Tuesday, September 13, 2011

IBM Blade Center H : Blade Firmware Hang

If you found this symtomp at your blade server :

1. amber led alert at blade
2. keyboard is blinking
3. server cannot be accessed

You have to follow these steps :

1. Force shutdown
2. Reboot the server
3. During post message, press F2 to enter "Diagnostics"
4. Run the DSA
5. After finish, check to "Report Highlights", major error will be listed like below image :



Solution :

1. Need to update the firmware
2. Download from IBM support, the firmware is called as BOMC
3. Put the firmware into the usb drive
4. Reboot the server and press F12 to choose the boot media.
5. Choose boot from usb
6. Firmware installation will be boot up.
7. Choose to update all firmware.
8. After finish,reboot is required.
9. Solved

DB2 Backup Failure : Hard Disk Is Full

If you found this SQLCA Information like this after running "db2 list history backup all for (db_name)". This means that the root cause is hard disk if already full.

====================================================================================

SQLCA Information

sqlcaid : SQLCA sqlcabc: 136 sqlcode: -2419 sqlerrml: 37

====================================================================================

DB2 Backup Status Indicator

This info is generated when running "List History Backup All For (db_name)"

===========================================================================

Comment: DB2 BACKUP ABCD ONLINE
Start Time: 20060823230001
End Time: 20060824001941
Status: A

===========================================================================

A : Active
I : Inactive
E : Expired
D : Deleted


Referrence : http://bytes.com/topic/db2/answers/527376-list-history-backup-status

How To Check DB2 Backup History

Follow these steps in terminal :

1. su - db2inst1
2. . ./sqllib/db2profile
3. db2 list history backup all for (db name)

Example : db2 list history backup for all user_db

Friday, September 9, 2011

How to Configure Sudo And Adding Users To Wheel Group

Configuring sudo and adding users to Wheel group

If a server needs to be administered by a number of people it is normally not a good idea for them all to use the root account. This is because it becomes difficult to determine exactly who did what, when and where if everyone logs in with the same credentials. The sudo utility was designed to overcome this difficulty.

With sudo (which stands for "superuser do"), you can delegate a limited set of administrative responsibilities to other users, who are strictly limited to the commands you allow them. sudo creates a thorough audit trail, so everything users do gets logged; if users somehow manage to do something they shouldn't have, you'll be able to detect it and apply the needed fixes. You can even configure sudo centrally, so its permissions apply to several hosts.

The privileged command you want to run must first begin with the word sudo followed by the command's regular syntax. When running the command with the sudo prefix, you will be prompted for your regular password before it is executed. You may run other privileged commands using sudo within a five-minute period without being re-prompted for a password. All commands run as sudo are logged in the log file /var/log/messages.


The sudo configuration file is /etc/sudoers. We should never edit this file manually. Instead, use the visudo command: # visudo

This protects from conflicts (when two admins edit this file at the same time) and guarantees that the right syntax is used (the permission bits are correct). The program uses Vi text editor.

All Access to Specific Users
You can grant users bob and bunny full access to all privileged commands, with this sudoers entry.
user1, user2 ALL=(ALL) ALL
This is generally not a good idea because this allows user1 and user2 to use the su command to grant themselves permanent root privileges thereby bypassing the command logging features of sudo.

Access To Specific Users To Specific Files
This entry allows user1 and all the members of the group operator to gain access to all the program files in the /sbin and /usr/sbin directories, plus the privilege of running the command /usr/apps/check.pl.
user1, %operator ALL= /sbin/, /usr/sbin, /usr/apps/check.pl

Access to Specific Files as Another User
user1 ALL=(accounts) /bin/kill, /usr/bin/kill, /usr/bin/pkill

Access Without Needing Passwords
This example allows all users in the group operator to execute all the commands in the /sbin directory without the need for entering a password.
%operator ALL= NOPASSWD: /sbin/

Adding users to the wheel group
The wheel group is a legacy from UNIX. When a server had to be maintained at a higher level than the day-to-day system administrator, root rights were often required. The 'wheel' group was used to create a pool of user accounts that were allowed to get that level of access to the server. If you weren't in the 'wheel' group, you were denied access to root.

