Nxadmin CLI Reference Guide Unity Iv Contents

Total Page:16

File Type:pdf, Size:1020Kb

Nxadmin CLI Reference Guide Unity Iv Contents HYPER-UNIFIED STORAGE nxadmin Command Line Interface Reference Guide NEXSAN | 325 E. Hillcrest Drive, Suite #150 | Thousand Oaks, CA 91360 USA Printed Thursday, July 26, 2018 | www.nexsan.com Copyright © 2010—2018 Nexsan Technologies, Inc. All rights reserved. Trademarks Nexsan® is a trademark or registered trademark of Nexsan Technologies, Inc. The Nexsan logo is a registered trademark of Nexsan Technologies, Inc. All other trademarks and registered trademarks are the property of their respective owners. Patents This product is protected by one or more of the following patents, and other pending patent applications worldwide: United States patents US8,191,841, US8,120,922; United Kingdom patents GB2466535B, GB2467622B, GB2467404B, GB2296798B, GB2297636B About this document Unauthorized use, duplication, or modification of this document in whole or in part without the written consent of Nexsan Corporation is strictly prohibited. Nexsan Technologies, Inc. reserves the right to make changes to this manual, as well as the equipment and software described in this manual, at any time without notice. This manual may contain links to web sites that were current at the time of publication, but have since been moved or become inactive. It may also contain links to sites owned and operated by third parties. Nexsan is not responsible for the content of any such third-party site. Contents Contents Contents iii Chapter 1: Accessing the nxadmin and nxcmd CLIs 15 Connecting to the Unity Storage System using SSH 15 Prerequisite 15 Connecting to the Unity Storage System from the IPMI Web-based interface 16 Prerequisite 16 Connecting to the Unity Storage System via remote console 18 Chapter 2: Using the nxadmin CLI’s command-based shell 19 aclpropagate 19 De s c ription 19 Co n troller 20 Syntax 20 Op tion s 20 Ex ample1 20 Ex ample2 21 arp 21 De s c ription 21 Co n troller 21 Syntax 21 Op tion s 21 Ex ample 22 audit 23 De s c ription 23 Co n troller 23 Syntax 23 Op tion s 23 Ex ample 23 autolog 24 De s c ription 24 Co n troller 24 Syntax 24 Op tion s 24 Ex ample 25 bedit 25 De s c ription 25 Co n troller 25 Syntax 25 Op tion s 25 callhome 26 De s c ription 26 Co n troller 26 Syntax 26 Op tion s 26 Ex ample1 27 Ex ample2 27 Ex ample3 28 cat 28 De s c ription 28 Co n troller 28 Syntax 28 Op tion s 28 cd 28 De s c ription 28 Co n troller 29 Syntax 29 Op tion s 29 Ex ample 29 changeenclosureid 29 De s c ription 29 Co n troller 29 Syntax 29 Op tion s 29 Ex ample 29 changenameservices 30 De s c ription 30 Co n troller 30 Syntax 30 Op tion s 30 Ex ample 31 chmod 31 De s c ription 31 Co n troller 31 Syntax 31 Op tion s 31 Abs oluteMode 32 Sy mb o licMode 32 ACLOp e ration 33 Attribu teOp e ration 35 Ex ample 36 cleandev 36 De s c ription 37 Co n troller 37 Syntax 37 Op tion s 37 Ex ample 38 clustering 38 De s c ription 38 Co n troller 38 Syntax 38 Op tion s 39 Ex ample 39 createlogpackage 39 De s c ription 39 Co n troller 39 Syntax 40 Op tion s 40 Ex ample 40 dataproperty 40 De s c ription 40 Co n troller 40 Syntax 40 Op tion s 41 Ex ample1 42 Nexsan Unity www.nexsan.com iii Contents Ex ample2 42 Ex ample3 42 Ex ample4 42 date 43 De s c ription 43 Co n troller 43 Syntax 43 Op tion s 43 Ex ample1 44 Ex ample2 44 diskhbcfg 44 De s c ription 44 Co n troller 44 Syntax 44 Op tion s 44 Ex ample 45 domain name 45 De s c ription 45 Co n troller 45 Syntax 45 Op tion s 45 Ex ample 45 drives 46 De s c ription 46 Co n troller 46 Syntax 46 Op tion s 46 Ex ample 46 echo 47 De s c ription 47 Co n troller 47 Syntax 47 Op tion s 47 Ex ample 47 edit 48 De s c ription 48 Co n troller 48 Syntax 48 Op tion s 48 enforcessl 48 De s c ription 48 Co n troller 48 Syntax 48 Op tion s 48 errorlog 48 De s c ription 49 Co n troller 49 Syntax 49 Op tion s 49 Ex ample 49 eventflag 49 De s c ription 49 Co n troller 49 Syntax 49 Op tion s 50 exit 50 De s c ription 50 Co n