There are many ways to create fixed partitions on hard drive. Most people prefer fdisk command to create partitions. In following example we have one hard drive /dev/xvdb. Our aim is to create three partitions on this disk of size 200 MB Read More …
Category: Linux
Removing Software RAID Volumes
Consider following RAID-1 System. The target is to un-mount the drive and safely remove the partitions. The partitions are as under First un-mount the volume if it is mounted and then use the -S option with mdadm command as below. After Read More …
Managing Software RAID
Management of Software RAID basicaly involves adding and removing the faulty and failed drives from the array. To understand better consider following example. In above example, the drives /dev/xvdb1, /dev/xvdb5, /dev/xvdb6 seems to be clean and healthy. This is RAID Drive, it Read More …
Building Software RAID
If you do not have any hardware raid controller card then you can build your own software raid using mdadm package in Linux. Below are the steps. 1. Check RAID Volumes using following command. The above command show that there is no Read More …
Extending XFS File Systems
In order to extend the XFS file system, you have to first modify the file system with new size as given below. 1. In our example the initial size of drive was 1 GB and we are going to extend Read More …
Understanding XFS File System
XFS is a high-performance 64-bit journaling file system created by Silicon Graphics, Inc in 1993. The file system was ported to the Linux kernel in 2001. Currently, XFS is supported by most Linux distributions, some of which use it as Read More …
Introduction To Linux File Systems
Linux supports a number of different file systems. A file system–internal data structure that assures all the data on disk is properly organized and accessible. Almost every file system has its own structure of metadata, which is partly why the Read More …
Squid Proxy Server : NCSA Authentication Implementation
Suppose you want to implement Authentication in Squid Proxy Server so that people should be prompted for valid User Name and Password, before they start browsing. This can be done using following simple steps.. 1. You need some program which Read More …
Squid Proxy Server : Access Control List Explained
Suppose you want to restrict access to gmail.com and facebook.com via Squid. Using dstdomain directive you can restrict the access to these sites. But make sure that these lines should be at top of the file. The general deny policy Read More …
Squid Proxy Server : Installation & General Configuration
Below are the steps to install and configure Squid Proxy Server ! 1. Check the installation of Squid Server. # yum list squid If it is not there then install # yum install squid -y . 2. Enable to start Read More …