountpoint, ASM Diskgroup, etc.) due to Space …
The Setup We will be using below setup for the purpose of this post: CDB name:CDB1 PDB name: pdbtest CDB1 …
TDE was introduced as of 10gR2 ( 10.2.0.1 ). In 12c TDE provides a completely different interface to manage the wallet …
Rolling Forward a Physical Standby Database Using the RECOVER FROM SERVICE Command A standby database is a …
This post provides an Overview of all Data Pump related New Features of the Oracle Database 12.2 Release. Oracle Data …
Audit all expdp/impdp operations with unified auditing You can perform auditing on Data Pump jobs in order to monitor …
Users in the OSDBA group are granted the SYSDBA administrative privilege. Similarly, the OSOPER group is used to grant …
When you rename one or more datafiles in the primary database, the change is not propagated to the standby database, …
For the purposes of this post, the following environment is used as an example to describe the procedure: Standby Name: …
Whats a MAC address? A MAC address is a physical way of addressing your network card at a hardware level.
Your hostname is a label that is assigned to your computer so that it can be identified. There are only a couple of …
Ping is a program that is used to test the reachability of a host. It also measures the time it takes to send the packet …
There are lots of different ways of installing Raspian to an sd card like win32diskimager and usb image writer but an …
The advanced package tool, also known as APT is a tool that is used for the easy installation, removal and upgrading of …
Tomcat versions can be obtained by version.sh in bin directory of TOMCAT_HOME. HTTPD component version can be viewed …
Question: When a user logs out of their session any service they’ve started using the systemd user process is …
A directory whose sticky bit is set becomes an append-only directory, or, more accurately, a directory in which the …
The Problem Unable to mount Samba share. Attempting to create a mount for a samba share fails. However is accessible …
Data Protection Modes and Redo Transport When you define a redo transport mode, you are configuring the shipment of log …
The way to check the status of VG is: lvs or lvdisplay. vgchange performs operation on underline LV, it activates or …
Enterprise Manager Cloud Control provides a graphical user interface for monitoring the Data Guard configuration. The …
Non-CDB Architecture In Oracle Database 12c, there are two possible configurations, non-CDB and multitenant container …
Oracle RAC One Node Oracle RAC One Node is a single instance of an Oracle RAC-enabled database running on one node in …
Transparent Application Failover: Overview TAF is a runtime feature of the OCI driver. It enables your application to …
CPU and Wait Time Tuning Dimensions When tuning your system, it is important that you compare the CPU time with the wait …
Instance Recovery and RAC When an instance fails and the failure is detected by another instance, the second instance …
Patch and Patch Set: Overview Oracle issues product fixes for its software called patches. They are associated with …
RAC Initialization Parameter Files When you create the database, Oracle Database creates an SPFILE in the file location …
Enterprise Manager Cloud Control Cluster Database Home Page The Enterprise Manager Cloud Control (EMCC) Cluster Database …
Single Instance–to-RAC Conversion A single-instance Oracle database can be converted using several methods, which …
Installing the Oracle Database Software The Oracle Universal Installer (OUI) is used to install the Oracle Database 12c …
Data Guard Broker: Requirements To use the Data Guard broker, you must comply with the following requirements: Use the …
The Oracle Data Guard broker is a distributed management framework. The broker automates and centralizes the creation, …
To create a logical standby database by using Enterprise Manager: 1. Click Add Standby Database on the Data Guard …
Benefits of Implementing a Logical Standby Database A logical standby database provides benefits in disaster recovery, …
Enabling Block Change Tracking on a Physical Standby Database With the Oracle Active Data Guard option, you can enable …
What is a Far Sync? A Data Guard Far Sync is a remote Data Guard destination that accepts redo from the primary database …
ACPI ACPI stands for Advanced Configuration and Power Interface. It is the system that describes hardware to the …
Prerequisites for Using Oracle Enterprise Manager Cloud Control 12c Oracle Enterprise Manager Cloud Control 12c can …
Oracle Data Guard is a central component of an integrated Oracle Database High Availability (HA) solution set that helps …
Oracle RAC: Overview A cluster comprises multiple interconnected computers or servers that appear as if they were one …
Cluster A cluster consists of a group of independent but interconnected computers whose combined resources can be …
Oracle Clusterware provides a complete set of cluster services to support the shared disk, load balancing cluster …
What is the RMAN Catalog Schema, Repository and Database? The RMAN catalog schema is an Oracle Schema holding the RMAN …
What is the RMAN Catalog Schema, Repository and Database? The RMAN catalog schema is an Oracle Schema holding the RMAN …
What is the RMAN Catalog Schema, Repository and Database? The RMAN catalog schema is an Oracle Schema holding the RMAN …
The best way to determine the optimal size of redo log files is to look into the alert.log file for messages about how …
Often times the online redo logs are sized too small causing database performance problems. The following is an example …
DM-Multipath allows many of the features to be user-configurable using the configuration file /etc/multipath.conf. …
The Problem LVM commands show disk read failure and shows the below I/O errors: [root@server]# pvscan /dev/sdxx: read …
Basics The rsh and rlogin services enable to respectively execute a command and login from a remote host. It has been …
Basics The rsh, rlogin, and rexec server should only be run on a system after carefully considering the security …
Server The configuration file for openldap server is as below, /etc/openldap/slapd.conf Need to add the following line …
An overview on hardware clock and system timer circuits When it comes to talking about a system’s clock, the …
Kernel boot parameter HPET (High Precision Event Timer) is used for specifying hardware timer/clock source. HPET is not …
What are leap seconds You can read more than you’ll ever want to know on the web, but I recommend the Unix Leap …
Error 1040 occurs when the number of connected clients has reached the value of the max_connections server variable. …
This script collects information about the configuration and the status of a Linux NTP daemon and all system information …
RPM stands for Redhat Package Manager. It is a utility that is used to install, uninstall, update, query, and verify …
Ansible is an open-source automation platform. It is simple to install. The Ansible software only needs to be installed …
Today, I come across a situation where I have to push a file to the remote server’s directory which was owned by user …
Today, I come across a situation where, while patching an RHEL server yum update command got interrupted and started …
When we have to do operations on a huge number of files then find command comes to our rescue. There can be situations …
Ansible comes with a module named YUM with the help of which the activities of package installation, upgrade, and …
Updating/Changing the root user’s password is a routine task being performed by every Linux administrator in any …
1) How to execute a Linux cron job every second using Crontab? Answer: You cannot schedule a every-second cronjob. In …
Today, I come across a situation where, an application guy hit chmod command in wrong way. He hit below command where …
We all know that it is possible to update the kernel with a server reboot but, a restart is needed in order to make use …
1) What are Booleans? Answer: Booleans are SELinux policy rules which changes behaviour of selinux policies. Booleans …
tar is a commonly used command to create archive files. TAR stands for Tape ARchive. It is important to note that tar is …
Today, I came across a situation where I had to write a task in an ansible playbook to delete the contents of …
Below Playbook can be used to migrate any RHEL6 or RHEL7 server from Satellite version 5 to Satellite version 6.