troller 50 Syntax 50 Op tion s 50 fcstat 50 De s c ription 50 Co n troller 50 Syntax 50 Op tion s 50 Ex ample 51 firewall 51 De s c ription 51 Co n troller 51 Syntax 51 Op tion s 51 Ex ample 52 format 53 De s c ription 53 Co n troller 53 Syntax 53 Op tion s 53 Ex ample 53 ftpconfig 53 De s c ription 54 Co n troller 54 Syntax 54 Op tion s 54 Ex ample 55 groupadd 55 De s c ription 55 Co n troller 55 Syntax 56 Op tion s 56 Ex ample 56 groupdel 56 De s c ription 56 Co n troller 56 Syntax 56 Ex ample 56 help 56 De s c ription 57 Co n troller 57 Syntax 57 Op tion s 57 Ex ample 57 hostname 57 De s c ription 57 Co n troller 57 Syntax 57 Op tion s 57 Ex ample1 57 Ex ample2 57 ifconfig 58 De s c ription 58 Co n troller 58 Syntax 58 Op tion s 58 Ex ample 58 info 58 De s c ription 58 Co n troller 58 Syntax 58 Op tion s 58 Ex ample 58 iostat 59 De s c ription 59 Co n troller 59 Syntax 59 Op tion s 59 Ex ample 61 intmonitoring 61 De s c ription 61 Co n troller 61 Syntax 62 Op tion s 62 Ex ample 62 ipmi 62 De s c ription 62 Co n troller 62 Syntax 62 Op tion s 62 ipmitool 63 De s c ription 63 Co n troller 63 Syntax 63 Op tion s 63 Su b -Commands 64 Ex ample1 66 Ex ample2 66 isainfo 66 De s c ription 66 Co n troller 66 Syntax 66 Op tion s 66 Ex ample 67 kill 67 De s c ription 67 Co n troller 67 Syntax 67 Op tion s 67 Ex ample 67 led 67 De s c ription 68 Co n troller 68 Syntax 68 Op tion s 68 Ex ample1 69 Ex ample2 70 Ex ample3 70 Ex ample4 70 listfcclients 70 De s c ription 70 Co n troller 70 Syntax 70 Op tion s 70 Ex ample 70 listug 71 De s c ription 71 Co n troller 71 Syntax 71 Op tion s 71 Ex ample 71 logrotate 71 De s c ription 71 Co n troller 71 Syntax 71 Ge n e raloptions 72 Op tion s c o n trolling whenalog fileisrotated 73 Op tion s c o n trolling howalog fileisrotated 74 Op tion s c o n trolling the e x p iration o fo ldlog files 75 Ex ample 76 ls 76 De s c ription 76 Co n troller 76 Syntax 77 Op tion s 77 Pe rmiss ion s a rgu me n t 79 Inh e ritan c e a rgu me n t 80 Ex ample1 81 Ex ample2 81 Ex ample3 81 lun 82 Nexsan Unity nxadmin CLI Reference Guide Unity iv Contents De s c ription 82 Co n troller 82 Syntax 82 Op tion s 82 Ex ample 83 maintenance 83 De s c ription 83 Co n troller 83 Syntax 83 Op tion s 83 Ex ample 83 man 84 De s c ription 84 Co n troller 84 Syntax 84 Op tion s 84 Ex ample 84 md5sum 84 De s c ription 84 Co n troller 84 Syntax 84 Op tion s 84 Ex ample 84 menu 84 De s c ription 85 Co n troller 85 Syntax 85 Op tion s 85 modgid 85 De s c ription 85 Co n troller 85 Syntax 85 Op tion s 85 Ex ample1 85 Ex ample2 85 moduid 85 De s c ription 86 Co n troller 86 Syntax 86 Op tion s 86 Ex ample 86 mpstat 86 De s c ription 86 Co n troller 87 Syntax 87 Op tion s 87 Ex ample 87 netstat 88 De s c ription 88 Co n troller 88 Syntax 88 Op tion s 88 Ex ample 91 ndmpsnap 92 De s c ription 92 Co n troller 92 Syntax 92 Op tion s 92 Ex ample 92 network 92 De s c ription 93 Co n troller 93 Syntax 93 Op tion s 93 Ex ample 93 nfs 94 De s c ription 94 Co n troller 94 Syntax 94 Op tion s 94 Ex ample 94 nfsstat 95 De s c ription 95 Co n troller 95 Syntax 95 Op tion s 95 Ex ample 96 nic 96 De s c ription 96 Co n troller 96 Syntax 96 Op tion s 97 Ex ample1 104 Ex ample2 104 Ex ample3 104 Ex ample4 104 nics 105 De s c ription 105 Co n troller 105 Syntax 105 Op tion s 105 Ex ample 105 nicstat 105 De s c ription 106 Co n troller 106 Syntax 106 Op tion s 106 Ex ample 107 nmp 107 De s c ription 107 Co n troller 107 Syntax 107 Op tion s 107 Ex ample 107 nscacherestart 107 De s c ription 108 Co n troller 108 Syntax 108 Op tion s 108 nstds 108 De s c ription 108 Co n troller 108 Syntax 108 Op tion s 108 Ex ample 108 nstfcdata 108 De s c ription 109 Co n troller 109 Syntax 109 Op tion s 109 Ex ample 110 nstndmp 110 Recommended settings 110 NAS name 110 User name and password 110 Backup level 110 De s c ription 110 Co n troller 110 Syntax 110 Op tion s 111 Ex ample 114 nstpool 114 De s c ription 114 Co n troller 115 Syntax 115 Op tion s 115 Ex ample 115 nstsasdata 116 De s c ription 