skip to main
|
skip to sidebar
TECH NOTES JOURNEY THROUGH A DECADE
Sorry, the page you were looking for in this blog does not exist.
Sorry, the page you were looking for in this blog does not exist.
Home
Subscribe to:
Posts (Atom)
Visitor
Labels
Linux
(86)
Scripting
(34)
Virtualization
(19)
NMS
(16)
Server Provisioning
(15)
Performance
(13)
Solaris
(13)
Storage
(13)
Troubleshooting
(12)
Tips/Tricks
(10)
Windows
(9)
RHCE/RHCA
(8)
Linux Internals
(5)
Security
(5)
Apps
(4)
Cluster
(3)
Hardware
(3)
Ansible
(2)
AWS
(1)
Docker
(1)
Splunk
(1)
Blog Archive
▼
2022
(1)
▼
October
(1)
Build Custom AWS Config rules using Guard DSL
►
2019
(1)
►
February
(1)
►
2018
(2)
►
July
(2)
►
2014
(4)
►
October
(1)
►
September
(1)
►
March
(2)
►
2013
(8)
►
June
(2)
►
April
(1)
►
March
(1)
►
February
(2)
►
January
(2)
►
2012
(22)
►
November
(3)
►
September
(2)
►
August
(1)
►
July
(1)
►
June
(1)
►
May
(4)
►
March
(3)
►
February
(2)
►
January
(5)
►
2011
(37)
►
December
(1)
►
October
(3)
►
September
(2)
►
August
(1)
►
July
(2)
►
June
(5)
►
May
(7)
►
April
(5)
►
March
(6)
►
February
(3)
►
January
(2)
►
2010
(27)
►
December
(3)
►
October
(1)
►
September
(4)
►
August
(3)
►
July
(3)
►
June
(2)
►
March
(4)
►
February
(3)
►
January
(4)
►
2009
(33)
►
December
(2)
►
November
(1)
►
October
(2)
►
September
(2)
►
August
(1)
►
July
(1)
►
June
(2)
►
May
(3)
►
April
(6)
►
March
(13)
Subscribe To
Posts
Atom
Posts
All Comments
Atom
All Comments
Followers
Search This Blog
Popular Posts
Troubleshooting a high system CPU usage issue on Linux/Solaris
A Linux server has high %system CPU usage, following are steps to find the root cause of the issue and how to resolve it. Vmstat show %syste...
Create GPT partition for LVM using parted tool
Traditional MBR(MSDOS) disk label has limitation of 2^32 (2TiB) in capacity and 15 in partition numbers(including logical partitions), while...
Force puppet agent to regenerate certificate request
If puppet agent’s certificate is accidentally revoked or deleted, you can force agent to regenerate certificate request. In general, it is...
RHCS(Red Hat Cluster Suite) quorum disk
The last post " RHCS I/O fencing " is about dealing with split-brain situation, in which cluster members lost heartbeat communicat...
Use script to fetch URL protected by NTLM authentication.
Windows IIS server use NTLM authentication, the following show three methods -wget, curl, and Perl- to download URL protected by NTLM. wget ...
How to generate core dump for an application in Linux
In order to troubleshoot application issue, a process content in memory can be dumped to a file and then the file can be analysed with debug...
Fix curl client certificate error: curl: (58) unable to set private key file
I used curl to post xml payload to a web service by client certificate authentication. It worked fine Linux(curl 7.15.5 (x86_64-redhat-li...
Authenticate Linux users by Windows AD: LDAP+Kerberos or Winbind method
Authenticating Linux users by Windows AD has become popular in many organizations for the convenience of centralized account management. It ...
Regular expression in condition statement, the ksh and bash examples
Ksh has better regular expression support than bash bash has = to support Basic regular expressions and its result is exact match bash has =...
Zabbix VS Zenoss
Zenoss was my favourite network monitoring tool, But it is Zabbix now. The conclusion was made after comparing Zenoss 3.0.3 to Zabbix 1.8....