Today, I was told to remove a domain group from the active directory. However, there were files/directories owned by …
Today, I come across a situation where I had to increase the size of lvm partition without adding a new virtual disk.
Today, I came across a situation where I was writing a script for automation. In the script, I had to append a line to …
If you are planning to use a hard disk of size more than 2TB UEFI comes into the picture. Today, I came across a …
This post lists KVM known issues, how to troubleshoot and resolve them. Error: Log files There are various trace/log …
Network partitioning is when there is a network outage that causes the cluster to be split into two survivable groups. …
A node group is a set of data nodes that is in charge of several fragments of data in the MySQL Cluster.
ORA-1578 error could be an indication of a Fractured Block. A Fractured Block means that the block is incomplete and …
The kernel uses heuristics to guess which pages of memory are likely to be needed in the near future and tries to keep …
The Problem While installing package or listing using dnf or yum commands getting below errors: # dnf repolist Oracle …
This post describes ways to begin to diagnose why a process is using more CPU than normal. Why is this abnormal?
Access Privileges: Requires user with SELECT privileges on DBA_TABLES, DBA_SEGMENTS, DBA_EXTENTS and ANALYZE privilege …
The strace utility is a debugging utility for Linux which is used to monitor the system calls used by a program and all …
Why to Start STRACE and TRUSS with PL/SQL There are times when a STRACE or TRUSS tracing utilities would help diagnose …
The Problem System fails to boot with below errors: [12.524044] systemd-udevd: fork of '/bin/uname -p' failed: …
The Problem System boots into “kernel panic - not syncing: Out of memory and no killable processes…”. …
1. Download the MySQL packages for ubuntu. 2. Upload the zip file to the Ubuntu and unzip it. (unzip was not install by …
Ubuntu is a Certified System Configuration for Java SE 7. This article describes how you can setup the Oracle Java …
The Problem CentOS/RHEL 7.2 kickstart install fails with following error if the following option’s are used, …
The Problem Multiple systemd services has been failing to initialize due to Cannot add dependency issues: Hostname …
When native Linux device multipathing is used, an error may be reported that lists the composite multipath device. For …
As of MySQL 5.5, you can use these 2 INFORMATION_SCHEMA views : INNODB_LOCK_WAITS INNODB_TRX Here is an example: session …
This post discusses the Removal of DBFS configuration steps specific to EXADATA systems. This needs to be tested in your …
This post assumes the existence of an Oracle Key Vault server with an endpoint enrolled. The variables ORACLE_SID, …
Question: How to identify the dom0 Version from a Virtual Machine? The DMI output in the dmesg commands tells about the …
This post details the steps needed to be performed to migrate an existing TDE wallet for a RAC database to an OKV …
This post provides steps to migrate TDE local wallet to Oracle Key Vault Server. Assuming that, TDE local wallet is …
The Problem Immediately after a successful RDBMS installation (perhaps even including a sample DB instance creation), …
The Problem Apache is installed on Oracle Linux through “yum install httpd”. After the install the Apache …
For CentOS/RHEL 5 and 6 Here, you can specify the hostname as a boot parameter in Anaconda, then set the hostname from …
Question: How to perform a UEFI Linux installation through kickstart for non DHCP/PXE? The steps outlined below explians …
The Problem Unable to do Display Setting for Xming. You get the error below while trying to run Xclock on server for …
This post shows how to install and configure Java Development Kit 6 on CentOS/RHEL. Download Java Development Kit 6 You …
Question: How to Check Whether Any Queries Are Waiting for a Lock Other Than an InnoDB Row Lock? You can use the …
Question: How to Monitor Number of InnoDB Deadlocks? To log all deadlock information to the mysql error log, you can …
This post describes the steps to prompt for server hostname during kickstart install. The hostname parameter can be …
The Problem After issuing FLUSH TABLES WITH READ LOCK, we can see it is pended for a long time with one of the following …
In bash, by default, the history commands are recorded in ~/.bash\_history. You can specify a different file other than …
The Problem The Java Virtual Machine (JVM) crashed. The fatal error log file, hs_err_pid[pid].log, shows the error …
Question: How to change the home directory of the Oracle Secure Backup (OSB) to its default location, which is …
The Problem Unable to connect to one of the systems after installing many software updates from the standard Oracle …
Question: How to change the password policy on a system so that a user cannot choose any of the last 3 passwords …
How to check the existence of the persistence master key cache? The documentation says: “The persistent master key …
What is ASMLib? ASMLib is free, optional software for the Automatic Storage Management (ASM) feature of Oracle Database …
By default, the OS Management Service Agent plugin is enabled on Oracle Linux 6 and 7 instances. For Oracle Linux 8 …
This post explains the steps to easily setup VNC server in CentOS/RHEL 8. Should be able to access VNC session after …
This post helps to save the command history of selected users to a centralized location for monitoring purposes. 1. …