116 Co n troller 116 Syntax 116 Op tion s 117 Ex ample1 118 Ex ample2 118 Ex ample3 118 Ex ample4 119 Ex ample5 119 nstsharectl 119 De s c ription 119 Syntax 120 Co n troller 120 Op tion s 120 Ex ample1 120 Ex ample2 120 Ex ample3 121 Ex ample4 121 Ex ample5 121 nstusermaps 122 De s c ription 122 Co n troller 122 Syntax 122 Op tion s 122 Ex ample1 124 Ex ample2 124 Ex ample3 124 Ex ample4 124 nstvault 125 De s c ription 125 Co n troller 125 Syntax 125 Op tion s 125 Ex ample 125 ntpdate 126 De s c ription 126 Co n troller 126 Syntax 126 Op tion s 126 Ex ample 126 nvram 127 De s c ription 127 Co n troller 127 Syntax 127 Op tion s 127 Ex ample1 127 Ex ample2 127 Ex ample3 128 nxcmd 128 De s c ription 128 Co n troller 128 Syntax 128 Op tion s 128 Nexsan Unity www.nexsan.com v Contents nxservices 129 De s c ription 129 Co n troller 129 Syntax 129 Op tion s 129 Su b -commands 130 Ex ample 130 passwd 130 De s c ription 130 Co n troller 130 Syntax 131 Op tion s 131 peer 131 De s c ription 131 Co n troller 131 Syntax 131 Op tion s 131 Ex ample 131 perfmon 131 De s c ription 131 Co n troller 132 Syntax 132 Op tion s 132 Ex ample1 132 Ex ample2 132 Ex ample3 133 performance 133 De s c ription 133 Co n troller 133 Syntax 133 Op tion s 133 Ex ample 133 ping 134 De s c ription 134 Co n troller 134 Syntax 134 Op tion s 134 Ex ample 136 prompt 137 De s c ription 137 Co n troller 137 Syntax 137 Op tion s 137 Ex ample 137 ps 138 De s c ription 138 Co n troller 138 Syntax 138 Op tion s 139 Ex ample 140 ptree 140 De s c ription 140 Co n troller 140 Syntax 141 Op tion s 141 Ex ample 141 pwd 142 De s c ription 142 Co n troller 142 Syntax 142 Op tion s 142 Ex ample 142 reboot 142
Recommended publications
  • Oracle® Linux 7 Monitoring and Tuning the System
    Oracle® Linux 7 Monitoring and Tuning the System F32306-03 October 2020 Oracle Legal Notices Copyright © 2020, Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • Pingdirectory Administration Guide Version
    Release 7.3.0.3 Server Administration Guide PingDirectory | Contents | ii Contents PingDirectory™ Product Documentation................................................ 20 Overview of the Server............................................................................. 20 Server Features.................................................................................................................................20 Administration Framework.................................................................................................................21 Server Tools Location....................................................................................................................... 22 Preparing Your Environment....................................................................22 Before You Begin.............................................................................................................................. 22 System requirements..............................................................................................................22 Installing Java......................................................................................................................... 23 Preparing the Operating System (Linux).......................................................................................... 24 Configuring the File Descriptor Limits.................................................................................... 24 File System Tuning.................................................................................................................25
    [Show full text]
  • Linux Performance Tools