Edit the configuration file (/etc/sudoers) with visudo and change these lines:
# Uncomment to allow people in group wheel to run all commands
# %wheel ALL=(ALL) ALL

To this (as recommended):

# Uncomment to allow people in group wheel to run all commands
%wheel ALL=(ALL) ALL

This will allow anyone in the wheel group to execute commands using sudo (rather than having to add each person one by one).

Now finally use the following command to add any user (e.g- user1) to Wheel group
# usermod -G10 user1

How To SCP Between Servers Without Passwd Authentication

First of all, we need to generate rsa private key and public key for the source server (vice versa).

ssh-keygen -t rsa

then just hit enter until 2 files is generated in /root/.ssh/ :

1. id_rsa
2. id_rsa.pub


then copy the value of id_rsa.pub into /root/.ssh/authorized_keys in any related servers

after that u can scp to the targeted server without passwd authentication :

1. to get file :

scp root@192.168.2.1:/opt/example /opt

2. to get directory and its content :

scp - r root@192.168.2.1:/opt/example /opt

3. to send file :

scp /root/example root@192.168.2.1:/root

4. to send directory and its content :

scp -r /root/example root@192.168.2.1:/root

Tuesday, September 6, 2011

How To List 10 Biggest Directory

How to list 10 biggest directories in whole system or such directory? These 2 commands can be used,either one :


1. du -x --block-size=1024K | sort -nr | head -10

2. du -a / | sort -n -r | head -n 10

Monday, August 29, 2011

How To Install Nagios NRPE Plugin

Concepts of Installation :

1. Download the source file for Nagios plugin + nrpe plugin on host and client.
2. Install the source files.
4. Add client to the host.
3. Config the sensor on host and client.

1. Installation on Client

1.1 Nagios Plugin

Download the source code tarball of the Nagios plugins (visit http://www.nagios.org/download/ for links to the latest versions).

At the time of writing, the latest stable version of the Nagios plugins was 1.4.6.

wget http://osdn.dl.sourceforge.net/sourceforge/nagiosplug/nagios-plugins-1.4.6.tar.gz

Extract the Nagios plugins source code tarball.

tar xzf nagios-plugins-1.4.6.tar.gz

cd nagios-plugins-1.4.6

Compile and install the plugins.

./configure --with-nagios-user=nagios --with-nagios-group=nagios
make
make install


The permissions on the plugin directory and the plugins will need to be fixed at this point, so run the following commands.

chown nagios.nagios /usr/local/nagios
chown -R nagios.nagios /usr/local/nagios/libexec


1.2 NRPE Plugin

Download the source code tarball of the NRPE addon (visit http://www.nagios.org/download/ for links to the latest versions).

** At the time of writing, the latest version of NRPE was 2.8.

wget http://osdn.dl.sourceforge.net/sourceforge/nagios/nrpe-2.8.tar.gz

Extract the NRPE source code tarball.

tar xzf nrpe-2.8.tar.gz

cd nrpe-2.8

Compile the NRPE addon.

./configure
make all


** Install the NRPE plugin (for testing), daemon, and sample daemon config file.

make install-plugin
make install-daemon
make install-daemon-config

Install the NRPE daemon as a service under xinetd.

make install-xinetd

Edit the /etc/xinetd.d/nrpe file and add the IP address of the monitoring server to the only_from directive.

** only_from = 127.0.0.1

Add the following entry for the NRPE daemon to the /etc/services file.

nrpe 5666/tcp # NRPE

Restart the xinetd service.

service xinetd restart

Test the NRPE daemon locally :

** Its time to see if things are working properly...
** Make sure the nrpe daemon is running under xinetd.

netstat -at | grep nrpe

The output out this command should show something like this:

tcp 0 0 *:nrpe *:* LISTEN

** If it does, great! If it doesn't, make sure of the following:

- You added the nrpe entry to your /etc/services file
- The only_from directive in the /etc/xinetd.d/nrpe file contains an entry for "127.0.0.1"
- xinetd is installed and started
- Check the system log files for references about xinetd or nrpe and fix any problems that are reported

** Next, check to make sure the NRPE daemon is functioning properly. To do this, run the check_nrpe plugin that was installed for testing purposes.