Network interface teaming was introduced from CentOS/RHEL 7 as a more extensible and scalable alternative to network …
SSH is a protocol to transfer data securely between different machines. The SSH protocol uses public-key cryptography to …
Why use Apache Using Apache to serve your Flask App is, in my opinion, the easiest way to move out of development and …
What is privilege analysis? - Privilege Analysis captures the privileges used by database users, including database …
Question: How do we capture debugging information from systemd during early boot issues? To avoid losing boot messages, …
It is not uncommon for customers to configure an ACFS filesystem as an ACFS mount registry-based general-purpose …
This post illustrates steps to change the engine database password for the OLVM engine. 1. Before modification, you can …
This post will explain some practical psql commands and describe how to run the PostgreSQL queries from the command line …
Firewall Architecture Concepts The Linux kernel includes netfilter, a framework for network traffic operations such as …
The operating systems break and crash. We as sysadmin are always looking for the root cause analysis so as to avoid such …
Mounting NFS Shares with the Automounter The automounter is a service (autofs) that automatically mounts NFS shares …
Resetting the root password from the Boot Loader One task that every system administrator should be able to accomplish …
Step by Step Linux Boot Process (CentOS/RHEL 8) Modern computer systems are complex combinations of hardware and …
Describing the Stratis Architecture The current local storage solution in CentOS/RHEL includes many stable and mature …
Describing Virtual Data Optimizer CentOS/RHEL 8 includes the Virtual Data Optimizer (VDO) driver, which optimizes the …
Extending a logical volume and XFS file system One benefit of logical volumes is the ability to increase their size …
Extending and Reducing a Volume Group You can add more disk space to a volume group by adding additional physical …
NFS, the Network File System, is an internet standard protocol used by Linux, UNIX, and similar operating systems as …
Logical Volume Management (LVM) Concepts Logical volumes and logical volume management make it easier to manage disk …
Performing Periodic Tasks Often, people find that they are (or ought to be) performing tasks on a regular basis. In …
Running Commands in the Foreground When running a command from the bash shell prompt, unless you specify otherwise, the …
Signals Linux (and Unix) uses signals to notify processes of abnormal events, and as a primitive mechanism of …
The alias command is one of many commands referred to as Bash Built-In commands, meaning it is inherent to the bash …
quotacheck command audits and corrects quota information by building a table of current disk usage and comparing it to …
In this post, we will discuss the AWS IAM feature. We will cover some of the basic features that IAM provides and dene …
Let us talk about something on security hardening in Linux. the first topic that comes to mind is Disk encryption. The …
In this guide, we will be working on How you can Create and Deploy Pod Definitions in a Kubernetes cluster and run …
Process Priorities When scheduling processes, the kernel effectively gives every process a handful of counters. Every …
The Preboot Execution Environment (PXE) is an industry-standard client/server interface that allows networked computers …
Apache HTTPD is one of the most used web servers on the internet. A web server is a daemon that speaks the http(s) …
SSH (Secure SHELL) is an open-source and most trusted network protocol that is used to login to remote servers for the …
In this post, we will discuss how do we configure the PXE server to install SuSE Linux Enterprise server OS into …
Here is a quick reference guide on configuring an apache webserver based YUM repository server in CentOS/RHEL 7. …
When you type commands in the bash shell, the shell by default is recording every command that you input via the …
IP forwarding is a process of forwarding IP packets received on one network interface to another network interface. This …
In this tutorial, we will show you how to install ansible and ansible playbook on Ubuntu 18.04. This tutorial will show …
This post discusses - how to scan a new disk without rebooting the system. Sometimes the new disks are not scanned …
In this post, we are going to discuss the Sendmail Configuration and Troubleshoot method, as this Sendmail service very …
Please note that the iptables rules are stored in the /etc/sysconfig/iptables file. If you view this file, you’ll see …
The shutdown Command “shutdown” is a system administration command which terminates all processing. when …
The Linux poweroff command closes out the filesystem, shuts down the system, and poweroff it. Because this command …
The Linux Sort can be used to sort the content of a text file or output from other commands, By default, the sort …
whoami is a very simple Linux command and can be used to find out the name of user who is currently logged in the …
The chrony package provides a chronyd service daemon and chronyc utility that enable mobile systems and virtual machines …
The sdiff command produces a side-by-side comparison of file1 with file2. Output is shown in the format: text text …
Last post we have gone through some basics of Network administration. In this post, we will be targeting some Advance …
The intent of this post is to help the person who is going to attend the basic level of the Solaris interview.
