Red Hat Enterprise Linux 3 System Administration Guide

Total Page:16

File Type:pdf, Size:1020Kb

Red Hat Enterprise Linux 3 System Administration Guide Red Hat Enterprise Linux 3 System Administration Guide Red Hat Enterprise Linux 3: System Administration Guide Copyright © 2003 by Red Hat, Inc. Red Hat, Inc. 1801 Varsity Drive Raleigh NC 27606-2072 USA Phone: +1 919 754 3700 Phone: 888 733 4281 Fax: +1 919 754 3701 PO Box 13588 Research Triangle Park NC 27709 USA rhel-sag(EN)-3-Print-RHI (2003-07-25T17:10) Copyright © 2003 by Red Hat, Inc. This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/). Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. Distribution of the work or derivative of the work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder. Red Hat, Red Hat Network, the Red Hat "Shadow Man" logo, RPM, Maximum RPM, the RPM logo, Linux Library, PowerTools, Linux Undercover, RHmember, RHmember More, Rough Cuts, Rawhide and all Red Hat-based trademarks and logos are trademarks or registered trademarks of Red Hat, Inc. in the United States and other countries. Linux is a registered trademark of Linus Torvalds. Motif and UNIX are registered trademarks of The Open Group. XFree86 is a trademark of The XFree86 Project, Inc, and is pending registration. Intel and Pentium are registered trademarks of Intel Corporation. Itanium and Celeron are trademarks of Intel Corporation. AMD, Opteron, Athlon, Duron, and K6 are registered trademarks of Advanced Micro Devices, Inc. Netscape is a registered trademark of Netscape Communications Corporation in the United States and other countries. Java and Swing are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. or other countries. Oracle is a registered trademark, and Oracle8i, Oracle9i, and interMedia are trademarks or registered trademarks of Oracle Corporation. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. SSH and Secure Shell are trademarks of SSH Communications Security, Inc. FireWire is a trademark of Apple Computer Corporation. IBM, AS/400, OS/400, RS/6000, S/390, and zSeries are registered trademarks of International Business Machines Corporation. eServer, iSeries, and pSeries are trademarks of International Business Machines Corporation. All other trademarks and copyrights referred to are the property of their respective owners. The GPG fingerprint of the [email protected] key is: CA 20 86 86 2B D6 9D FC 65 F6 EC C4 21 91 80 CD DB 42 A6 0E Table of Contents Introduction..........................................................................................................................................i 1. Changes to This Manual ........................................................................................................i 2. Document Conventions.........................................................................................................ii 3. More to Come ....................................................................................................................... v 3.1. Send in Your Feedback .......................................................................................... v 4. Sign Up for Support.............................................................................................................. v I. File Systems.......................................................................................................................................i 1. The ext3 File System ............................................................................................................ 1 1.1. Features of ext3...................................................................................................... 1 1.2. Creating an ext3 File System ................................................................................. 1 1.3. Converting to an ext3 File System......................................................................... 2 1.4. Reverting to an ext2 File System ........................................................................... 2 2. Swap Space ........................................................................................................................... 5 2.1. What is Swap Space?............................................................................................. 5 2.2. Adding Swap Space ............................................................................................... 5 2.3. Removing Swap Space .......................................................................................... 6 2.4. Moving Swap Space .............................................................................................. 7 3. Redundant Array of Independent Disks (RAID) .................................................................. 9 3.1. What is RAID?....................................................................................................... 9 3.2. Who Should Use RAID?........................................................................................ 9 3.3. Hardware RAID versus Software RAID................................................................ 9 3.4. RAID Levels and Linear Support ........................................................................ 10 4. Logical Volume Manager (LVM)........................................................................................ 13 4.1. What is LVM?...................................................................................................... 13 4.2. Additional Resources........................................................................................... 14 5. Managing Disk Storage....................................................................................................... 15 5.1. Viewing the Partition Table.................................................................................. 16 5.2. Creating a Partition .............................................................................................. 16 5.3. Removing a Partition ........................................................................................... 18 5.4. Resizing a Partition.............................................................................................. 19 6. Implementing Disk Quotas ................................................................................................. 21 6.1. Configuring Disk Quotas ..................................................................................... 21 6.2. Managing Disk Quotas ........................................................................................ 24 6.3. Additional Resources........................................................................................... 25 7. User-Defined Device Names............................................................................................... 27 7.1. Configuring Devlabel........................................................................................ 27 7.2. How It Works ....................................................................................................... 29 7.3. Additional Resources........................................................................................... 29 8. Access Control Lists ........................................................................................................... 31 8.1. Mounting File Systems ........................................................................................ 31 8.2. Setting Access ACLs ........................................................................................... 31 8.3. Setting Default ACLs........................................................................................... 32 8.4. Retrieving ACLs .................................................................................................. 33 8.5. Archiving File Systems With ACLs..................................................................... 33 8.6. Compatibility with Older Systems....................................................................... 34 8.7. Additional Resources........................................................................................... 34 II. Installation-Related Information................................................................................................ 37 9. Kickstart Installations ......................................................................................................... 39 9.1. What are Kickstart Installations?......................................................................... 39 9.2. How Do You Perform a Kickstart Installation? ................................................... 39 9.3. Creating the Kickstart File................................................................................... 39 9.4. Kickstart Options ................................................................................................. 40 9.5. Package Selection ................................................................................................ 55 9.6. Pre-installation Script........................................................................................... 56 9.7. Post-installation Script......................................................................................... 57 9.8. Making the Kickstart File Available ...................................................................
Recommended publications
  • Red Hat GFS 6.0 Administrator's Guide
    Red Hat GFS 6.0 Administrator's Guide Red Hat GFS 6.0: Administrator's Guide Copyright © 2004 and 2005 Red Hat, Inc. Red Hat, Inc. 1801 Varsity Drive Raleigh NC 27606-2072 USA Phone: +1 919 754 3700 Phone: 888 733 4281 Fax: +1 919 754 3701 PO Box 13588 Research Triangle Park NC 27709 USA rh-gfsg(EN)-6.0-Print-RHI (2005-08-02T11:07-0400) Copyright © 2005 by Red Hat, Inc. This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/). Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. Distribution of the work or derivative of the work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder. Red Hat and the Red Hat "Shadow Man" logo are registered trademarks of Red Hat, Inc. in the United States and other countries. All other trademarks referenced herein are the property of their respective owners. The GPG fingerprint of the [email protected] key is: CA 20 86 86 2B D6 9D FC 65 F6 EC C4 21 91 80 CD DB 42 A6 0E Table of Contents Introduction.......................................................................................................................................... i 1. Audience ................................................................................................................................ i 2. Document
    [Show full text]
  • Install Redhat/Centos Operating System on UCS M-Series Server
    Contents Introduction Prerequisites Requirements Components Used Background Information Download Required Driver ISO Bundle Steps to install RHEL 7.0 or CentOS 7.0 Verify Steps to install RHEL 6.5 or CentOS 6.5 Verify Post Installation Verification Related Information Introduction This document describes how to install Redhat Enterprise Linux ( RHEL ) or CentOS Linux on the Cisco Unified Computing System (UCS) M-Series server using local storage. Prerequisites Requirements Cisco recommends that you have knowledge of these topics: ● Cisco UCS Manager 2.5 or 3.1 version ● Storage Profiles ● Linux Operating Systems (OS) Components Used The information in this document is based on UCS M-Series. The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command. Background Information Cisco M-Series modular server is one of the Cisco products that represents Composable Infrastructure design. The modular servers do not have a local storage but a centralized storage that can be shared by all servers. To access the shared storage, OS requires new Small Computer System Interface (SCSI) driver called as storage Network Interface Card ( sNIC ) and has to be added during installation for OS to detect the disks. The next few sections of this document provides information on how to download the driver and install it during the OS installation. Download Required Driver ISO Bundle The UCS Hardware and Software Interoperability Matrix outlines the driver versions that are required for a particular OS, device, and firmware combination.These links for the Matrix Utility Tool and the Matrix PDFs, determines the required driver version.