/usr/local/nagios/libexec/check_nrpe -H localhost

** You should get a string back that tells you what version of NRPE is installed, like this:

NRPE v2.8

Open firewall rules :

Make sure that the local firewall on the machine will allow the NRPE daemon to be accessed from remote servers.

To do this, run the following iptables command :

** Note that the RH-Firewall-1-INPUT chain name is Fedora specific, so it will be different on other Linux distributions.

iptables -I RH-Firewall-1-INPUT -p tcp -m tcp –dport 5666 -j ACCEPT

Save the new iptables rule so it will survive machine reboots.

service iptables save


Customize NRPE Plugin :

vi /usr/local/nagios/etc/nrpe.cfg

The commands should be synchronized with Nagios host configuration for client.


How To Clear SSH Session On Linux

If you found that there are too many idle users in your servers and you want to kill them? You can do that by this simple command :

kill -9 `ps aux|grep sshd|awk '{print $2}'`

This command will simply kill all the process based on "process id" on run by all "sshd connections".

Wednesday, June 1, 2011

How To Install PhpMyAdmin On CentOS

CentOS 5.5 version :

1. import key :

rpm --import http://apt.sw.be/RPM-GPG-KEY.dag.txt

2. install rpm :

cd /tmp
wget http://packages.sw.be/rpmforge-release/rpmforge-release-0.5.1-1.el5.rf.i386.rpm ( https://rpmrepo.org/RPMforge/Using )
rpm -ivh rpmforge-release-0.5.1-1.el5.rf.i386.rpm

3. install phpmyadmin using yum :

yum install phpmyadmin

4. config phpmyadmin :

4.1 Now we configure phpMyAdmin. We change the Apache configuration so that phpMyAdmin allows connections not just from localhost (by commenting out the stanza):

vi /etc/httpd/conf.d/phpmyadmin.conf


# Web application to manage MySQL
#
#
# Order Deny,Allow
# Deny from all
# Allow from 127.0.0.1
#
Alias /phpmyadmin /usr/share/phpmyadmin
Alias /phpMyAdmin /usr/share/phpmyadmin
Alias /mysqladmin /usr/share/phpmyadmin

4.2 Next we change the authentication in phpMyAdmin from cookie to http:

vi /usr/share/phpmyadmin/config.inc.php

[...]
/* Authentication type */
$cfg['Servers'][$i]['auth_type'] = 'http';
[...]

5. restart apache

========================================================================================================================

Additional case :

1. Error : The configuration file now needs a secret passphrase (blowfish_secret)

To fix:

nano /usr/share/phpmyadmin/conf.inc.php

Look for a line and enter any password. Just dont leave it empty!

$cfg['blowfish_secret'] = 'mydemopass'; /* YOU MUST FILL IN THIS FOR COOKIE AUTH! */

ClamAV Error On CPanel

Solution :

1. Install cpanel pro dahulu
2. baru install clamav
3. http://forums.cpanel.net/f5/cron-root-usr-bin-freshclam-quiet-no-warnings-117753.html#post681037

I went into ssh and did the following:

cd /usr/local/cpanel/modules-install/

ls -al|grep clam

cd clamavconnector-Linux-x86_64 #(your's may be different)

sh install

ls -al /usr/bin/freshclam

When I ran the installer from command line, I noticed it took quite a bit longer to run then it did in whm, and everything was installed correctly.

It's a bit early, so I've not investigated any further, but my hunch is that is has something to do with the path difference in shell over whm.

Hope this helps someone else too.

LINUX Security :

1. http://www.linux.org/docs/ldp/howto/Postfix-Cyrus-Web-cyradm-HOWTO/installing-anti-spam.html

2. http://geobaby.in

3. http://mysql-apache-php.com/basic-linux-security.htm

How To Configure DELL iDRAG - iLO

Reboot
Press f10
Go to hardware configuration > Configuration wizard > iDRAC configuration >

1. Use default : enabled,disabled,shared
2. Next
3. Fill the ip configuration
4. Next
5. Next
6. Set password
7. Summary, just apply
8. Finish

Back to Main
Exit and restart

Cannot Umount /tmp : Drive Is Busy

umount: /tmp: device is busy + Resolved

Guys,

Just check who is accessing the device. Here are the commands to check who are using it.

