In the first part, we explained in detail on how to install and configure 2 Node RedHat Cluster.
We covered the following high-level steps in the previous tutorial:
- Install and start RICCI cluster service
- Create cluster on active node
- Add a node to cluster
- Add fencing to cluster
- Configure failover domain
- Add resources to cluster
In this tutorial, we’ll cover the following high-level steps to finish the cluster setup:
In an active-standby Linux cluster configuration, all the critical services including IP, filesystem will failover from one node to another node in the cluster.
This tutorials explains in detail on how to create and configure two node redhat cluster using command line utilities.
The following are the high-level steps involved in configuring Linux cluster on Redhat or CentOS:
To add something to the LDAP directory, you need to first create a LDIF file.
The ldif file should contain definitions for all attributes that are required for the entries that you want to create.
With this ldif file, you can use ldapadd command to import the entries into the directory as explained in this tutorial.
Using cloud computing, we can access various business and consumer applications as tools or utilities over the internet.
It allows us to create, modify and customize the business applications online.
Cloud computing can be broadly classified into the following two models:
If you are working on Hadoop, you’ll realize there are several shell commands available to manage your hadoop cluster.
This article provides a quick handy reference to all Hadoop administration commands.
JMeter is a desktop application that can be used to perform functional testing and load testing.
While the JMeter application itself is designed as pure Java application, it can be used to perform load testing of any kind of web application, including those that are written in PHP, .NET, etc.
In C and C++ programming, pointers are very powerful.
As we explained in C pointers example article, pointers are variables that hold address of another variable so that we can do various operations on that variable.
Sometimes a programmer can’t imagine writing a code without using pointers, whether it is a simple binary search tree program, or a complex enterprise application.
But, pointers are hard to manage, master, and they can cause many problems if not handled properly.
For example, when not properly used, it can cause core dumps, dangling pointer, null pointer exception, memory leaks, etc.
HPSA stands for HP Server Automation.
HPSA is used to bring entire server infrastructure (both physical and virtual) under one management to gain full visibility to all your servers and operations.
It can handle multiple server management activities including provisioning on bare metal, software management, patch management, audit remediation, security management,etc.
This article explains major features within SA that can be used to automate your datacenter management.