    [Show full text]
  • Red Hat Jboss Developer Studio
    RED HAT JBOSS DEVELOPER STUDIO DATASHEET BENEFITS EVERYTHING YOU NEED TO DEVELOP, TEST, AND DEPLOY RICH WEB, MOBILE WEB, AND ENTERPRISE APPLICATIONS AND SOA SERVICES. • Provides a pre-assembled ® ® development environment, Red Hat JBoss Developer Studio provides superior support for your entire development life including both tooling and cycle in a single tool. It is a certified Eclipse-based integrated development environment (IDE) for runtime components developing, testing, and deploying rich web applications, mobile web applications, transactional enterprise applications, and SOA-based integration applications and services. • Enables development of applications for deployment JBoss Developer Studio includes a broad set of tooling capabilities and support for multiple pro- on-premise or in the cloud gramming models and frameworks, including Java™ Enterprise Edition 6, RichFaces, JavaServer ® through its seamless inte- Faces (JSF), Enterprise JavaBeans (EJB), Java Persistence API (JPA), and Hibernate , JAX-RS gration with both OpenShift with RESTEasy, Contexts Dependency Injection (CDI), HTML5, and many other popular technolo- Enterprise by Red Hat and gies. It is fully tested and certified to ensure that all its plug-ins, runtime components, and their OpenShift Online by Red Hat dependencies are compatible with each other. • Certified updates so you JBoss Developer Studio provides developer choice in supporting multiple Java virtual machines don’t have to worry about (JVMs), productivity with Maven, and testing with Arquillian. It also includes all needed depen- updating parts that may dencies and third-party plugins. These pre-configured tools save time and offer significant value, not work with the rest of improving productivity and reducing deployment times. the environment Developers can have confidence that their development environment is stable, upgradeable, • Tested and certified to deployable, and supportable.
    [Show full text]
  • 5.7 Release Notes
    Red Hat Enterprise Linux 5 5.7 Release Notes Release Notes for Red Hat Enterprise Linux 5.7 Red Hat Inc. Red Hat Enterprise Linux 5 5.7 Release Notes Release Notes for Red Hat Enterprise Linux 5.7 Legal Notice Copyright © 2011 Red Hat, Inc. This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent. Red Hat Software Collections is not formally related to or endorsed by the official Joyent Node.js open source or commercial project. The OpenStack ® Word Mark and OpenStack logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission.
    [Show full text]
  • Product Appendix 1 Software and Support Subscriptions 产品附录1 软件和支持订阅
    PRODUCT APPENDIX 1 产品附录 1 SOFTWARE AND SUPPORT 软件和支持订阅 SUBSCRIPTIONS This Product Appendix (which includes Exhibits applicable to specific 本产品附录(包括具体红帽产品所适用的附件)包含参数描述条款及 Red Hat Products) contains terms that describe the parameters and govern your use of Software Subscriptions and Support 贵方使用软件订阅和支持订阅所适用的条款。红帽托管或在线订阅商 Subscriptions. This Product Appendix does not apply to Red Hat 品/服务不适用本产品附录。我们在本产品附录中使用但未在本产品 hosted or on-line subscription offerings. When we use a capitalized term in this Product Appendix without defining it in this Product 附 录 中 定 义 的 术 语 , 具有本产 品 附 录 适 用 的 协 议 ( 如 Appendix, the term has the meaning defined in the Agreement to http://www.redhat.com/agreements 上规定的红帽企业协议,或客户 which this Product Appendix applies, either the Red Hat Enterprise Agreement set forth at http://www.redhat.com/agreements or, if 与红帽之间共同签署的协议(如适用))中定义的含义。如果本产品 applicable, a mutually signed agreement between Client and Red 附录与本产品附录的附件有冲突、不一致或差异,以附件的条款 Hat. In the event of a conflict, inconsistency or difference between this Product Appendix and an Exhibit to this Product Appendix, the 为准。 terms of the Exhibit control. Red Hat may modify or update this Product Appendix either by 红帽可通过在 http://www.redhat.com/agreements 发布本产品附录 posting a revised version of this Product Appendix at http://www.redhat.com/agreements, or by providing notice using 的修订版或以其他合理的方式提供通知,对本产品附录进行修改或 other reasonable means. If you do not agree to the revised version 更新。如果贵方不同意经修改的版本,则 (a) 截至更新日期贵方已购 then, (a) the existing Product Appendix will continue to apply to Red Hat Products you have purchased as of the date of the update for the 买的红帽产品,将在当时的订阅期的剩余期限内继续适用现有的产 remainder of the then-current Subscription term(s); and (b) the 品附录;且 (b) 在经修改的版本的生效日期之后对红帽产品的任何新 revised version will apply to any new purchases or renewals of Red Hat Products made after the effective date of the revised version.
