A Network File System is a distributed file system protocol that supports remote hosts to mount file systems through the network and interact with the file systems as though they are mounted sectionally. This allows us to connect resources to centralized servers on the network. Amazon EFS-Elastic File System gives you a simple, scalable, and fully managed elastic NFS file system to use with AWS Cloud services and on-premises resources. In this demonstration, we will show you how to configure a Network File System-NFS using AWS EFS and connect to …
This documentation will show you how to create an LVM partition on an AWS EBS volume. LVM is a storage virtualization technology that offers a flexible way to manage disk space. Using LVM we can have multiple virtual partitions on a physical volume or a single virtual partition over numerous physical volumes. 1. Deploy an EC2 instance Login to your AWS management console and search for EC2. On the EC2 dashboard, click Launch Instance to deploy a virtual machine. Provide an instance name and choose the OS image, key pair, …
Developers and platform engineers have much to gain from using both Google App Engine and Compute Engine, as these cloud computing solutions offer distinct benefits during the various stages of application development. Despite their similar names, these two services serve different purposes, with Google App Engine functioning as a Platform as a Service (PaaS) and Google Compute Engine operating as an Infrastructure as a Service (IaaS). PaaS solutions like Google App Engine offer a platform where developers can build and deploy their applications without having to worry about managing the …
Google Cloud Storage is an object storage service that provides multiple features such as High availability Built-in server-side encryption Different storage classes Lifecycle management Saving an object in a cloud storage bucket is usually inexpensive depending on the storage class we use. The Google Cloud Storage pricing per GB is low but when it comes to a large volume of data or multiple APIs operations, it will increase the cost quickly. Here, the Google Cloud Storage Lifecycle Management Rules provide you with a solution to deal with different and unpredictable …
The ionice command is used to set I/O scheduling class and priority for a program. The I/O schedule for a program can be changed to the following: CFQ Noop scheduler Anticipatory Deadline The current Disk Scheduler can be viewed from root@twenty ~]# cat /sys/block/sd[ab]/queue/schedulernoop anticipatory deadline [cfq] The current scheduler can be changed by [root@twenty queue]# echo anticipatory > scheduler[root@twenty queue]# cat /sys/block/sda/queue/schedulernoop [anticipatory] deadline cfq Ionice Utility The ionice sets the io scheduling class and priority for a program or script. It supports the following three scheduling classes Idle: …
SupportPRO joins CloudFest 2023: World’s largest Cloud Industry Conference
Greetings everyone, I am excited to announce that SupportPRO will be attending CloudFest 2023, the world’s largest cloud-computing conference, taking place from March 20 to 23, 2023, at Europa Park, Germany. Since our inception, we have been part of every iteration of CloudFest, and this year will be our best one yet. As the CEO and Founder of SupportPRO, I am eager to connect with you and discuss how our team can assist you in optimizing your internet infrastructure to meet your business needs. At SupportPRO, we specialize in remote …
Data recovery is the process of salvaging and handling the data through the data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. The data is recoverable because the information is not immediately removed from the disk. Nowadays many tools are available for recovering lost data. Two of the most popular tool available are Scalpel and Foremost. In this article, let’s see how to recover lost data using these tools. 1. Scalpel Scalpel is an open source file system recovery for Linux and Mac …
A fork bomb is a type of denial-of-service attack that can be executed on a computer system. It is a malicious program or script that creates a large number of processes, overwhelming the system and causing it to slow down or crash. The fork bomb works by creating a large number of child processes, which in turn create more child processes, leading to an exponential growth in the number of processes. The code for a fork bomb is often written in bash and executed in the command line. Once activated, …
If you’re having issues with outgoing mail service in Linux-Qmail server, where all outgoing emails or emails to any specific domain are getting stuck in the remote queue, don’t worry. In this article, we provide a step-by-step solution to resolve the issue. The article details the issue and error message, as well as provides a resolution that includes checking the Qmail-SMTP routing, verifying connectivity to the host mentioned as a relay, and restarting the Qmail service. We also provide guidance on checking the mail log and Qmail queue to ensure …
Outsourced tech support is when you hire an external company to handle your business’s technical support. It is becoming increasingly popular among small to medium businesses as an affordable solution for their IT support needs. The benefits of outsourced tech support include reduced costs compared to hiring an in-house team, flexibility in scaling up or down as required, the opportunity to focus more on your business’s core functions, and access to up-to-date server technology and practices. Outsourcing Tech Support: Advantages As mentioned, the most significant advantage of outsourced tech support …