As the number of devices, servers, and services in your business or organization increases, it is time to monitor …
Question: How to add a new volume to an existing LVM volume group. Note: This post assumes that there is an existing …
The uniq command can be used to remove the duplicate lines from a text file in Linux or Unix. The duplicate lines should …
How a Process Dies When a process dies, it either dies normally by electing to exit, or abnormally as the result of …
Processes are an instance of an executing program. In other operating systems, programs are often large, elaborate, …
Partitioning a Disk Disk partitioning allows system administrators to divide a hard drive into multiple logical storage …
Extracting Text with cut The cut command extracts columns of text from a text file or stream. Imagine taking a sheet of …
Introducing swap space concepts A swap space is an area of a disk under the control of the Linux kernel memory …
In Linux, the aspell utility is the primary utility for checking the spelling of text files. In this post, we learn how …
The paste command is used to combine multiple files into a single output. Recall the fictional piece of paper which …
The uniq program is used to identify, count, or remove duplicate records in sorted data. If given command-line …
Linux cat command We have been using the cat command to simply display the contents of files. Usually, the cat command …
Searching Text File Contents using grep In an earlier post, we saw how the wc program can be used to count the …
Sorting is the process of arranging records into a specified sequence. Examples of sorting would be arranging a list of …
Counting Made Easy Have you ever tried to answer a “25 words or less” quiz? Did you ever have to write a 1500-word …
It is important to understand what actions you must take when SELinux prevents access to files on a server that you know …
How SELinux Protects Resources SELinux provides a critical security purpose in Linux, permitting or denying access to …
The Problem When running the multipath command it could be seen devices reporting failed paths, like “sdb” …
Initial SELinux Contexts On systems running SELinux, all processes and files are labeled. The label represents the …
SELinux Booleans SELinux booleans are switches that change the behavior of the SELinux policy. SELinux booleans are …
Access Control List Concepts Standard Linux file permissions are satisfactory when files are used by only a single …
Jobs scheduled to run repeatedly are called recurring jobs. Most Linux systems ship with the crond daemon, provided by …
Why we need at instead of cron to schedule jobs Sometimes you might need to run a command, or set of commands, at a set …
Linux Process Scheduling and Multi-Tasking Modern computer systems range from low-end systems that have single CPUs that …
Managing Temporary Files A modern system requires a large number of temporary files and directories. Some applications …
Creating and Executing Bash Shell Scripts Many simple, common system administration tasks are accomplished using …
Conditional Structures Simple shell scripts represent a collection of commands that are executed from beginning to end. …
Using exit codes within a script After a script has processed all of its contents, it exits to the process that called …
Using for loop to iterate commands System administrators often encounter repetitive tasks in their day-to-day …
Searching for files A system administrator needs tools to search for files matching certain criteria on the file system. …
The User Module The Ansible user module lets you manage user accounts on a remote host. You can manage a number of …
Mounting File Systems Manually A file system residing on a removable storage device needs to be mounted in order to …
Please follow the steps outlined below in order to change the password of Java keystores in their production …
Enabling RedHat Software Repositories Registering a system to the subscription management service automatically …
Managing Software Packages with YUM The low-level rpm command can be used to install packages, but it is not designed to …
Software Packages and rpm The RPM Package Manager, originally developed by Red Hat, provides a standard way to package …
Storage Management Concepts Files on a Linux server are accessed through the file-system hierarchy, a single inverted …
The tar Command Archiving and compressing files are useful when creating backups and transferring data across a network. …
Changing the system hostname The hostname command displays or temporarily modifies the system’s fully qualified host …
NetworkManager Basics NetworkManager is a daemon that monitors and manages network settings. In addition to the daemon, …
DESCRIBING CONNECTION CONFIGURATION FILES By default, changes made with nmcli con mod name are automatically saved to …
Transfering files using Secure Copy (scp) OpenSSH is useful for securely running shell commands on remote systems. The …
Synchronize files and directories with rsync The rsync command is another way to securely copy files from one system to …
Starting from CentOS/RHEL 7, various new features have been introduced in the network stack as well. This post will …
TCP/IP Network Model The TCP/IP network model is a simplified, four-layered set of abstractions that describes how …
The chronyd service keeps the usually-inaccurate local hardware clock (RTC) on track by synchronizing it to the …
Storing the system journal permanently By default, the system journals are kept in the /run/log/journal directory, which …
Setting local clocks and time zones Correct synchronized system time is critical for log file analysis across multiple …
Finding Events The systemd-journald service stores logging data in a structured, indexed binary file called the journal. …
System Logging Processes and the operating system kernel record a log of events that happen. These logs are used to …
Configure the OpenSSH Server OpenSSH service is provided by a daemon called sshd. Its main configuration file is …
Logging events to the system Many programs use the syslog protocol to log events to the system. Each log message is …
What is OpenSSH OpenSSH implements the Secure Shell or SSH protocol in the Red Hat Enterprise Linux systems. The SSH …
Introduction to systemd The systemd daemon manages startup for Linux, including service startup and service management …
SSH Key-based Authentication You can configure an SSH server to allow you to authenticate without a password by using …
Starting and Stopping Services Services need to be stopped or started manually for a number of reasons: perhaps the …
Linux Filesystem Permissions File permissions control access to files. The Linux file permissions system is simple but …
Definition of a Process A process is a running instance of a launched, executable program. A process consists of: An …
The command used to change permissions from the command line is chmod, which means “change mode” …
Describing Jobs and Sessions Job control is a feature of the shell which allows a single shell instance to run and …
Default File Permissions When you create a new file or directory, it is assigned initial permissions. There are two …
A group must exist before a user can be added to that group. Several command-line tools are used to manage local group …
A number of command-line tools can be used to manage local user accounts. Creating Users from the Command Line The …
Process Control Using Signals A signal is a software interrupt delivered to a process. Signals report events to an …
shadow passwords and password policy At one time, encrypted passwords were stored in the world-readable /etc/passwd file. …
The SuperUser Most operating systems have some sort of superuser, a user that has all power over the system. In Linux, …
Describing Load Average Load average is a measurement provided by the Linux kernel that is a simple way to represent the …
Real-Time Process Monitoring The top program is a dynamic view of the system’s processes, displaying a summary …
Special Permissions Special permissions constitute a fourth permission type in addition to the basic user, group, and …
The Problem The output of pvscan command shows ‘There are # physical volumes missing’, but these physical …
A key design principle of Linux is that information and configuration settings are commonly stored in text-based files. …
In this post and in future posts in the series, we will learn how to create, manage, and delete local users and groups …
Using Shell Variables The Bash shell allows you to set shell variables that you can use to help run commands or to …
It is possible to create multiple names that point to the same file. There are two ways to do this: by creating a hard …
Command line file management To manage files, you need to be able to create, remove, copy, and move them. You also need …
Constructiong Pipelines A pipeline is a sequence of one or more commands separated by the pipe character (|). A pipe …
Command-Line Expansions The Bash shell has multiple ways of expanding a command line including pattern matching, home …
Standard Input, Standard Output and Standard Error A running program, or process, needs to read input from somewhere and …
The Problem You attempt to alter a user’s password to a previously used one and get the following error when …
Introducing GNU info Man pages have a format useful as a command reference, but less useful as general documentation. …
Introducing the Man Command One source of documentation that is generally available on the local system are system …
The file system hierarchy All files on a Linux system are stored on file systems, which are organized into a single …
Logging in Linux users and administrators often need to get shell access to a remote system by connecting to it over the …
This post describes how to change network device settings, such as speed, duplex, and auto-negotiation in Linux with …
Linux is a critical technology for IT professionals to understand. Linux is in widespread use, and if you use the …
Question: We are using NFS for datafile storage, without Real Application Clusters (RAC), and the mount point with the …
This post describes how to install the KDE Desktop environment in a CentOS/RHEL 6.x system where it is not yet …
Question: How to set tcp/ip parameters to Become permanent after reboot on Solaris 11? Below are a few examples of how …
The purpose of this post is to briefly describe how to list objects in an export file without physically importing the …
The Problem User cannot login to the system via GUI On CentOS/RHEL 7.x. The gdm utility segfault with below error after …
The Problem We had Upgraded oracleasm tools and system to latest. Restarting the oracleasm service triggers below …
This post describes the process of replacing a failed disk with the raidctl command in the mirroring configuration on …
The post provides in detail the steps to shutdown/startup The CRS, OHAS, ASM & RDBMS Services on a RAC Cluster 11.
