Check Software Raid On Centos Server' title='Check Software Raid On Centos Server' />Im building a 7disk RAID 6 array on a DELL MD3000 DAS box.My top priority is storage space, so Id like to use 2TB drives but Im worried about how long it will.I have two 500 GB disks and yesterday I mirrored first drive to the second one using software RAID 1.PC has now been on for 30 hours.Both disks say Resynching.In this guide well explain how to install and configure VNC Remote Access in latest release of CentOS 7 and RHEL 7 Desktop edition via tigervncserver program.Linux Interview Questions and Answers Part 2.What is the difference between service and process A process is any piece of software that is running on a computer.For example, your anti virus software runs in the background as a process, which was automatically started when the computer booted.Some processes start when your computer boots, others are started manually when needed.Some processes are services that publish methods to access them, so other programs can call them as needed.Printing services would be an example of a service type of process, where your email program can just call the print services process to say it wants to print, and the service does the actual work.How to view crond status If its show service is not found.Service crond restart.My clients are getting services from servers but how to know which client is using which service.Clients used ftp, nis, samba, apache, squid, nfs and mail services how to know how many users got service from server side with date, time and client system ip Mail server varlogmailmaillog Red.Hat,centosssh varlogsecure.Apache varloghttpaccess.How to FTP user access other directory except his own home directoryChrootlistenableyes.What are the Linux based security toolsSelinux.Firewalliptables.Tcp wrappers.What are the basic elements of firewall A firewall should be able to filter packets droppass them based on certain rules specified by the user.The rules may be used to identify an incoming packet to the computer or outgoing packet from the computer, it can be based on target port numberip add, traffic from a particular Network card etcThe firewall rules can be in a tabular form saved on the disk from where the firewall software can read them and implement it.Linux is a great example.What is a command to display top 1.How do find all failed login attempts via sshFailed.How do you configure Linux system as a router What is the UID and GID of root user Can a normal user can change the ownership of a file What is the command to change ownership of a file The root UIDGID is 0 zero.Which is why he can able to intervene in all normal users files even though he dont had permission.A normal user will dont have the permission to change ownership of file.The command to change ownership is lt chown user.What is the diff bw ext.Ext.There is really only one difference between ext.That makes ext.You dont have to check the filesystem after an unclean shutdown either.Ext.Metadata ie. internal filesystem structures are always journalled, so that the filesystem itself is never corrupted.How ordinary data is written to the file system is controllable, though.The default option is the ordered mode, which causes file contents to be written to the filesystem before metadata is even committed to the journal.The highest reliable mode is called the journal mode, which causes file data to be committed to the journal before it is flushed to its final place, like the metadata.The least reliable mode, but rumoured to be the fastest, is called the writeback mode, which makes no promises at all regarding the consistency of file data.Only metadata is output reliably in writeback mode.So as for anything else, its mainly a matter of priority.If you dont want ultimate speed, go with ext.If you need the highest speed that is theoratically aquirable though, then go with ext.For that to be effective youll probably need a really advanced hard drive controller, though.As the system administrator you need to review Bobs cronjobs.What command would you use Bob.What command is used to remove the password assigned to a group What are the different RAID levels RAID level 0 RAID level RAID level 1 RAID level 2 RAID level 3 RAID level 4 RAID level 5 RAID level 6 RAID level 1.RAID level 5. Microsoft Combat Flight Simulator 3 Windows 10 there. How do you create a swapfileMmkswap swapfileswapon swapfile.What does nslookup do Nslookup is a program used to find information about internet Domain Name server.The two modes of nslookup are Interactive and non interactive.Using interactive mode user can query the name servers for the information pertaining to hosts and domains.Using non interactive mode the user can just print the name and requested information of a host.What is the difference between UDP and TCP TCP is a Transmission Control Protocol.UDP is a User Datagram Protocol.There are four major differences between UDP and TCP 1.TCP can establish a Connection and UDP cannot.TCP provides a stream of unlimited length, UDP sends Small packets.TCP gurantees that as long as you have a connection data sent will arrive at the destination, UDP provides not guarantee delivery.UDP is faster for sending small amounts of data since no connection setup is required, the data can be sent in less time then it takes for TCP to establish a connection.What command do you run to check file system consistency Need to run fsck file system consistency check command to check file system consistency and repair a Linux UNIX file system.What is the command to remove Lvm ,Pv and vg.LVM lvremove lvname.VG vgremove vgname.PV pvremove pvname.How to create SAMBA server in fedora 9 Linux How to schedule cron backup to run on 4th Saturday of month 6 weekdaynum 4 sh backuptest.What is an inode The inode is referenced by its number.This is unique within a file system.The inode contains the metadata about files.Among the data stored in the inode is.File type.File permissions.Link count.User ID number of the file owner and the group ID number of the associated group.Last modification time.Location of the data on the hard disk.Other metadata about the filels li view inode number onlystat etcpasswd view inode details.How to see unallocated hard disk space on linuxdf h.How do u find remote machine operating system and version A v 1.How do you port scanning with netstat command Linux system monitoring Tools Process Activity Commandvmstat System Activity, Hardware and System Informationw Find out Who Is Logged on And What They Are Doing.Uptime Tell How Long the System Has Been Runningps Displays the Processesfree Memory Usageiostat Average CPU Load, Disk Activitysar Collect and Report System Activitympstat Multiprocessor Usagepmap Process Memory Usage.Linux Network monitoring Tools Network Statisticsiptraf Real time Network Statisticstcpdump Detailed Network Traffic Analysisstrace System CallsProc file system Various Kernel Statistics cat proccpuinfo cat procmeminfo cat proczoneinfo cat procmounts.Nagios Server And Network Monitoring.Cacti Web based Monitoring Tool.Gnome System Monitor Real time Systems Reporting and Graphing.What is mean by system calls A system call is the mechanism used by an application program to request service from the operating system.On Unix based and POSIX based systems, popular system calls are open, read, write, close, wait, exec, fork, exit, and kill.Cinderella Night Songs 1986 Download Youtube .Many of todays operating systems have hundreds of system calls.For example, Linux has 3.Free.BSD has about the same almost 3.Tools such as strace and truss report the system calls made by a running process.Important port no NFS 2.FTP 2.SAMBA 4. SSH 2.DNS 5.POP3 1. 10.IMAP 1.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |