Author: Rahul

I, Rahul Kumar am the founder and chief editor of TecAdmin.net. I am a Red Hat Certified Engineer (RHCE) and working as an IT professional since 2009..

Some times we required to secure a single url or few specific urls in our site, and all other site url keep remain with public access. This is very easy to manage with are using directory and file structure in sites. But some of framework like cakephp work on routing structure which is different from directory structure, we can’t secure it on directory level. This article will help you secure specific url in Apache. For example a site has a secure area like http://example.com/admin/” and we need that only the authorized users or ips can access /admin/ section. 1. Setup…

Read More

Sometimes SQL Server logs files acquire a large space on the disk. In that case, we need to reduce the size of the log file to claim some space. But truncating or reducing database log file in SQL Server 2008 can be quite difficult. It also has its own issues. This article contains a set of commands to Shrink Log Files of SQL Server database. Generally this command is I prefer to take a backup of the database before executing below command for a safer side Shrink SQL Server Transaction Log Files First of all, check the actual name of…

Read More

Linux provides a number of tools for network configuration. Most important network settings for you Linux machine to access over network are IP configuration Device activation DNS configuration Default gateway 1. Default Network Configuration Files: Default linux interfaces configuration file exists in /etc/sysconfig/network-scripts/ named ifcfg-ethX ( ‘X’ is replace with number 0,1 or 2 etc ). /etc/sysconfig/network : is global configuration file NETWORKING = yes HOSTNAME = server1.tecadmin.net GATEWAY = 192.168.10.1 /etc/sysconfig/network-script/ifcfg-ethX : is Ethernet configuration file so assign ip address, netmask on interface. /etc/resolv.conf : DNS servers ip addresses are specified in this file. /etc/hosts : Is used for…

Read More

RPM (RedHat Package Manager) is a package management system for RHEL based systems. You may have seen that all the packages in Redhat based systems have extension .rpm. This tutorial will help you to how to create RPM for your own script I had created a script to take database backup, Today I have created an RPM file of that script, This is my first RPM created ever. Below are the steps which I follow to do it. Step 1 – Install Required Packages First of all, you need to install the required packages on your system to create rpm…

Read More

HAProxy Stats provides a lot of information about data transfer, total connection, server state etc. After installing HAProxy if you want to view HAProxy stats in your web browser, You can easily configure it by making few changes in your HAProxy configuration using following steps. Step 1 – Enable HAProxy Statics You can enable statics in haproxy server. To enable stats edit your HAProxy configuration file and add below entry after the defaults section. listen stats 192.168.10.10:1936 mode http log global maxconn 10 clitimeout 100s srvtimeout 100s contimeout 100s timeout queue 100s stats enable stats hide-version stats refresh 30s stats…

Read More

Hi Guys, If you want to add a line in file at specific line number through script. Below examples will help you to do it. For example you have a file named file1.txt, file content are as below. [email protected]:~ # cat file1.txt tecadmin 1 tecadmin 2 tecadmin 4 Now you required to add text “tecadmin 3” at line number 3, use below command [email protected]:~ # sed ‘3itecadmin 3’ file1.txt > file1.txt.tmp Above command will create a new file file1.txt.tmp with expected output [email protected]:~ # cat file1.txt.tmp tecadmin 1 tecadmin 2 tecadmin 3 tecadmin 4 Replace origin file with tmp file…

Read More

Being a system administration you have all responsibilies to maintain your systems. System admin is a person having good knowledge about operating systems and applications, as well as hardware and software troubleshooting. Many of reponsibilies vary from organization to organization. Basic responsibilities of system administrator’s typically include: 1. User account management. Creating new users and groups. Configure security policies. Changing user password on regular interval. Analyze user security pocily on regular time interval. 2. Data backup and recovery. A good system admin always have data backup policy with him, Also have recovery policy. Check day to day your backups are…

Read More

Being a system administrator, we always need to keep our systems up to date with latest packages. Its difficult to go to server daily and check for available packages. For the same we can use yum-updatesd service to get email notifications to our mailbox or we can also configure this service to update any packages automatically when available. Yum-updatesd can be configured with few easy steps given below. You may also need to install top yum repositories provided latest packages. Step 1: Install/Update yum-updatesd Package By default this package installed on system installation time. So should just update this package…

Read More

As a system administrator, you need to take backup on daily basis. Backups are very useful to recover data from any crashes or corruption. I have written a simple script to take database backup from MySQL server and upload to FTP server. Being a system administrator, I recommend keeping a remote copy of your every backup. You can also try our new advance script for MySQL databases backup and upload to remote locations. Create a shell script file and copy the below script. Then update all the required values and execute.

Setup Details – Edit the above script for…

Read More

Security of data and server from hackers is a main task of system administration services. Below is few basic security tips for your linux server. 1: Strong Password Policy Making strong passwords is first stage of securing your server. Do not use common names as your password like yourname, date of birth, mobile number etc. Passwords should be alphanumeric with upper and lower case letters. You can use password aging policy on your linux machine to enforce users to change there password on regular interval. Example: To get password aging information # chage -l username To change password aging information…

Read More