This post answers the most common questions of the MySQL Plugin architecture. Answers cover areas such as installation, …
Question: DB_FILE_MULTIBLOCK_READ_COUNT is set to 16 in the spfile. How to unset the parameter as it keeps reverting …
This post talks about the change of behavior for the PASSWORD_REUSE_MAX and PASSWORD_REUSE_TIME resource profile …
This post explains about how to check database accounts without profiles have default password. When a profile is …
This post discusses three ways you can move tables from one tablespace to another tablespace using traditional …
This post explains the meaning of the ACCOUNT_STATUS column of the DBA_USERS view. The DBA_USERS.ACCOUNT_STATUS can have …
Question: How to Monitor Password Change History? Oracle only tracks the date that the password will expire based on …
The Problem A system is not able to boot and is stuck at the GRUB prompt. The Solution The system can fail to boot if …
About Schema Only Accounts Schema is a collection of objects, while db user is an account to connect to the instance.
The Problem The “realm join” command is failing with the following error even if user is member of …
The Problem When installing CentOS/RHEL 7 on a hardware box with huge amount of ram installed, the installation gets …
The Problem Unable to rename or delete the ASM disk. This disk is on multipath introduced to 2 node cluster. The disk is …
The problem We have changed the default kernel entry to boot from in GRUB using the “grub2-set-default” …
This post outlines steps to configure yum-cron services and send an email notification. 1. Install the yum-cron package: …
If you want to be able to do a point-in-time recovery, you need to start your preparation already when creating the …
The Problem On CentOS/RHEL 6.x there are too many kdmflush processes owned by the root user which was notified after …
This post discusses how to control the journal size for systemd. The size limitations are governed by options in …
1. To disable NUMA, add numa=off to the kernel line in /boot/grub/grub.conf, for example: # vi /boot/grub/grub.conf …
Problem systemd-tmpfile-clean.timer will not start, ignoring, unit is masked. # systemctl start …
This post is to explain the difference between ULN (https://linux.oracle.com) and the Public Yum Repository …
The Problem Service started with custom systemd script stops straight after starting. For example: # cat …
Problem Container keeps stuck at restarting status as follows: # docker ps -a CONTAINER ID IMAGE COMMAND CREATED STATUS …
Question: How to get the exact number of days left for the password to expire when the password expiry policy is …
The Problem The free space as shown by the dba_free_space seems incorrect. The total space used by all the segments in …
There are different locations where proxy configuration can be changed. In latest Docker distribution, it uses systemd …
The Problem The system is configured to use user slice cgroups to throttle the bandwidth on its Oracle ASM DATA and RECO …
To be able to use SSL for connecting to a MySQL server, the server will need to be reconfigured, and how clients access …
The Problem The following message will be seen in /var/log/messages when CRS stack is stopped/started. When stopping the …
The Problem The native multipath subsystem will group several physical paths into a single logical block device. Using …
The performance of MySQL is affected by the performance characteristics of the host. Various factors can affect the …
The Problem A NetApp system is providing NFS shares which are accessed from several environments, including CentOS/RHEL …
This post explains how a static IP address can be set on CentOS/RHEL 7. We can configure the static ip address in …
Discovering unhealthy non-global zone states The Solaris Zone may be in different unhealthy situations, this post covers …
The Problem At the time starting multipathd, error messages like below are logged onto /var/log/messages with …
Password Update and Reuse Policy Is there any feature for keeping track of user password history? MySQL 8.0 is able to …
The Problem When trying to connect to a database as sysdba, ORA-12545 is occured and connection is failed. For Example:
Question: DB_FILE_MULTIBLOCK_READ_COUNT is set to 16 in the spfile. How to unset the parameter as it keeps reverting …
There are two kinds of initialization parameters: Dynamic initialization parameters can be changed for the current …
The goal of this post is to provide steps to add, remove, replace or move an Oracle Cluster Repository (OCR) and/or …
It is not possible to directly restore a manual or automatic OCR backup if the OCR is located in an ASM disk group.
