by Karthikeyan Sadhasivam
on March 18, 2015
In an active-standby Linux cluster configuration, all the critical services including IP, filesystem will failover from one node to another node in the cluster.
This tutorials explains in detail on how to create and configure two node redhat cluster using command line utilities.
The following are the high-level steps involved in configuring Linux cluster on Redhat or CentOS:
[continue reading…]
by Karthikeyan Sadhasivam
on February 24, 2015
To add something to the LDAP directory, you need to first create a LDIF file.
The ldif file should contain definitions for all attributes that are required for the entries that you want to create.
With this ldif file, you can use ldapadd command to import the entries into the directory as explained in this tutorial.
[continue reading…]
by Luke P. Issac
on February 23, 2015
Using cloud computing, we can access various business and consumer applications as tools or utilities over the internet.
It allows us to create, modify and customize the business applications online.
Cloud computing can be broadly classified into the following two models:
[continue reading…]
by Karthikeyan Sadhasivam
on February 18, 2015
If you are working on Hadoop, you’ll realize there are several shell commands available to manage your hadoop cluster.
This article provides a quick handy reference to all Hadoop administration commands.
[continue reading…]
by Luke P. Issac
on February 17, 2015
JMeter is a desktop application that can be used to perform functional testing and load testing.
While the JMeter application itself is designed as pure Java application, it can be used to perform load testing of any kind of web application, including those that are written in PHP, .NET, etc.
[continue reading…]
by Santosh Yadav
on February 12, 2015
In C and C++ programming, pointers are very powerful.
As we explained in C pointers example article, pointers are variables that hold address of another variable so that we can do various operations on that variable.
Sometimes a programmer can’t imagine writing a code without using pointers, whether it is a simple binary search tree program, or a complex enterprise application.
But, pointers are hard to manage, master, and they can cause many problems if not handled properly.
For example, when not properly used, it can cause core dumps, dangling pointer, null pointer exception, memory leaks, etc.
[continue reading…]
by Karthikeyan Sadhasivam
on February 11, 2015
HPSA stands for HP Server Automation.
HPSA is used to bring entire server infrastructure (both physical and virtual) under one management to gain full visibility to all your servers and operations.
It can handle multiple server management activities including provisioning on bare metal, software management, patch management, audit remediation, security management,etc.
This article explains major features within SA that can be used to automate your datacenter management.
[continue reading…]
by Karthikeyan Sadhasivam
on February 10, 2015
In our previous article of Linux KVM series, we explained how to Install Linux KVM and create a Guest VM.
But, once you’ve created a Guest VM, you need to know how to perform some of the routine maintenance activities on the VM.
This tutorial will explain how to perform the following Linux KVM VM activities:
- Add Memory to VM
- Add vCPU to VM
- Add Disk to VM
- Save VM Configuration
- Delete a VM
[continue reading…]