=======
lsof |grep /tmp
=======

You'll get the process ID and kill the processes like kill -9 PID. Here is an example(Second column is PID) :

=======
root@server [~]# lsof |grep /tmp
mysqld 2579 mysql 4u REG 7,0 0 6098 /tmp/ibZGlGm2 (deleted)
mysqld 2579 mysql 5u REG 7,0 68 6100 /tmp/ibgWnlrp (deleted)
mysqld 2579 mysql 6u REG 7,0 0 6101 /tmp/ib7XB0vM (deleted)
mysqld 2579 mysql 7u REG 7,0 0 6102 /tmp/ibQx1jB9 (deleted)
mysqld 2579 mysql 11u REG 7,0 0 6103 /tmp/ibBSaB7w (deleted)
=======

Then retry to umount the device like : umount /tmp_device_name //You'll get device from /etc/fstab. This file contains the mounting file system table information after system reboot and /etc/mtab holds the current mounted table information.

=======
fuser -m /dev/sda3 //You can also get the PID from here also. But note that deleting all the PID related to this device may cause the problem on the system and you may need to restart the machine.
=======

That's it. Try :)

How To Clear /tmp For Over Period Of Time

You may need to use a command called tmpwatch which removes files which haven’t been accessed for a period of time. Normally, it’s used to clean up directories which are used for temporary holding space such as /tmp.

Following code will remove all files/dirs from /tmp if they are not accessed in last 2 weeks (24 * 14 days = 336)

Code:
tmpwatch --mtime --all 336 /tmp

You can also add this command to the crontab.

Common SSH Commands - Linux Shell Commands

Common SSH Commands - Linux Shell Commands :

ls : list files/directories in a directory, comparable to dir in windows/dos.
ls -al : shows all files (including ones that start with a period), directories, and details attributes for each file.

cd : change directory · · cd /usr/local/apache : go to /usr/local/apache/ directory
cd ~ : go to your home directory
cd - : go to the last directory you were in
cd .. : go up a directory cat : print file contents to the screen

cat filename.txt : cat the contents of filename.txt to your screen

chmod: changes file access permissions
The set of 3 go in this order from left to right:
USER - GROUP - EVERONE

0 = --- No permission
1 = --X Execute only
2 = -W- Write only
3 = -WX Write and execute
4 = R-- Read only
5 = R-X Read and execute
6 = RW- Read and write
7 = RWX Read, write and execute

Usage:
chmod numberpermissions filename

chmod 000 : No one can access
chmod 644: Usually for HTML pages
chmod 755: Usually for CGI scripts


chown: changes file ownership permissions
The set of 2 go in this order from left to right:
USER - GROUP

chown root myfile.txt : Changes the owner of the file to root
chown root.root myfile.txt : Changes the owner and group of the file to root


tail : like cat, but only reads the end of the file
tail /var/log/messages : see the last 20 (by default) lines of /var/log/messages
tail -f /var/log/messages : watch the file continuously, while it's being updated
tail -200 /var/log/messages : print the last 200 lines of the file to the screen

more : like cat, but opens the file one screen at a time rather than all at once
more /etc/userdomains : browse through the userdomains file. hit Spaceto go to the next page, q to quit

pico : friendly, easy to use file editor
pico /home/burst/public_html/index.html : edit the index page for the user's website.


File Editing with VI ssh commands
vi : another editor, tons of features, harder to use at first than pico
vi /home/burst/public_html/index.html : edit the index page for the user's website.
Whie in the vi program you can use the following useful commands, you will need to hit SHIFT + : to go into command mode

:q! : This force quits the file without saving and exits vi
:w : This writes the file to disk, saves it
:wq : This saves the file to disk and exists vi
:LINENUMBER : EG :25 : Takes you to line 25 within the file
:$ : Takes you to the last line of the file
:0 : Takes you to the first line of the file

grep : looks for patterns in files
grep root /etc/passwd : shows all matches of root in /etc/passwd
grep -v root /etc/passwd : shows all lines that do not match root

ln : create's "links" between files and directories
ln -s /usr/local/apache/conf/httpd.conf /etc/httpd.conf : Now you can edit /etc/httpd.conf rather than the original. changes will affect the orginal, however you can delete the link and it will not delete the original.