    Linux Performance Tools Brendan Gregg Senior Performance Architect Performance Engineering Team [email protected] @brendangregg This Tutorial • A tour of many Linux performance tools – To show you what can be done – With guidance for how to do it • This includes objectives, discussion, live demos – See the video of this tutorial Observability Benchmarking Tuning Stac Tuning • Massive AWS EC2 Linux cloud – 10s of thousands of cloud instances • FreeBSD for content delivery – ~33% of US Internet traffic at night • Over 50M subscribers – Recently launched in ANZ • Use Linux server tools as needed – After cloud monitoring (Atlas, etc.) and instance monitoring (Vector) tools Agenda • Methodologies • Tools • Tool Types: – Observability – Benchmarking – Tuning – Static • Profiling • Tracing Methodologies Methodologies • Objectives: – Recognize the Streetlight Anti-Method – Perform the Workload Characterization Method – Perform the USE Method – Learn how to start with the questions, before using tools – Be aware of other methodologies My system is slow… DEMO & DISCUSSION Methodologies • There are dozens of performance tools for Linux – Packages: sysstat, procps, coreutils, … – Commercial products • Methodologies can provide guidance for choosing and using tools effectively • A starting point, a process, and an ending point An#-Methodologies • The lack of a deliberate methodology… Street Light An<-Method 1. Pick observability tools that are: – Familiar – Found on the Internet – Found at random 2. Run tools 3. Look for obvious issues Drunk Man An<-Method • Tune things at random until the problem goes away Blame Someone Else An<-Method 1. Find a system or environment component you are not responsible for 2. Hypothesize that the issue is with that component 3. Redirect the issue to the responsible team 4.
    [Show full text]
  • UNIX OS Agent User's Guide
    IBM Tivoli Monitoring Version 6.3.0 UNIX OS Agent User's Guide SC22-5452-00 IBM Tivoli Monitoring Version 6.3.0 UNIX OS Agent User's Guide SC22-5452-00 Note Before using this information and the product it supports, read the information in “Notices” on page 399. This edition applies to version 6, release 3 of IBM Tivoli Monitoring (product number 5724-C04) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 1994, 2013. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Tables ...............vii Solaris System CPU Workload workspace ....28 Solaris Zone Processes workspace .......28 Chapter 1. Using the monitoring agent . 1 Solaris Zones workspace ..........28 System Details workspace .........28 New in this release ............2 System Information workspace ........29 Components of the monitoring agent ......3 Top CPU-Memory %-VSize Details workspace . 30 User interface options ...........4 UNIX OS workspace ...........30 UNIX Detail workspace ..........31 Chapter 2. Requirements for the Users workspace ............31 monitoring agent ...........5 Enabling the Monitoring Agent for UNIX OS to run Chapter 4. Attributes .........33 as a nonroot user .............7 Agent Availability Management Status attributes . 36 Securing your IBM Tivoli Monitoring installation 7 Agent Active Runtime Status attributes .....37 Setting overall file ownership and permissions for AIX AMS attributes............38
    [Show full text]
  • Cisco Identity Services Engine CLI Reference Guide, Release 2.2 Americas Headquarters Cisco Systems, Inc
    Cisco Identity Services Engine CLI Reference Guide, Release 2.2 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • SUSE Linux Enterprise Server 11 SP4 System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 11 SP4
    SUSE Linux Enterprise Server 11 SP4 System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 11 SP4 Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see http://www.suse.com/company/legal/ . All other third party trademarks are the property of their respective owners. A trademark symbol (®, ™ etc.) denotes a SUSE or Novell trademark; an asterisk (*) denotes a third party trademark. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xi 1 Available Documentation xii 2 Feedback xiv 3 Documentation Conventions xv I BASICS 1 1 General Notes on System Tuning 2 1.1 Be Sure What Problem to Solve 2 1.2 Rule Out Common Problems 3 1.3 Finding the Bottleneck 3 1.4 Step-by-step Tuning 4 II SYSTEM MONITORING 5 2 System Monitoring Utilities 6 2.1 Multi-Purpose Tools 6 vmstat 7
