The fact that I can plant a seed and it becomes a tree, share a bit of knowledge and it keeps growing
Pages
▼
Install AD on Server 2008
This
tutorial will explain how to install AD on server 2008. This will valid for
windows 2008 R2 as well.
Requirement:
Minimum:
Single processor with 1.4 GHz (x64 processor) or 1.3GHz (Dual Core)
Minimum:
512 MB RAM
Minimum
Hdd: 32 GB or greater
- The first step is to assign a ip to the server that you going to deploy the AD. Its nessary to install it as DNS server too. So its better to have fixed ip it doesn't mean you cannot install AD without fixed ip address but it will solve lot of issues if you used fixed ip
In here the server ip is 10.0.0.14. Since we going to make it as DNS server too you should use the same ip as the preferred DNS server.
Mysql list databases
Mysql list databases
mysql is a simple command-line tool. mysql is command line and it is very easy to use. Invoke it from the prompt of your command interpreter as follows:$ mysql
Output:
mysql>
You may need to provide mysql username, password and
hostname, use:$ mysql
--user=your-user-name --password=your-password
mysql>
To list database type the following command
mysql>
show databases;Monitoring MySQL
Monitoring MySQL
Monitoring MySQL servers is no rocket science provided you know what to monitor. MySQL gives a comprehensive list of variables to check your server’s health and performance. Let me walk you through the crucial variables you should be monitoring. Lets assume that you have one or more MySQL servers, which have been setup and running fine. Here are the top 10 things to monitor on your MySQL.
NOTE:- Most of the commands run on mysql prompt ( mysql>) to go to mysql prompt check the 1 post intalling MYSQL some in bash shell (#)....
1. MySQL availability
Yes, this is the first thing you should be looking at! It would not make sense to monitor your MySQL if its not even available. MySQL downtime is simply not acceptable in production. At the same time ensuring zero downtime does not guarantee maximum performance.You can execute
Configuring MYSQL
Configuring MYSQL
Requirements
Explanation of requirements.
- MySQL and MySQL-server installed on a Centos 5.x system
- DBA access rights to MySQL on a Centos 5.x system
Doing
the Work
Basic description of what will be
done and what is expected.
- Database file locations:
In Centos 5.x the location where the raw uncompressed MySQL
databases are stored is: /var/lib/mysql
- Users and DBA’s (Database Admins) create, delete, manipulate:
Installing MYSQL
How to installing MySQL server on CentOS 5 x64
-
1. Login as root user to server.
2. Execute following commands from
shell:
# yum install mysql mysql-server
mysql-devel
This command will check system configuration and calculates the dependencies required to run Mysql. It will display the list of packages need to be installed and in the end:
……
Total download size: 35 M
is this ok [y/N]: y
Press ‘y’ like above. This will install mysql server and mysql client on your machine.
This command will check system configuration and calculates the dependencies required to run Mysql. It will display the list of packages need to be installed and in the end:
……
Total download size: 35 M
is this ok [y/N]: y
Press ‘y’ like above. This will install mysql server and mysql client on your machine.
Repairing a Corrupted Table In Mysql
Repairing a Corrupted Table In Mysql
A Table name aggregator_item.MYI got corrupted in database name rnmbase. we will now repair the Table so that replication work fine.
ERROR: - reports error in replication: Error 'Incorrect key file for
table './rnmbase/aggregator_item.MYI'; try to repair it' on query. Default
database: 'rnmbase'.
Solution:-
Stop mysql instance where the
replication error came
# service mysqld stop
MYSQL REPLICATION ERROR 1053
MYSQL ERROR 1053
ERROR:-
Query partially completed on the master (error on master: 1053) and was
aborted. There is a chance that your master is inconsistent at this point. If
you are sure that your master is ok, run this query manually on the slave and
then restart the slave with SET GLOBAL SQL_SLAVE_SKIP_COUNTER=1; START SLAVE;
The error code 1053 which means as much as
"server shutdown".
Backup Script
Backup Script
This backup script will backup /root directory to /backup directory. You can change the source and destination according to your wish. Once the backup is over the report will be mailed.
# mkdir /backup
# cd /backup
# vi backup.sh
When Host Your Own Website
Introduction
Web sites have proliferated greatly
over the years to become a part of everyday life for many people. People use
them to create Web logs of their daily lives, provide family members with a
place to store their memories or to tell people of their experiences in getting
things to work. The following is a typical Web site address:
www.ittables.com
Businesses originally used them
primarily as a marketing tool, but later expanded them to become an important
part of their operations. Many companies rely almost exclusively on their Web
sites to sell their products and provide both customer and supplier support
services.
