Recently an application forced the need to create and collect core dumps on RHEL6 systems. The below process will also work on any RHEL variants (CentOS, Scientific Linux). Edit /etc/security/limits.conf, notice this is set to all processes but if you have a process running as a service account replace the * with the service account. […]
So you want to setup a GIT Repository for your developers on RHEL 6/CentOS 6, but notice Red Hat Enterprise Linux 6 contains 1.7.1 in the repositories, which is well behind the current 1.8.3 that is available for GIT at http://git-scm.com. Well no need to worry, it is easy enough to download and install the […]
Believe it or not, it’s important to know that Microsoft has a monitoring solution for Linux servers using Microsoft SCOM (System Center Operations Manager) 2012, which recently I had the chance to setup a Red Hat 6 system using sudo elevation. A new feature for UNIX and Linux monitoring with System Center 2012 – Operations […]
After a recent update to the latest RHEL 6.4, an issue arose that caused LDAP to stop using our MD5 signed certificate. This was due to the nss-3.14.0 update that now deems MD5 as un-secure. This change caused authentication of users using LDAP to fail. If the account had a local password (such as root), […]
Have you ever wondered if there is a simple way to copy files and run commands on multiple machines from one command? Well there are several tools available that will allow us to do just that, but for starters we will discuss just pssh (Parallel SSH). pssh (Parallel SSH) pssh (Parallel SSH) is a command-line […]
Few days ago, the makers of Red Hat Enterprise Virtualization (RHEV) have released the latest version – RHEV 3.1- that uses web portals to manage the host systems for virtualization. In its previous avatar, the Administrator Console, the Internet Explorer was a requirement to run the web interface.
Security-Enhanced Linux (SELinux) is a Linux feature that provides a mechanism for supporting access control security policies, through the use of Linux Security Modules (LSM) in the Linux kernel. It is a set of Kernel modifications and user-space tools that can be added to various Linux distributions. Its architecture strives to separate enforcement of security […]
Nagios is one of the most powerful open source monitoring tool, its giving the opportunity for monitoring all OS and devices , in our previous posts, we did show you how to install Nagios from source in Fedora and CentOS, today we will see how to install it directly from yum in Fedora/Centos/SL(Scientific Linux) […]
Nomachine or NX technology is a computer program that handles remote X Window System connections, and attempts to greatly improve on the performance of the native X display protocol to the point that it can be usable over a slow link such as a dial-up modem. It wraps remote connections in SSH sessions for encryption.