last : shows who logged in and when
last -20 : shows only the last 20 logins
last -20 -a : shows last 20 logins, with the hostname in the last field

w : shows who is currently logged in and where they are logged in from.
who : This also shows who is on the server in an shell.

netstat : shows all current network connections.
netstat -an : shows all connections to the server, the source and destination ips and ports.
netstat -rn : shows routing table for all ips bound to the server.

top : shows live system processes in a nice table, memory information, uptime and other useful info. This is excellent for managing your system processes, resources and ensure everything is working fine and your server isn't bogged down.
top then type Shift + M to sort by memory usage or Shift + P to sort by CPU usage

ps: ps is short for process status, which is similar to the top command. It's used to show currently running processes and their PID.
A process ID is a unique number that identifies a process, with that you can kill or terminate a running program on your server (see kill command).
ps U username : shows processes for a certain user
ps aux : shows all system processes
ps aux --forest : shows all system processes like the above but organizes in a hierarchy that's very useful!

touch : create an empty file
touch /home/burst/public_html/404.html : create an empty file called 404.html in the directory /home/burst/public_html/

file : attempts to guess what type of file a file is by looking at it's content.
file * : prints out a list of all files/directories in a directory

du : shows disk usage.
du -sh : shows a summary, in human-readble form, of total disk space used in the current directory, including subdirectories.
du -sh * : same thing, but for each file and directory. helpful when finding large files taking up space.

wc : word count
wc -l filename.txt : tells how many lines are in filename.txt

cp : copy a file
cp filename filename.backup : copies filename to filename.backup
cp -a /home/burst/new_design/* /home/burst/public_html/ : copies all files, retaining permissions form one directory to another.
cp -av * ../newdir : Copies all files and directories recurrsively in the current directory INTO newdir

mv : Move a file command
mv oldfilename newfilename : Move a file or directory from oldfilename to newfilename

rm : delete a file
rm filename.txt : deletes filename.txt, will more than likely ask if you really want to delete it
rm -f filename.txt : deletes filename.txt, will not ask for confirmation before deleting.
rm -rf tmp/ : recursively deletes the directory tmp, and all files in it, including subdirectories. BE VERY CAREFULL WITH THIS COMMAND!!!

TAR: Creating and Extracting .tar.gz and .tar files
tar -zxvf file.tar.gz : Extracts the file
tar -xvf file.tar : Extracts the file
tar -cf archive.tar contents/ : Takes everything from contents/ and puts it into archive.tar
gzip -d filename.gz : Decompress the file, extract it

ZIP Files: Extracting .zip files shell command
unzip file.zip


Firewall - iptables commands
iptables -I INPUT -s IPADDRESSHERE -j DROP : This command stops any connections from the IP address
iptables -L : List all rules in iptables
iptables -F : Flushes all iptables rules (clears the firewall)
iptables --save : Saves the currenty ruleset in memory to disk
service iptables restart : Restarts iptables

Apache Shell Commands
httpd -v : Outputs the build date and version of the Apache server.
httpd -l : Lists compiled in Apache modules
httpd status : Only works if mod_status is enabled and shows a page of active connections
service httpd restart : Restarted Apache web server

MySQL Shell Commands
mysqladmin processlist : Shows active mysql connections and queries
mysqladmin drop databasenamehere : Drops/deletes the selected database
mysqladmin create databasenamehere : Creates a mysql database

Restore MySQL Database Shell Command
mysql -u username -p password databasename < databasefile.sql : Restores a MySQL database from databasefile.sql

Backup MySQL Database Shell Command
mysqldump -u username -p password databasename > databasefile.sql : Backup MySQL database to databasefile.sql




kill: terminate a system process
kill -9 PID EG: kill -9 431
kill PID EG: kill 10550
Use top or ps ux to get system PIDs (Process IDs)

EG:
PID TTY TIME COMMAND
10550 pts/3 0:01 /bin/csh
10574 pts/4 0:02 /bin/csh
10590 pts/4 0:09 APP
Each line represents one process, with a process being loosely defined as a running instance of a program. The column headed PID (process ID) shows the assigned process numbers of the processes. The heading COMMAND shows the location of the executed process.

