Featured »

March 2, 2022 – 2:00 pm

Books have been written on the subject of awk and sed. Here’s a small sample of commands I put together over the years that are useful for everyday system administration tasks. Most of these tasks …

Read the full story »
Networking

Unix and Linux network configuration. Multiple network interfaces. Bridged NICs. High-availability network configurations.

Applications

Reviews of latest Unix and Linux software. Helpful tips for application support admins. Automating application support.

Data

Disk partitioning, filesystems, directories, and files. Volume management, logical volumes, HA filesystems. Backups and disaster recovery.

Monitoring

Distributed server monitoring. Server performance and capacity planning. Monitoring applications, network status and user activity.

Commands & Shells

Cool Unix shell commands and options. Command-line tools and application. Things every Unix sysadmin needs to know.

Home » Archive by Category

Articles in Data

Create ISO Images

October 2, 2015 – 5:56 pm
barrels

The genisoimage has been around for a few years, but is relatively little-known. It is a pre-mastering program to generate ISO9660/Joliet/HFS hybrid filesystems and is particularly good for creating portable data backups. Here are a …

Removing Metadata from Images

September 8, 2015 – 12:09 pm
binoculars watch security rifle gun

Phones and cameras record a surprising amount of personally-sensitive information with the photos they create. This data includes timestamps, GPS coordinates, software used to process the images and lots of other details you may not …

Extending Swap on LVM2 Logical Volume

May 7, 2015 – 11:16 am
hard-disk_00416535

To grow swap on LVM you will need to temporarily disable the swap LV. This will leave without swap space, which may upset some applications (Oracle). So the first step should be to set up …

Login Monitor

March 6, 2015 – 12:02 am
dont_panic

Sometimes after a couple of beers I start feeling paranoid. I make sure the door is locked and check my firewall logs. Here’s a very basic script to monitor your server’s login record and notify you about …

Ad-Hoc Analysis of /var/log/secure

February 28, 2015 – 9:41 pm
keys_security_lock_01

The /var/log/secure contains a record of authentication and authorization activity on the system. It can be an invaluable resource for the purposes of intrusion detection and prevention. Below are a few simple examples that show how …

Late Night Rant #24: North Korean Internet

December 22, 2014 – 8:05 pm
North_Korea-Pyongyang-Computer_class_at_a_school-01

Today was the day the North Koreans would have learned they had the Internet and the Americans DDOSed it. Unfortunately, they had no Internet, poor bastards. But, as long as this keeps us entertained… Hey, …

Late Night Rant #23: Kim The Sony-Slayer

December 17, 2014 – 10:09 pm
OLYMPUS DIGITAL CAMERA

Sony execs are shedding crocodile tears over the latest IT security breach that brought substantial financial losses to the company. Let’s not dwell on the trivial: who did it and why are irrelevant technicalities. How …

VSFTPd, SSL, and Firewalls

December 5, 2014 – 1:58 pm
network switch

If you ever wanted to configure SSL/TLS encryption for an FTP server behind a firewall, the “Google wisdom” ranges from “a major pain” to “can’t be done”. Fortunately, things are not all that bad. In …

Filesystem Syncronization with Lsyncd

November 15, 2014 – 3:05 pm
poi002

Lsyncd monitors a local filesystem for changes and mirrors those changes to a filesystem on a remote server. The advantage of lsyncd over rsync is the former’s ability to detect filesystem changes without having to re-scan …

Resizing Hitachi VSP LDEVs (LUNs)

October 23, 2014 – 2:06 pm
technology-hard_00400654

Resizing Hitachi VSP LUNs (aka LDEVs) is a quick and simple task. Unfortunately, due to Hitachi Storage Navigator’s archaic design, the LDEV resize function, while easy to use, is not easy to find. So, here’s …

Adding Swap with Solaris 11 ZFS

October 22, 2014 – 4:24 pm
HP-Greets-IBM-2

With the swap partition residing on a ZFS filesystem, you have an easy way of adding swap on the fly. Reducing swap is not quite so simple, but we’l talk about that later. To check …