    [Show full text]
  • Red Hat Enterprise Linux Certification Matrix for Dell EMC Poweredge Servers
    Red Hat Enterprise Linux Certification Matrix for Dell EMC PowerEdge Servers September 10, 2021 Dell EMC Linux Team Introduction • This set of matrices attempt to represent the certification status between different versions of Red Hat Enterprise Linux and Dell EMC PowerEdge servers • Dell Technologies policy is to offer ‘validation’ support for a new release of RHEL at the moment it is GA from Red Hat – Customers with an existing Dell ProSupport contract who purchased their RHN subscription with their Dell EMC server may download and install the new release onto their server and will continue to be covered by their ProSupport contract. – Please note that only the contents of the distribution ISO are supported. No other software. • Please note the Red Hat CPU support policy here : – https://access.redhat.com/support/policy/intel 2 RHEL/Dell EMC Matrix published on September 10, 2021 Support levels for a platform/release combination • There are three levels of status : – Not Supported : The absence of an icon indicates that this release is not supported or certified for the referenced platform. – Certified: The release has been successfully certified, or the cert has been carried forward from a previous cert, and will appear on the Red Hat hardware certification page, no additional validation has been carried out. Certified is indicated by: – Validated : The release has been successfully certified and tested by Dell Technologies teams and will appear on the Red Hat hardware certification page. The contents of the distribution ISO are supported by Dell Technologies for their RHEL OEM customers and the ISO contains functioning drivers for the hardware platform.
    [Show full text]
  • Add-Ons for Red Hat Enterprise Linux
    DATASHEET ADD-ONS FOR RED HAT ENTERPRISE LINUX WORKLOAD AND MISSION-CRITICAL PLATFORM ENHANCEMENTS In conjunction with Red Hat® Enterprise Linux®, Red Hat offers a portfolio of Add-Ons to extend the features of your Red Hat Enterprise Linux subscription. Add-Ons to Red Hat Enterprise Linux tailor your application environment to suit your particular computing requirements. With increased flexibility and choice, customers can deploy what they need, when they need it. ADD-ON OPTIONS FOR AVAILABILITY MANAGEMENT High Availability Add-On Red Hat’s High Availability Add-On provides on-demand failover services between nodes within a cluster, making applications highly available. The High Availability Add-On supports up to 16 nodes and may be configured for most applications that use customizable agents, as well as for virtual guests. The High Availability Add-On also includes failover support for off-the-shelf applications like Apache, MySQL, and PostgreSQL. When using the High Availability Add-On, a highly available service can fail over from one node to another with no apparent interruption to cluster clients. The High Availability Add-On also ensures data integrity when one cluster node takes over control of a service from another clus- ter node. It achieves this by promptly evicting nodes from the cluster that are deemed to be faulty using a method called “fencing” that prevents data corruption. www.redhat.com DATASHEET ADD-ONS For RED Hat ENterprise LINUX 6 Resilient Storage Add-On Red Hat’s Resilient Storage Add-On enables a shared storage or clustered file system to access the same storage device over a network.