    [Show full text]
  • System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 15 SP1
    SUSE Linux Enterprise Server 15 SP1 System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 15 SP1 An administrator's guide for problem detection, resolution and optimization. Find how to inspect and optimize your system by means of monitoring tools and how to eciently manage resources. Also contains an overview of common problems and solutions and of additional help and documentation resources. Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xii 1 Available Documentation xiii
    [Show full text]
  • SQL Server on Linux Fundamentals for Dbas
    [email protected] Choice Containers Supported Platform version(s) Red Hat Enterprise Linux 7.3 or 7.4 SUSE Linux Enterprise Server v12 SP2 Ubuntu 16.04 Docker Engine 1.8+ Command What it does man Manual – help files for a command grep Filter info from first data - sort of like POSH | pwd Present Working Directory – shows where you are cd Change directory ls List files in a directory cat Concatenate chmod Change directory or file read/write permissions chown Change directory or file owner systemctl Tool for controlling the init system – start and stop services File and folder permissions rwxr-xr-x sudo systemctl restart mssql-server / root (equivalent of C:\) /bin system binaries /dev devices /etc host-specific system-wide config files /home/username user's directory /opt optional software packages - like SQL Server /var files with frequently varying content – like data and log files SQL Server 2019 preview and RC Preview (2019) mssql-server-preview repository. CU - base package + bug SQL Server 2017 Cumulative Update fixes mssql-server-2017 (CU) repository. GDR - base package + critical SQL Server 2017 GDR repository for fixes/security updates mssql-server-2017-gdr critical updates only. sudo dpkg -i mssql-server_versionnumber_amd64.deb sqlcmd -S localhost -U <username> -P <password> sudo cat /var/opt/mssql/mssql.conf sudo /opt/mssql/bin/mssql-conf set sqlagent.enabled true Enable SQL Server Agent Change default file directories Enable Availability Groups Set the memory limit for SQL Server Set trace flags ...and more df file system
    [Show full text]
  • Unix and Linux System Administration and Shell Programming
    Unix and Linux System Administration and Shell Programming Unix and Linux System Administration and Shell Programming version 56 of August 12, 2014 Copyright © 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2009, 2010, 2011, 2012, 2013, 2014 Milo This book includes material from the http://www.osdata.com/ website and the text book on computer programming. Distributed on the honor system. Print and read free for personal, non-profit, and/or educational purposes. If you like the book, you are encouraged to send a donation (U.S dollars) to Milo, PO Box 5237, Balboa Island, California, USA 92662. This is a work in progress. For the most up to date version, visit the website http://www.osdata.com/ and http://www.osdata.com/programming/shell/unixbook.pdf — Please add links from your website or Facebook page. Professors and Teachers: Feel free to take a copy of this PDF and make it available to your class (possibly through your academic website). This way everyone in your class will have the same copy (with the same page numbers) despite my continual updates. Please try to avoid posting it to the public internet (to avoid old copies confusing things) and take it down when the class ends. You can post the same or a newer version for each succeeding class. Please remove old copies after the class ends to prevent confusing the search engines. You can contact me with a specific version number and class end date and I will put it on my website. version 56 page 1 Unix and Linux System Administration and Shell Programming Unix and Linux Administration and Shell Programming chapter 0 This book looks at Unix (and Linux) shell programming and system administration.