Rescanning New LUNs on VNX

October 16, 2014 – 10:49 am
hard-disk_00416535

Just a quick background of the little problem I ran into with our VNX: after creating a couple of LUNs for the mapped file pool using Unisphere, I clicked “Rescan Storage Systems” and got “This …

Remove Duplicate IPTables Rules

September 24, 2014 – 6:26 pm

Duplicate entries may appear in your iptables configuration due to parallel efforts of various network security-related applications that may be running on your server. In most cases, having duplicate iptables rules is no big deal, …

Free Rescue CDs for Windows

October 5, 2013 – 11:32 am
cd_dvd_001

This is just a quick summary of the more popular rescue CDs out there. All of these are Unix-based bootable ISOs. Some are available as self-burning EXE files, which may be useful if you don’t …

Celerra NFS/CIFS Mixed Permissions Mode

September 17, 2013 – 11:21 am
symm001

This is a quick reminder on how to configure a Celerra filesystem for dual NFS/CIFS access where Windows-side permissions would translate correctly to the NFS side. By default, Celerra datamover will mount filesystems in “Native” mode. In this case, a file or folder created by a Windows user via the CIFS share will take on the default Unix permissions on the NFS side: 755 for folders and 644 for files.

Dealing with Full Filesystems

June 25, 2013 – 11:03 am
hard drive disk

Filled up filesystems is a recurring condition eating up sysadmin time on a regular basis. Some studies show that filesystems running out of space are responsible for most day-to-day issues handled by IT departments. Disk …

Quickly Grow EMC Celerra Filesystem

June 21, 2013 – 11:22 am
grow001

As we all know, Celerra and its kin can get a bit annoying with their “filesystem over 90%” warning emails. Enabling the “autoextend” feature for the filesystems is one option, but if you are a control …

Secure Data Destruction for Unix

February 21, 2013 – 11:45 pm

What is secure computer data destruction? Simply put, securely-deleted data cannot be recovered by any known technique. But when it comes to data security, things are rarely simple. New data recovery methods are developed every …

Filesystem Performance Testing Using dd

February 5, 2013 – 3:35 pm
Shell Script

Below is a simple script to test filesystem read/write performance using dd with varying blocksize parameter. This can be useful for testing local filesystems as well as network-mounted filesystems. The end result will be a …

Quick BTRFS Test on OpenSuse 12.2

December 13, 2012 – 11:08 am
chameleon_01

The recent announcement from Suse Enterprise Linux that Btrfs was production-ready raised some suspicions. The last time I tested btrfs (not very long ago) the primary issues were excessive CPU utilization and filesystem space that seemed to disappear into nowhere. So, as a quick test, I put together an OpenSuse 12.2 (3.4.6-2.10-desktop, OpenSuse 12.2) 64-bit VM (ESX) with one dual-core vCPUs, 4GB RAM, the OS disk and a 6GB striped LVM filesystem consisting of 4 4-GB virtual disks.

System Recovery: Useful Tools

October 18, 2012 – 9:48 pm

The following is a brief collection of open-source and/or free tools I regularly use for various system recovery tasks. If the servers you work with have CD drives, I would recommend burning these images onto a CD or DVD. This would save you the trouble of messing with the boot options in the BIOS. More advanced versions of BIOS can mount remote ISO images and boot from those. In most cases, however, this approach requires using the dreaded Internet Explorer an requires Windows.

Searching Large Network-Mounted Filesystems

October 16, 2012 – 4:14 pm
shell

Recently I ran into a small problem: I needed to find recently-modified files in a very large NFS filesystem. One of the high-level folders contained dozens of sub-folders with thousands of files in each. There is a significant performance penalty associated with placing such directory structures on network-mounted filesystems. Running the “find” command at the top of the filesystem would have taken over an hour and the problem here was not available bandwidth, but the time it takes for the “find” to request and receive attribute information for each folder and file.