Attach ISO image stored in XenServer local storage
Citrix XenServer is powerful hypervisor that is based on Linux (Redhat/Centos/Fedora family) and competes with Vmware ESXi and offer wide range of virtualization features for data centers. In general...
View ArticleAdd physical NIC to XenServer
If you add new physical network interface to the hardware that runs XenServer it won’t appear in XenCenter by default. In order to attach it to VMs or change its settings you’ll need to type in a few...
View ArticleWhy Mosh is better than SSH?
Mosh (stands for Mobile Shell) is replacement of SSH for remote connections to Unix/Linux systems. It brings a few noticeable advantages over well known SSH connections. In brief, it’s faster and more...
View ArticleGrub Fallback: Boot good kernel if new one crashes
It’s hard to believe but I didn’t know about Grub fallback feature. So every time when I needed to reboot remote server into a new kernel I had to test it on local server to make sure it won’t panic on...
View ArticleTop 5 Password Managers for Linux [Guest Post]
In this post you will find set of password managers for Linux which provides secure storage for your passwords for sensitive data. If you still keep the passwords in plain text then you must consider...
View ArticleGeolocation for Nagios
Some time ago I came across NagMap addon for Nagios and found it pretty helpful for monitoring multiple hosts around the world. For example, there are some production servers in Europe, US and others...
View ArticleLimit CPU usage of Linux process
cpulimit is a small program written in C that allows to limit CPU usage by Linux process. Limit is specified in percentage so it’s possible to prevent high CPU load generated by scripts, programs or...
View ArticleTrack file changes using auditd
Most of Linux distributions comes with Linux Auditing System that makes it possible to track file changes, file accesses as well as system calls. It’s pretty useful functionality for sysadmins who wish...
View ArticleFailover and Load Balancing using HAProxy
HAProxy is open source proxy that can be used to enable high availability and load balancing for web applications. It was designed especially for high load projects so it is very fast and predictable,...
View ArticleLinux Restricted Shells: rssh and scponly
Restricted shells like rssh and scponly give sysadmin the possibility to limit the operations that Linux user can do, for example you can create user that will be allowed to copy files via scp but...
View ArticleLinux df Command Usage Examples
This post about Linux df command opens series of articles for Linux newbies where you’ll find description and usage examples of major Linux commands like df, top, fsck, mount and so on. Introduction...
View ArticleHow to Perform Linux Server Monitoring with CloudStats
CloudStats is a powerful tool for Linux server monitoring and network monitoring. This Software-as-a-Service tool allows to track all key indicators of system health, such as CPU and RAM usage, apps...
View ArticleHow to Update Kali Linux [Quick Guide]
So you’ve followed our guide to Installing Kali Linux, and you want to make sure all of your software is up to date. Follow these instructions to make sure you’re on the latest version. Updating Kali...
View ArticleFind Command in Linux [With Useful Examples]
The find command in the Linux shell allows you to search for files in the filesystem. It can find files by name, user permissions, and size. The find command can also perform actions on the files which...
View ArticleHow to Make a PHP Redirect to a Different Page [Quick & Easy]
Being able to redirect the user to a different page in PHP can be useful if you’ve moved a page to a different location or want to send the user elsewhere – directing them to an access denied or error...
View ArticlePython range Function – How to Use It [With Examples]
The Python range() function returns an immutable sequence of integers between a given start and endpoint, incrementing by a given amount. Python range Syntax Here’s the syntax for the Python range()...
View ArticleThe Bash Profile and How to Use It
If you’re frequently interacting with Linux via the Bash shell, you’ll eventually want to customize it a bit – perhaps adding your own shortcuts, or setting up the environment to your liking, or even...
View ArticleChecking for Available Disk Space on Ubuntu [Guide]
This simple guide explains how to check how much disk space is available in Ubuntu Linux. The df command tells you how much space is being used on each storage volume attached to your Linux system. To...
View ArticleRaspberry Pi & Python Powered Tank
The title pretty much explains this project- it’s a tank, that can shoot BBs – powered by a Raspberry Pi and Python Code. It’s pretty awesome. This is part one of a two-parter and handles all of the...
View ArticlePython String replace Method [With Examples]
This article shows you how to use the string.replace() method in Python to replace elements in a string of characters and includes useful examples. Python String replace Syntax The replace() function...
View Article