The script provided below will report On Space Usage in Tablespaces. Access Privileges required: SELECT on …
MySQL Replication Replication in MySQL copies changes from one server―the master―to one or more slaves. The master …
If you are into systems, you would’ve heard about backups. I think in all fields backup is one thing which is of …
Triggers are named database objects that activate when you modify table data. They can: Examine data before it is …
MySQL Events are tasks that run according to a schedule. They can be referred to as “scheduled events.” When you create …
Exporting and Importing Data The two most common ways to accomplish export and import operations are: Using SELECT …
Stored Routines A stored routine is a named set of SQL statements that are stored on the server. Clients do not need to …
MySQL enables encryption on a per-connection basis. Depending on the requirements of individual applications, you can …
Partitioning A partition is the division of a database, or its constituting elements, into distinct independent parts. …
Locking InnoDB locking does not need to set locks to achieve consistent reads. It uses row-level locking for DML …
What is a MySQL Transaction A transaction is a way for you to execute one or more SQL statements as a single unit of …
Question: How to allow user creation with simple password without any character limit or enforcement of special …
Question: How to Determine the Strength of Existing Passwords in Order to Identify Users with Weak Passwords? Find …
MySQL Tools Oracle Corporation provides tools for administering and otherwise working with the MySQL Server. 1. MySQL …
The post describe the available clients for administrative tasks. Command-Line client programs available for MySQL are …
About Initialization Parameters Managing an Oracle instance includes configuring parameters that affect the basic …
Configuring Enterprise Audit Enterprize auditing can be implemented using the audit_log server plugin. It is available …
The Problem During 12.2.0.1 GI install on AIX 7.1, at OUI screen “create ASM disks”, asm disks are not …
Log Files MySQL has different log files to record server activity. Log files can consume a large amount of disk space.
SQL Modes The SQL mode consists of optional values that control some aspect of query processing. When you set the SQL …
Server System Variables The MySQL server maintains many server system variables that indicate how it is configured. Each …
In this post, we will learn how to avoid passing the password for the shell script manually. You can either:
Obscuring Authentication Options Specifying a password on the command line in the form ‘mysql -u root -p …
MySQL Configuration Options You can specify startup options on the command line when you invoke the server (or client), …
Starting the MySQL Server on Linux The server can be started from a command line: # service mysql start Starting the …
Linux MySQL Server Installation Directories When the RPM files are unpacked, many files are automatically extracted and …
MySQL’s architecture is very different from that of other database servers and makes it useful for a wide range of …
MySQL Server Distributions MySQL is available for several operating systems, including Linux, Windows, Mac OS X, and …
The Problem RMAN DUPLICATE fails with: ORA-00283: recovery session canceled due to errors ORA-28365: wallet is not open …
The Problem Your database is in archive log mode and archiving works fine until suddenly connecting via SQLPLUS …
Although you cannot use any positional parameter name on the left side of an assignment statement, you can still assign …
Functions in the Shell A function is a set of one or more statements that act as a complete routine. Each function must …
Understanding “$@” and “$*” Positional Parameters in Shell Script The Values of the …
Korn Shell Arrays Arrays are variables that contain more than one value. Don’t declare arrays explicitly or explicitly …
Processing Script Options With the getopts Statement Options or switches are single-letter characters preceded by a + …
Variable Types In the Bourne shell, there are two variable types: strings and constants. In the Korn shell, there are …
The “here” Document Frequently, a script might call on another script or utility that requires input. To run a script …
File Input and Output A script can receive input from a file and send output to a file so that the script can run …
Input and Output in a Script While some scripts run without any interaction with the user, many scripts require input …
Use the print statement to provide output. Use it wherever you would use the echo statement. It is more versatile than …
The Problem Two LUNs of 20 GB were removed and new LUNs of 240GB presented to the server. EMC storage is used.
The Problem During boot, a message related to SELinux appeared in the console log as shown below: /usr/bin/chcon: failed …
In most Linux distributions, access to crontab can be control by accessing two files /etc/cron.d/cron.deny and …
This post introduces how to disable high-resolution timer configured in Linux kernel internally. To disable …
The Problem Getting permission denied when we are trying to do ssh to the system using new user created $ ssh user1@[ip …
Introduction to the awk Programming Language The awk programming language grew out of the recognition that many data …
The case Statement The if/then/else construct makes it easy to write programs that choose between two alternatives. …
Positional Parameters The execution of scripts is made versatile by the ability to run a script based on arguments …
When you write a script and set up user interaction, generally the script expects a certain type of user input. For …
You may have seen a large number of login trials in your Linux box, similar to below: Jan 25 01:37:27 [_HOST_] …
The grep Command Like most UNIX commands, grep is a mnemonic. The grep mnemonic is derived from ex editor commands. The …
The Bourne shell assigns string values to variables only in the assignment statement. The Bourne shell has no built-in …
Place an integer expression in two pairs of parentheses ((…)) to invoke an Arithmetic evaluation. For …
Korn Shell Aliases An alias is a name that you give to a command. You can create an alias in the Korn shell.