Putting commands together
Often you will find you need to use different commands on the same line. Here are some examples. Note that the | character is called a pipe, it takes date from one program and pipes it to another.
> means create a new file, overwriting any content already there.
>> means tp append data to a file, creating a newone if it doesn not already exist.
< send input from a file back into a command.

grep User /usr/local/apache/conf/httpd.conf |more
This will dump all lines that match User from the httpd.conf, then print the results to your screen one page at a time.

last -a > /root/lastlogins.tmp
This will print all the current login history to a file called lastlogins.tmp in /root/

tail -10000 /var/log/exim_mainlog |grep domain.com |more
This will grab the last 10,000 lines from /var/log/exim_mainlog, find all occurances of domain.com (the period represents 'anything',
-- comment it out with a so it will be interpretted literally), then send it to your screen page by page.

netstat -an |grep :80 |wc -l
Show how many active connections there are to apache (httpd runs on port 80)

mysqladmin processlist |wc -l
Show how many current open connections there are to mysql

Load Monitoring Script For Linux #1

#!/bin/bash
#
# Script to notify admin user if Linux,FreeBSD load crossed certain limit
# It will send an email notification to admin.
#
# Copyright 2005 (c) nixCraft project
# This is free script under GNU GPL version 2.0 or above.
# Support/FeedBack/comment : http://cyberciti.biz/fb/
# Tested os:
# * RedHat Linux
# * Debain Linux
# * FreeBSD
# -------------------------------------------------------------------------
# This script is part of nixCraft shell script collection (NSSC)
# Visit http://bash.cyberciti.biz/ for more information.
# -------------------------------------------------------------------------

# Set up limit below
NOTIFY="4.0"

# admin user email id
EMAIL="yourmail@mail.com"

# Subject for email
SUBJECT="Alert $(hostname) Load Average Exceeded The Limit"

# -----------------------------------------------------------------

# Os Specifc tweaks do not change anything below ;)
OS="$(uname)"
TRUE="1"
if [ "$OS" == "FreeBSD" ]; then
TEMPFILE="$(mktemp /tmp/$(basename $0).tmp.XXX)"
FTEXT='load averages:'
elif [ "$OS" == "Linux" ]; then
TEMPFILE="$(mktemp)"
FTEXT='load average:'
fi

# get first 5 min load
F5M="$(uptime | awk -F "$FTEXT" '{ print $2 }' | cut -d, -f1)"
# 10 min
F10M="$(uptime | awk -F "$FTEXT" '{ print $2 }' | cut -d, -f2)"
# 15 min
F15M="$(uptime | awk -F "$FTEXT" '{ print $2 }' | cut -d, -f3)"

#Save the current running processes in a file
/bin/ps -auxf >> /root/ps_output

# mail message
# keep it short coz we may send it to page or as an short message (SMS)
echo "Load average Crossed allowed limit $NOTIFY." >> $TEMPFILE
echo "Hostname: $(hostname)" >> $TEMPFILE
echo "Local Date & Time : $(date)" >> $TEMPFILE
echo "Load Average :" >> $TEMPFILE
echo -e "\n" >> $TEMPFILE
echo "$(top -n 1 -b|head -20)" >> $TEMPFILE

# Look if it crossed limit
# compare it with last 15 min load average
RESULT=$(echo "$F15M > $NOTIFY" | bc)

# if so send an email
if [ "$RESULT" == "$TRUE" ]; then
mail -s "$SUBJECT" "$EMAIL" < $TEMPFILE
fi

# remove file
rm -f $TEMPFILE

Cpanel Logs

Log file is a file which stores all the information of all files that are accessed and they also have errors which help a system administrator to troubleshoot issues and fixing them. Few log file locations can be found below:

Apache web server :
/usr/local/apache/logs/access_log
/usr/local/apache/logs/error_log
/usr/local/apache/domlogs/domain.com