The decision as to whether or not to
host your own Web site can be difficult. You have to consider factors of cost
and convenience as well as service and support. This chapter briefly addresses
the most common issues and outlines the simple network architecture for use in
a small office or home.
Not all homes require a Web site,
but the process of establishing one touches many aspects of not only Linux, but
information technology as well. This is about to setting up Linux servers to do
the things that most businesses and homes need. It's about getting the job
done.
Understanding OSPF Neighbor Relationship
The neighbors only forms between routers in the same area.
First thing that happens when ospf forms
neighbor as you start the ospf process and the router will determine its own
router id
Now lets talk about how OSPF neighbor relationship forms
Step 1. Determin
your own Router ID.
·
The router id is simply the router’s name in the
ospf process.
The router-id will be:
·
Highest active interface ip address when ospf
starts ( loopback beat physical interfaces)
The name is just an identifier for the router
As we get into the advance configuration of ospf
that we really need to know the names of your router, there’s some configuration that you will be
typing in that tie directly to the names
Here’s the example
Here's the router down here, it has three
interfacesFTP Configuration
FTP (File Transfer Protocol)
FTP, the File Transfer Protocol,
is one of the original network applications developed with the TCP/IP protocol
suite. It follows the standard model for network services, as FTP requires a
client and a server , the first implementations of FTP date back to 1971.
FTP set out to solve the need to
publish documents and software so that people could get them easily from other
computer systems. On the FTP server, files were organized in a directory
structure; users could connect to the server over the network ,and download
files from (and possibly upload files to) the server.
The
Very Secure FTP Server (vsFTPd) is the only FTP server software included in the
Red Hat Linux distribution , vsFTPd is becoming the FTP server of choice for
sites that need to support thousands of concurrent downloads. It was also
designed to secure your systems against most common attacks.
YUM Server
YUM
(Yellow dog Updater Modifed) Server
The Yellowdog
Updater, Modified (YUM) is an open-source command-line package-management utility
for RPM-compatible Linuxoperating systems and has been released under
the GNU General Public
License.
It was developed by Seth Vidal and a group of volunteer programmersYUM stands
for Yellow dog Updater, Modified because it is based on YUP,
the Yellow dog Updater. Yellow Dog is a version of Linux for the
Power Architecture hardware. YUP, and later YUM, were written by the Linux
community as a way to maintain an RPM-based system. If a package
installation or upgrade request is made and requires the installation or
upgrade of additional packages, YUM can list these dependencies and prompt
the user to install or upgrade them.
YUM
Server Requirements
1. vsftpd package to install rpm
packages within a network.
2. Dump location to copy the
contents from a RHEL CD or DVD ie.
/var/ftp/pub
3. deltarpm, python-deltarpm and
createrepo packages
4. Repository file.
Using RPM To Install Packages
RPM
What is Package ?
In the generic sense, an RPM
package is a container of files. It includes the group of files associated with
a specific program or application, which normally includes binary installation
scripts, as well as configuration and documentation files. It also includes
instructions on how and where these files should be installed and uninstalled.
What is RPM?
RPM is
a powerful software manager. It can install, remove, query, and
verify the software on your system.Rpm is more than a Red Hat specific tool. The
RPM Package Manager greatly simplifies the distribution, installation,
upgradation. And removal of software on RHEL systems.Software to be installed
using rpm is distributed through rpm package files, which are essentially
compressed archives of files and associated dependency information. Package files are named using
the following format:
SSH login alert via email
SSH login alert via email
So lets get started!
1. Login to your server and su to root,
2. cd /root
3. vi .bashrc
4. Scroll to the end of the file then add the following:
echo 'ALERT - Root Shell Access (YourserverName) on:' `date` `who` | mail -s "Alert: Root Access from `who | cut -d'(' -f2 | cut -d')' -f1`" you@yourdomain.com
Replace YourServerName with the handle for your actual server
Replace you@yourdomain.com with your actual email address
5. Save and Exit the File
6. Give Excute Permission (Check file permission section Click Here )
Now logout of SSH, close the connection and log back in! You should receive an email address of the root login alert a few minutes afterwards.
1. Login to your server and su to root,
2. cd /root
3. vi .bashrc
4. Scroll to the end of the file then add the following:
echo 'ALERT - Root Shell Access (YourserverName) on:' `date` `who` | mail -s "Alert: Root Access from `who | cut -d'(' -f2 | cut -d')' -f1`" you@yourdomain.com
Replace YourServerName with the handle for your actual server
Replace you@yourdomain.com with your actual email address
5. Save and Exit the File
6. Give Excute Permission (Check file permission section Click Here )
Now logout of SSH, close the connection and log back in! You should receive an email address of the root login alert a few minutes afterwards.