The Korn Shell let Statement The let statement is an alternative to the ((…)) statement. Type the arithmetic …
Shell Parse Order Parsing controls how a shell processes a command line before it executes a command. A shell has a …
Quoting Characters With the exception of the letters and the digits, practically every key on the keyboard is a …
Shell Variables Shell variables are capitalized by convention. The shell maintains two lists of variables: Those local …
User Startup Scripts When a user logs in using sh or ksh, configuration scripts run in the following order: /etc/profile …
Creating Shell Scripts A shell script is a text file that contains a sequence of UNIX commands. The shell script is …
This section explains how you can transfer files between systems using the File Transfer Protocol (FTP). The ftp command …
This post describes how to use adcli to integrate a CentOS/RHEL 8 server into Microsoft Active Directory. 1. Install …
Copying Files or Directories To and From Another System You can use the rcp command to copy files or directories from one …
Establishing a Remote Login Session A remote login session enables you to access a remote host from your current machine …
The ‘compress’ Command Compressing files helps you to conserve disk space. This section describes how to use …
Disabling SELinux is not a recommended course of action as it is not actually addressing security issues directly. …
The problem Failed to start login and other services in the system. /var/log/messages (or journalctl log entry) showing …
What is Oracle Database Auditing? Auditing is the monitoring and recording of selected user database actions. It can be …
Using the test Command The test command is used for testing conditions. This command is very useful in shell scripts. …
Shell Scripts Shell scripts are text files that automate a series of UNIX environment-based commands that otherwise must …
Archiving Files To safeguard your files and directories, you can create a copy, or archive of the files and directories on …
An alias is a shorthand notation in the Bash shell to enable you to customize and abbreviate UNIX commands. An alias is …
Using Korn Shell Functions Functions are a powerful feature of shell programming used to construct customized commands. …
How to use noclobber during redirection to avoid overwriting files Redirecting standard output to an existing file …
Solaris OS Processes Every program you run in the Solaris OS creates a process. When you log in and start the shell, you …
This post describes how to manage jobs in the Bash shell. The Bash shell enables you to run jobs in the background, …
Searching for Content in Files You can search the content of files for either patterns or strings of characters by using …
You can use the find command to locate files or directories in the directory hierarchy. The find command searches using …
By default, Solaris 10 installs the Solaris Operating System to a ZFS rpool with a flat filesystem layout. It is …
Question: While using rsync the source and the target are not of the same size. What could be the reason?
Standard UNIX file protection provides read, write, and execute permissions for the three user classes: file owner, file …
Viewing File and Directory Permissions All files and directories in the Linux OS have a standard set of access …
Every new file or directory has a set of default permissions assigned to it at the time of creation. The user mask …
Question: The filesystem is almost full. There is a big difference between “df” and “du” …
The Network Time Protocol (NTP) is an internet protocol that is useful to synchronize system clocks to coordinate with …
Displaying the Command History The shell keeps a history of recently entered commands. This history mechanism enables …
Using Command Redirection You can redirect input to and output from commands by using redirection. There are two …
In this post, we are going to discuss three special types of permissions that can be set for executable files and public …
Working With User Initialization Files This post describes the Solaris 10 OS default initialization files of the Bourne …
Printing Files You can use the lp command, the lpstat command and the cancel command to submit print requests to a …
Copying Files and Directories You can copy a file or a directory from one place to another using the cp command.
Files (and directories) might be located on several different file systems. You can use symbolic links to link files that …
You can create new files and directories within the directory hierarchy using the touch and mkdir commands. The touch …
You can use the mv in linux command to: Move files and directories within the directory hierarchy Rename existing files …
You can permanently remove files and directories from the directory hierarchy. You can use the rm command to remove files …
Using the Shell Metacharacters Bash shell metacharacters are specific characters, generally, symbols, that have special …
Introducing Korn Shell Variables A variable refers to a temporary storage area in memory. Variables contain: Information …
Working With Directories You can use various commands to display the current directory, view the contents of a …
In some situations or environments, there may be a requirement to configure the rsyslog service to log to a different …
Question How to copy user privileges from one MySQL server to another, including: between different versions without …
Introduction What is the Advanced Intrusion Detection Environment (AIDE) utility? AIDE is a small, yet powerful, …
Routing is normally configured on routing devices, for example, your standard gateway, however if persistent routers are …
Since ocfs2-1.8, global heartbeat feature is available. Earlier versions of OCFS2 had its own heartbeat for each mounted …
This post provides information on how to set or retrieve the CPU affinity of running processes. The …
The purpose of implementing a YUM server is to have a centralized repository of packages/rpms. Also, the main motive …
There are several ways in which a user can be added to a Linux Operating System. Here, we discuss the 7 most commonly …
Dynamic Host Configuration Protocol (DHCP) As the name suggests, DHCP is used to control the network configuration of a …
This post will explain how to configure iSCSI target and Initiator configuration in CentOS/RHEL 7. iSCSI is an Internet …
A Network Bridge is a link-layer device that forwards traffic between networks based on MAC addresses. It learns what …
This post outlines the steps to remove the stale SCSI device from Linux OS without rebooting the server. This topic …
Using Online Documentation The Linux/UNIX OS provides online manual pages, which describe commands and their usage. …
Constructing and Executing Commands From a Command Line You can use the UNIX system commands to instruct the system to …
I would like to share some useful commands for daily use. Here are some examples. Find command AND Operator By default …
Transport Layer Security(TLS) Transport Layer Security (TLS) is a method for encrypting network communications. TLS is …
Dynamic Content Most modern websites do not consist of purely static content. Most content served out is actually …
System integrity is put at risk when configuration files are deleted or modified without authorization or careful …
Introduction To Apache HTTPD Apache HTTPD is one of the most used web servers on the Internet. A web server is a daemon …
In this post, we will learn how to configure Apache httpd to provide IPbased and name-based virtual hosts. Virtual Hosts …
This post explains how to display, change, and switch target(runlevel) in systemd on a CentOS/RHEL 7 machine. Display …
Question: How to rotate systemd-journald log under /var/log/journal/*/ or /run/log/journal/*/? journald logs can be …
The vxdmpadm utility is a command line administrative interface to the DMP feature of VxVM. You can use the vxdmpadm …
Creating a Backup It is very important to back up MariaDB databases, and databases in general. The database often …
Creating User Accounts with MariaDB By default, MariaDB handles authentication and authorization through the user table …