MySQL database server :
/var/lib/mysql/server.hostname.com.err

Exim mail server :
/var/log/exim_mainlog
/var/log/exim_paniclog
/var/log/exim_rejectlog

Courier-IMAP :
/var/log/maillog

cPanel control panel :
/usr/local/cpanel/logs/error_log
/usr/local/cpanel/logs/access_log
/usr/local/cpanel/logs/license_log
/usr/local/cpanel/logs/login_log
path: /usr/local/cpanel/logs/stats_log

FTP server :
/var/log/messages
/var/log/xferlog

System logs :
/var/log/messages
/var/log/boot.log
/var/log/cron
/var/log/dmesg

Security logs :
/var/log/secure
/var/log/messagesd

Tuesday, May 31, 2011

How To Install HPSMH + HPADU + HPACU-CLI On CentOS

How To Install HPSMH + ADU + HPACU-CLI :

1. yum install compat-libstdc++-33.i386 compat-libstdc++-33.x86_64 compat-libstdc++-296.i386

2. wget -nd ftp://ftp.hp.com/pub/products/servers/supportsoftware/linux/hpadu-7.70-12.linux.rpm

wget -nd ftp://ftp.hp.com/pub/products/servers/supportsoftware/linux/hpacucli-7.70-12.linux.rpm

wget -nd http://geraklian.org/hpsmh-6.2.1-14.i386.rpm

3. rpm -ivh hpsmh-6.2.1-14.i386.rpm
rpm -ivh hpadu..
rpm -ivh hpaccli..

4. command hpacucli:

hpacucli
> ctrl all show status
>ctrl all show config

References :

1. ftp://ftp.hp.com/pub/products/servers/supportsoftware/linux/

2. http://h20000.www2.hp.com/bizsupport/TechSupport/SoftwareIndex.jsp?lang=en&cc=us&prodNameId=3288132&prodTypeId=15351&prodSeriesId=397634&swLang=8&taskId=135&swEnvOID=4006

3. http://koo.fi/tech/2008/06/08/hp-array-configuration-and-diagnostic-utilities-on-linux/

How To Setup NFS on CentOS

How to setup NFS on CentOS:

1. Server Side :

- kena install nfs,nfs utils,portmap :

# yum install nfs-utils nfs4-acl-tools portmap

- kena allow file ape yg nak share dan ip mane allowed kt /etc/export :

/backup/srv77 192.168.0.3(rw,sync,no_root_squash,fsid=0)

- kena allow portmap kt /etc/hosts.allow :

portmap: 192.168.0.0/255.255.255.0, 10.0.0.0/255.0.0.0
portmap: 192.168.0.4/255.255.255.0

- kena allow ip kt firewall,iptables or csf :

192.168.0.3

- kena set service nfs dan portmap kt initial setup :

chkconfig --level 235 nfs on
chkconfig --level 235 portmap on

- kena start service nfs dan portmap :

/etc/init.d/nfs start
/etc/init.d/portmap start

2. Client side :

- kena install nfs,nfs utils,portmap :

# yum install nfs-utils nfs4-acl-tools portmap

- kena create folder utk mount :

mkdir /mnt/srv4

- kena add kt /etc/fstab :

192.168.0.4:/backup/srv77 /mnt/srv4 nfs rw,hard,intr 0 0

- kena allow ip kt firewall,iptables or csf :

192.168.0.4

- kena set service nfs dan portmap kt initial setup :

chkconfig --level 235 nfs on
chkconfig --level 235 portmap on

- kena start service nfs dan portmap :

/etc/init.d/nfs start
/etc/init.d/portmap start

- kena add usef nfs :

useradd nfs -u 1000

- kena mount nfs to /mnt/srv4 :

mount -t nfs 192.168.0.4:/backup/srv77 /mnt/srv4 atau

mount -t nfs -o rw 192.168.0.4:/backup/srv77 /mnt/srv4

- nak remount nfs

mount -o remount,defaults,ro /mnt/Qbackup

or

mount -o remount,defaults,rw /mnt/Qbackup

instead of

mount -o remount,rw /mnt/Qbackup


COMMAND LAIN :

mount | grep -i '192.168.0.4'

nfsstat