Packaging software into RPM (Red Hat Package Manager) format is an essential skill for developers and system administrators working with Red Hat-based Linux distributions such as CentOS and RedHat. RPMs allow for easy installation, upgrade, and removal of software, ensuring that applications can be distributed and managed efficiently. This guide will walk you through the process of packaging your script into an RPM, step by step. Prerequisites Before we begin, ensure you have the following: A CentOS or RedHat system for packaging and testing. Your script that you wish to package. rpm-build and rpmdevtools packages installed. You can install them…
Author: Rahul
Using HAProxy, you can construct high-availability systems and HAProxy stats provide detailed statics. It can be used with popular servers like Apache, Tomcat, NGINX, and others. This post describes how to enable HAProxy statistics on your machine. After you have configured and installed HAProxy on your system, you may monitor its statistics to determine its current performance. With HAProxy Stats, you can view information about the number of connections, data transfer, server status, and more. Because it is browser-based, you can use a web browser to get real-time information about your HAProxy implementation. In this article, we delineate how to…
Sometimes we need to insert a line at middle of the existing file. You can add line at specific line number using Linux command line or shell scripts. In this tutorial, we will discuss about adding a text line at middle of file as specific line number. Let’s have an example, I have a text file named file1.txt with following content: cat file1.txt this is line one this is line two this is line three Now I have to insert text “HelloWorld” at the line number 3. To do this run the following command. sed -i ‘3iHelloWorld’ file1.txt Details of…
Being a system administrator you have all responsibilities to maintain your systems. A system admin is a person having good knowledge about operating systems, networking and applications. Also he must have some primary knowledge about system hardware and software. The responsibilities also varies based on location, organization and infrastructure. Primary Responsibilities of A System Administrator Being a Linux/Windows/Cloud Administrator your primary responsibilities are: User account management. Creating new users and groups. Configure security policies. Changing user passwords at regular intervals. Analyze user security pocily on regular time interval. Data backup and recovery. A good system admin always has a data…
Introduction In the dynamic world of information technology, keeping your systems up-to-date is crucial for security, performance, and stability. This is especially true for users of CentOS and Red Hat Enterprise Linux (RHEL), two of the most popular Linux distributions in the corporate world. This comprehensive guide will delve into the best practices, tools, and strategies to ensure your CentOS and RHEL systems are always current. Understanding the Importance of Regular Updates Updates in CentOS and RHEL include security patches, bug fixes, and occasionally, new features. Regular updates help protect your systems from vulnerabilities, improve functionality, and ensure compatibility with…
As a system administrator, you need to take backup on daily basis. Backups are very useful to recover data from any crashes or corruption. I have written a simple script to take database backup from MySQL server and upload it to FTP server. Being a system administrator, I recommend keeping a remote copy of your every backup. You can also try our new advance script for MySQL databases backup and upload to remote locations. Create a shell script file and copy the below script. Then update all the required values and execute.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 | #!/bin/bash ###################################################### # Script Written by: Rahul Kumar # Date: Feb 21, 2013 ###################################################### DATE=`date +%d%b%y` LOCAL_BACKUP_DIR="/backup/" DB_NAME="test" DB_USER="root" DB_PASSWORD="your password" FTP_SERVER="ftp.tecadmin.net" FTP_USERNAME="ftp user name" FTP_PASSWORD="ftp user password" FTP_UPLOAD_DIR="/backup/" LOG_FILE=/backup/backup-DATE.log ############### Local Backup ######################## mysqldump -u $DB_USER -p$DB_PASSWORD $DB_NAME | gzip > $LOCAL_BACKUP_DIR/$DB_NAME-$DATE.sql.gz ############### UPLOAD to FTP Server ################ ftp -n $FTP_SERVER << EndFTP user "$FTP_USERNAME" "$FTP_PASSWORD" binary hash cd $FTP_UPLOAD_DIR #pwd lcd $LOCAL_BACKUP_DIR put "$DB_NAME-$DATE.sql.gz" bye EndFTP if test $? = 0 then echo "Database Successfully Uploaded to Ftp Server File Name $DB_NAME-$DATE.sql.gz " > $LOG_FILE else echo "Error in database Upload to Ftp Server" > $LOG_FILE fi |
Setup Details – Edit the above script…
Linux servers power many of the world’s applications and services, making them a popular target for attackers. Ensuring the security of your Linux server is critical to protect sensitive data and maintain system stability. In this comprehensive guide, we’ll discuss various strategies to harden your Linux server, covering aspects like system updates, user management, file permissions, and more. 1. Regular System Updates One of the most effective ways to improve your server’s security is to keep your system up-to-date with the latest patches and security fixes. Regularly updating your Linux distribution will ensure that you’re protected against known vulnerabilities and…
Resetting the MySQL root password in Linux is a crucial task for database administrators, especially when access is lost or compromised. This guide will walk you through the steps to regain control of your MySQL database by resetting the root password. Whether you’re dealing with a forgotten password or enhancing security, following these instructions will help you securely reset your MySQL root password. The process involves stopping the MySQL service, starting it in safe mode, and updating the root password. These step-by-step instructions will help you recover the mysql root account password quickly. Prerequisites Before we begin, make sure you…
MySQL is one of the most popular open-source relational database management systems used worldwide. As your data grows, it becomes increasingly important to safeguard it by implementing regular backups and having a reliable restoration process. In this article, we will provide a comprehensive guide to MySQL database backup and restoration, covering best practices and tools that will ensure the integrity and availability of your data. Backup Methods There are several methods to create a MySQL database backup, including: Using mysqldump Using MySQL Enterprise Backup (commercial) Using binary log-based incremental backups Using file system snapshots We will focus on the most…
FreeRadius is an implementation of RADIUS server. Its support multiple types of authentication. This article will help you to setup freeradius authentication with OpenLDAP. Step 1: Setup OpenLDAP Server First its required to setup openldap server to complete below setup. Use below link to install it. Setup Openldap Server on CentOS, RHEL System Step 2: Install freeradius Packages Install all freeradius2 server packages on your system using following command. # yum install freeradius2 freeradius2-utils freeradius2-ldap Step 3: Download Schema File Download radius ldap schema file and copy to ldap schema directory using below commands. 3.1 Download File # wget http://open.rhx.it/phamm/schema/radius.schema…