In this post, we will learn to examine, search, create, and change database information using Structured Query Language …
Relational Databases A relational database is a mechanism that allows the persistence of data in an organized way. …
What Is SMB? Server Message Block (SMB) is the standard file-sharing protocol for Microsoft Windows servers and clients. …
In this post, we will learn how to mount an SMB share with the multiuser mount option, using password-based …
When used in shell scripts, functions are a way of isolating a segment of code so that it can be called repeatedly …
Users can add as many elif clauses as they want into an if/then/elif/then/else statement to test as many conditions as …
One place where environment variables are used is in initializing the bash environment upon user login. When a user logs …
The shell and scripts use variables to store data; some variables can be passed to sub-processes along with their …
Introduction To ISCSI The Internet Small Computer System Interface (iSCSI) is a TCP/IP-based protocol for emulating a …
What is NFS? The Network File System (NFS) is a network file system commonly used by UNIX systems and network-attached …
The NFS protocol transmits data in clear text over the network. Furthermore, the server relies on the client to identify …
Simple shell scripts represent a collection of commands which are executed from beginning to end. Conditional structures …
In this post we will explain how to configure a secure, caching nameserver using the unbound DNS server. Caching Name …
In this post, we will outline steps to configure a CentOS/RHEL 7 server to transmit all emails through an …
Postfix is a powerful but easy-to-configure mail server. It is the default mail server in Red Hat Enterprise Linux 7. …
To ensure that scripts are not easily derailed by unexpected conditions, it is good practice for script authors to not …
Every command returns an exit status, also commonly referred to as return status or exit code. A successful command …
While user-defined variables provide a means for script authors to create containers to store values used by a script, …
In this troubleshooting post, we will exaplin: Usage of dig command to troubleshoot common DNS problems. Identify …
Postfix is a powerful but easy-to-configure mail server. It is the default mail server in CentOS/RHEL 7. Postfix is …
Many simple day-to-day system administration tasks can be accomplished by the numerous Linux command-line tools …
Inevitably, administrators who write, use, or maintain shell scripts will encounter bugs with a script. Bugs are …
System administrators often encounter repetitive tasks in their day-to-day activities. Repetitive tasks can take the …
As the complexity of a shell script increases, it is often helpful to make use of variables. A variable serves as a …
Aside from variable expansion, the Bash shell offers several other types of shell expansion features. Of these, command …
This post touch bases upon: Explain the hierarchical structure of the Domain Name System (DNS). Differentiate between …
In this post, we will touch base on how to configure more complex firewall configurations using firewalld’s support …
Network Address Translatiob(NAT) firewalld supports two types of Network Address Translation (NAT): masquerading and …
This guide is intended to show a new user the capabilities of the ZFS snapshots feature. It describes the steps …
Selinux Port Labeling SELinux does more than just file and process labeling. Network traffic is also tightly enforced by …
firewalld Overview firewalld is the default method in CentOS/RHEL 7 for managing host-level firewalls. Started from the …
In this post, we will touch base on the basic concepts of IPv6 addresses and networking. IPv6 Overview IPv6 is intended …
This post outlines steps to configure and troubleshoot local software bridges and associated interfaces. Software Bridges …
If there are problems during the starting of services, there are a few tools available to system administrators that can …
This post will touch base on how to configure IPv6 networking using nmcli and configuration files in the …
In this post, we will outline the steps to combine two network links using network teaming to provide link redundancy or …
In this post we will explore the IPv4 networking using nmcli and configuration files in the …
In the last post, we have seen how to configure the network teaming in CentOS/RHEL 7. In this post, we will see the …
What is a systemd Target In SysVinit systems, you had a defined but configurable set of runlevels numbered from 0 to 6.
Recovering the** root** password is a trivial task while still logged in as an administrator or a user with full sudo …
System startup and server processes are managed by the systemd System and Service Manager. This program provides a …
In most of your current architectures, you probably separate your Web Server from your Database (virtual) server. This …
Containers enable you to package an application with all the components it needs, such as libraries and other …
A number of factors affect how IP forwarding and routing is configured at boot time. Prior to Solaris 10, IPv4 …
Question: Is it possible to limit yum so that it lists or installs only security updates? How to patch the system only …
Running out of disk space and having to provision new storage is something that cannot be overlooked in infrastructure …
Unlike growing the filesystem, reducing the filesystem should be practiced carefully. In the example below, we will see …
The Problem Not able to drop or rename a tablespace which is having junk characters in the name. For example:
SELinux Modes SELinux can either be in an enabled or a disabled state. In order to check in which state it is running, …
The uniq command can be used to remove the duplicate lines from a text file in Linux or Unix. The duplicate lines should …
Filesystem alert! We all hate to get full-filesystem alerts, especially at quitting time on Friday when the developers …
Network File System (NFS) is one of the native ways of sharing files and applications across the network in the …
ln is the Linux command that allows you to create links. For understanding purposes, you can compare this to the windows …
Docker is OS-level virtualization software for developers and sysadmins, the beauty of docker is that it creates an …
Rootsh is a tool from which you can log your user activity in plain-text, so all the activities that are performed by …
The Ask The directory/file ownership and permissions are getting changed by unknown users. How can we track these …
Question: We have forgotten the MySQL database root password. How can we reset it? MySQL stores all its username and …
Question: How to hide commands typed in a Linux terminal? How to make passwords invisible while they are typed in Linux …
The Linux file system is distinct from the file systems of other operating systems because of the various file types. …
The term tty is short for teletypewriter, the terminal device that UNIX was first run from. The tty command writes to …
In Linux there are many methods by which a user can locate files and directories. Two of the most popular utilities for …
As a user of a system, to access a file in Linux and UNIX, it is important that a user has the required permission for …
The /var/tmp directory is made available for programs that require temporary files or directories that are preserved …
This post aims to provide basic oracle database interview questions for the Datafile Autoextend feature. 1. How to know …
VCS Operations Task Command Start VCS hastart Start VCS stale hastart -stale Force start VCS hastart -force Start VCS on …
The rm command is used to remove (delete) files and directories in Linux. rm (remove) deletes a file permanently, and …
Linux includes two commands that you can use to delete files and directories: rm (remove) and rmdir (remove directory). …
The post dives into the basics of SMCO (Space Management Coordinator) Background Process in Oracle 11g and how to enable …
CentOS/RHEL 6 and earlier versions, were mounting the filesystems in an order defined in the file /etc/fstab. But the …