Interview Questions on Red Hat Cluster with Answers
How can you define a cluster and what are its basic types? A cluster is two or more computers (called nodes or members) that work together to perform a task. There are four major types
How can you define a cluster and what are its basic types? A cluster is two or more computers (called nodes or members) that work together to perform a task. There are four major types
The so called term used "command" is basically a binary file. If you try to read any of those files using any editor then you won't understand any thing as it is not human readable.
Before starting with the steps to configure a clusterd samba share using ctdbb you must be aware of High Availability Cluster and it's architecture. As of the Red Hat Enterprise Linux 6.2 release, the Red
In my last article I had shown you steps to create iscsi-target using openfiler. So in this article I will be showing you step by step method to delete an iscsi-target from openfiler. This is
SSH supports a variety of ways of moving data across psuedo-VPN tunnel. One of the methods is Port Forwarding which creates a secure connection between a local computer and a remote machine through wich data
Error: # ssh-copy-id root@192.168.1.11 /usr/bin/ssh-copy-id: ERROR: No identities found Solution: You will have to manually define the path of the public key using -i switch as shown below # ssh-copy-id -i .ssh/id_rsa.pub 192.168.1.11 root@192.168.1.11's password:
VI editor can sometimes be very tricky and irritating if you are not fully aware of those small arguments which could make your life much easier while working on the editor. One such thing when
In this article I will try to explain all the events which happens in the background after your Linux machine boots up and you make an attempt to login into the console. In my