    [Show full text]
  • Red Hat Enterprise Linux Roadmap
    RED HAT ENTERPRISE LINUX ROADMAP Ron Pacheco Perry Myers Director, Red Hat Enterprise Linux Senior Director, Red Hat Enterprise Linux Product Management Engineering 8 May, 2019 AGENDA Recap RHEL 8 announcement Red Hat® Enterprise Linux® roadmap Customer problems and solutions A few new things on the horizon Q&A RHEL 8 ANNOUNCEMENT Red Hat Insights with all RHEL subscriptions Application Streams Red Hat Enterprise Linux web console Red Hat Enterprise Linux System Roles “What’s new in Red Hat Enterprise Linux 8” - Wednesday 4:30 - 5:15 PM RED HAT INSIGHTS Included with your Red Hat Enterprise Linux subscription RED HAT INSIGHTS Automated, experience driven, proactive guidance for customer success Continuous identification of new risks driven by unique industry data DISCOVER VALIDATE Based on real-world results from millions of enterprise deployments 1,000,000+ 100,000+ solved cases Unique solutions No new infrastructure to manage Integrates with tools you already have ANALYTICS RESOLVE MACHINE LEARNING AUTOMATION “85% of critical issues raised to Red Hat® support are already known to Red Hat or our partners.” — RED HAT GLOBAL SUPPORT SERVICES “Getting Started with Red Hat Insights” - (recording) Tuesday 3:45 - 4:30 PM KEY RISKS DISCOVERED Tailored resolution steps included for resolution Performance issue Recommended action Network interface is not performing Check cable, connections, and remote at maximum speed switch settings Security risk detected Recommended action Privilege escalation Apply mitigation and update the kernel Availability Recommended action OpenShift operations fail if insufficient Increase CPU and/or memory CPU or memory reservation Stability Recommended action Filesystem has exceeded Increase free space on the host.
    [Show full text]
  • Integrating Openshift Enterprise with Identity Management (Idm) in Red Hat Enterprise Linux
    Integrating OpenShift Enterprise with Identity Management (IdM) in Red Hat Enterprise Linux OpenShift Enterprise 2.2 IdM in Red Hat Enterprise Linux 7 Windows Server 2012 - Active Directory Integration Mark Heslin Principal Systems Engineer Version 1.1 January 2015 1801 Varsity Drive™ Raleigh NC 27606-2072 USA Phone: +1 919 754 3700 Phone: 888 733 4281 Fax: +1 919 754 3701 PO Box 13588 Research Triangle Park NC 27709 USA Linux is a registered trademark of Linus Torvalds. Red Hat, Red Hat Enterprise Linux and the Red Hat "Shadowman" logo are registered trademarks of Red Hat, Inc. in the United States and other countries. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. UNIX is a registered trademark of The Open Group. Intel, the Intel logo and Xeon are registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. All other trademarks referenced herein are the property of their respective owners. © 2014 by Red Hat, Inc. This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/). The information contained herein is subject to change without notice. Red Hat, Inc. shall not be liable for technical or editorial errors or omissions contained herein. Distribution of modified versions of this document is prohibited without the explicit permission of Red Hat Inc. Distribution of this work or derivative of this work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from Red Hat Inc.
    [Show full text]
  • FORM 10−K RED HAT INC − RHT Filed: April 30, 2007 (Period: February 28, 2007)
    FORM 10−K RED HAT INC − RHT Filed: April 30, 2007 (period: February 28, 2007) Annual report which provides a comprehensive overview of the company for the past year Table of Contents PART I Item 1. Business 3 PART I ITEM 1. BUSINESS ITEM 1A. RISK FACTORS ITEM 1B. UNRESOLVED STAFF COMMENTS ITEM 2. PROPERTIES ITEM 3. LEGAL PROCEEDINGS ITEM 4. SUBMISSION OF MATTERS TO A VOTE OF SECURITY HOLDERS PART II ITEM 5. MARKET FOR REGISTRANT S COMMON EQUITY, RELATED STOCKHOLDER MATTERS AND ISSUER PURCHASES OF E ITEM 6. SELECTED FINANCIAL DATA ITEM 7. MANAGEMENT S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS ITEM 7A. QUANTITATIVE AND QUALITATIVE DISCLOSURES ABOUT MARKET RISK ITEM 8. FINANCIAL STATEMENTS AND SUPPLEMENTARY DATA ITEM 9. CHANGES IN AND DISAGREEMENTS WITH ACCOUNTANTS ON ACCOUNTING AND FINANCIAL DISCLOSURE ITEM 9A. CONTROLS AND PROCEDURES ITEM 9B. OTHER INFORMATION Part III ITEM 10. DIRECTORS, EXECUTIVE OFFICERS AND CORPORATE GOVERNANCE ITEM 11. EXECUTIVE COMPENSATION ITEM 12. SECURITY OWNERSHIP OF CERTAIN BENEFICIAL OWNERS AND MANAGEMENT AND RELATED STOCKHOLDER MATT ITEM 13. CERTAIN RELATIONSHIPS AND RELATED TRANSACTIONS, AND DIRECTOR INDEPENDENCE ITEM 14. PRINCIPAL ACCOUNTANT FEES AND SERVICES PART IV ITEM 15. EXHIBITS, FINANCIAL STATEMENT SCHEDULES SIGNATURES EX−21.1 (SUBSIDIARIES OF RED HAT) EX−23.1 (CONSENT PF PRICEWATERHOUSECOOPERS LLP) EX−31.1 (CERTIFICATION) EX−31.2 (CERTIFICATION) EX−32.1 (CERTIFICATION) Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10−K Annual Report Pursuant to Sections 13 or 15(d) of the Securities Exchange Act of 1934 (Mark One) x Annual Report Pursuant to Section 13 or 15(d) of the Securities Exchange Act of 1934 For the fiscal year ended February 28, 2007 OR ¨ Transition Report Pursuant to Section 13 or 15(d) of the Securities Exchange Act of 1934 For the transition period from to .