    [Show full text]
  • Smaller Flight Data Recorders{
    Available online at http://docs.lib.purdue.edu/jate Journal of Aviation Technology and Engineering 2:2 (2013) 45–55 Smaller Flight Data Recorders{ Yair Wiseman and Alon Barkai Bar-Ilan University Abstract Data captured by flight data recorders are generally stored on the system’s embedded hard disk. A common problem is the lack of storage space on the disk. This lack of space for data storage leads to either a constant effort to reduce the space used by data, or to increased costs due to acquisition of additional space, which is not always possible. File compression can solve the problem, but carries with it the potential drawback of the increased overhead required when writing the data to the disk, putting an excessive load on the system and degrading system performance. The author suggests the use of an efficient compressed file system that both compresses data in real time and ensures that there will be minimal impact on the performance of other tasks. Keywords: flight data recorder, data compression, file system Introduction A flight data recorder is a small line-replaceable computer unit employed in aircraft. Its function is recording pilots’ inputs, electronic inputs, sensor positions and instructions sent to any electronic systems on the aircraft. It is unofficially referred to as a "black box". Flight data recorders are designed to be small and thoroughly fabricated to withstand the influence of high speed impacts and extreme temperatures. A flight data recorder from a commercial aircraft can be seen in Figure 1. State-of-the-art high density flash memory devices have permitted the solid state flight data recorder (SSFDR) to be implemented with much larger memory capacity.
    [Show full text]
  • The Pillars of Lossless Compression Algorithms a Road Map and Genealogy Tree
    International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 6 (2018) pp. 3296-3414 © Research India Publications. http://www.ripublication.com The Pillars of Lossless Compression Algorithms a Road Map and Genealogy Tree Evon Abu-Taieh, PhD Information System Technology Faculty, The University of Jordan, Aqaba, Jordan. Abstract tree is presented in the last section of the paper after presenting the 12 main compression algorithms each with a practical This paper presents the pillars of lossless compression example. algorithms, methods and techniques. The paper counted more than 40 compression algorithms. Although each algorithm is The paper first introduces Shannon–Fano code showing its an independent in its own right, still; these algorithms relation to Shannon (1948), Huffman coding (1952), FANO interrelate genealogically and chronologically. The paper then (1949), Run Length Encoding (1967), Peter's Version (1963), presents the genealogy tree suggested by researcher. The tree Enumerative Coding (1973), LIFO (1976), FiFO Pasco (1976), shows the interrelationships between the 40 algorithms. Also, Stream (1979), P-Based FIFO (1981). Two examples are to be the tree showed the chronological order the algorithms came to presented one for Shannon-Fano Code and the other is for life. The time relation shows the cooperation among the Arithmetic Coding. Next, Huffman code is to be presented scientific society and how the amended each other's work. The with simulation example and algorithm. The third is Lempel- paper presents the 12 pillars researched in this paper, and a Ziv-Welch (LZW) Algorithm which hatched more than 24 comparison table is to be developed.
    [Show full text]
  • The Deep Learning Solutions on Lossless Compression Methods for Alleviating Data Load on Iot Nodes in Smart Cities
    sensors Article The Deep Learning Solutions on Lossless Compression Methods for Alleviating Data Load on IoT Nodes in Smart Cities Ammar Nasif *, Zulaiha Ali Othman and Nor Samsiah Sani Center for Artificial Intelligence Technology (CAIT), Faculty of Information Science & Technology, University Kebangsaan Malaysia, Bangi 43600, Malaysia; [email protected] (Z.A.O.); [email protected] (N.S.S.) * Correspondence: [email protected] Abstract: Networking is crucial for smart city projects nowadays, as it offers an environment where people and things are connected. This paper presents a chronology of factors on the development of smart cities, including IoT technologies as network infrastructure. Increasing IoT nodes leads to increasing data flow, which is a potential source of failure for IoT networks. The biggest challenge of IoT networks is that the IoT may have insufficient memory to handle all transaction data within the IoT network. We aim in this paper to propose a potential compression method for reducing IoT network data traffic. Therefore, we investigate various lossless compression algorithms, such as entropy or dictionary-based algorithms, and general compression methods to determine which algorithm or method adheres to the IoT specifications. Furthermore, this study conducts compression experiments using entropy (Huffman, Adaptive Huffman) and Dictionary (LZ77, LZ78) as well as five different types of datasets of the IoT data traffic. Though the above algorithms can alleviate the IoT data traffic, adaptive Huffman gave the best compression algorithm. Therefore, in this paper, Citation: Nasif, A.; Othman, Z.A.; we aim to propose a conceptual compression method for IoT data traffic by improving an adaptive Sani, N.S.
    [Show full text]