    [Show full text]
  • Technology Overview New Features Backupedge
    Technology Overview - BackupEDGE™ Introduction to the New Features in BackupEDGE 3.x Technology Overview BackupEDGE has a long history of providing reliable data protection for New Features many thousands of users. As operating systems, storage devices and BackupEDGE 3.x usage needs and tendencies have changed over the years, it has continuously met the challenge of providing inexpensive, stable backup and disaster recovery on a variety of UNIX and Linux platforms. Clients routinely find new and clever ways to utilize products. Storage devices have taken on new and exciting features, and incredible capacities. Products designed years ago had built-in limits that were thought to be beyond comprehension. Today, these limits are routinely exceeded. The need for data security is even more apparent. We’re constantly asking our To continue to meet the evolving needs of our clients, we are always clients what tools our asking what features of our products they find most useful, what products need to serve them improvements we can make, and what new requirements they have. better. We’ve used this knowledge to map out new product strategies designed to anticipate the needs of the next generation of users, systems and storage products. This has resulted in the creation of BackupEDGE 3.x, with a combination of internal improvements, new features and enhanced infrastructure designed to become the backbone of a new generation of storage software. Summary of Major Changes and Additions BackupEDGE 3.x features include: • Improvements to partition sizing, UEFI table cleanup after DR, and SharpDrive debugging (03.04.01 build 3). • Support for Rocky Linux 8.4 and AlmaLinux 8.4 (03.04.01 build 2).
    [Show full text]
  • Select Red Hat Vs. Canonical When Building a Private Cloud
    SELECT RED HAT VS. CANONICAL WHEN BUILDING A PRIVATE CLOUD COMPETITIVE REVIEW BUSINESS CHALLENGES “Red Hat offers us a cloud solution that can Executives recognize that inflexible datacenter infrastructures make it difficult for IT organizations to support dynamic business priorities. However, balancing competitive pressures for innovative be integrated with our solutions against the need to work around unresponsive and unmanageable IT resources results previous infrastructure, in only incremental improvements. One way to bridge this gap is to use private clouds. While without the need to many companies are turning to OpenStack® technology, they understand that OpenStack alone demount what we is not enough. Companies need solutions that work together and are backed by enterprise-class support—from the hypervisor and operating system to the application layer—to help ensure their already had in place IT infrastructures can meet service-level agreements and support business priorities. to continue moving PRODUCT OVERVIEW forward.” Red Hat’s cloud portfolio is helping universities like NTU and telecom enterprises like Telefónica SARA ISABEL RUBIO, build cloud infrastructures that can flex to meet their dynamic business requirements. Red Hat® GLOBAL PLATFORMS OPERATION ® AND SECURITY, TELEFÓNICA GLOBAL Enterprise Linux OpenStack Platform, a massively scalable Infrastructure-as-a-Service SOLUTIONS (IaaS) offering, is the foundation of that portfolio. Built on OpenStack technology and Red Hat Enterprise Linux, the solution lets IT staff take advantage of the largest and fastest-growing We evaluated Red Hat open source cloud infrastructure project, while maintaining security, stability, and enterprise “ readiness. Cloud Infrastructure to be one of the most MORE THAN JUST OPENSTACK 1 versatile and complete OpenStack depends on Linux to provide: cloud solutions • The operating environment for OpenStack components.
    [Show full text]