Solaris Zones (native & lxbranded) ~ A techXpress Guide ~ Creating & Managing Solaris Zones; Mirroring an existing Linux Setup to a Zone; Setting up SVN, CIFS over a Zone
This document provides a cheat sheet on common Logical Volume Manager (LVM) commands for displaying, creating, modifying, and troubleshooting physical volumes (PVs), volume groups (VGs), and logical volumes (LVs) in Linux. It lists directory locations and files related to LVM, describes tools for diagnostics and debugging, and provides examples of commands for scanning and managing PVs, VGs, and LVs, including displaying information, creating, extending, reducing, removing, and changing attributes of volumes. It also discusses snapshots, mirroring, and procedures for repairing corrupted LVM metadata with and without replacing faulty disks.
Docker provides containerization capabilities while Ansible provides automation and configuration capabilities. Together they are useful DevOps tools. Docker allows building and sharing application environments while Ansible automates configuration and deployment. Key points covered include Docker concepts like images and containers, building images with Dockerfiles, and using Docker Compose to run multi-container apps. Ansible is described as a remote execution and configuration tool using YAML playbooks and roles to deploy applications. Their complementary nature makes them good DevOps partners.
The document provides an overview of getting started with Docker. It discusses what Docker is, how containerization differs from virtualization, and how to install Docker. It covers building Docker images using Dockerfiles, the difference between images and containers, and common Docker commands. The document also compares traditional deployment workflows to those using Docker, demonstrating how Docker can help ensure consistency across environments.
JDO 2019: Tips and Tricks from Docker Captain - ลukasz LachPROIDEA
ย
The document provides tips and tricks for using Docker including:
1) Installing Docker on Linux in an easy way allowing choice of channel and version.
2) Setting up a local Docker Hub mirror for caching and revalidating images.
3) Using docker inspect to find containers that exited with non-zero codes or show commands for running containers.
4) Organizing docker-compose files with extensions, environment variables, anchors and aliases for well structured services.
The document provides instructions on how to install, configure, and use various Kafka tools including kaf, kafkacat, and Node-RED. It shows how to produce messages to and consume messages from Kafka topics using the command line tools kaf and kafkacat. It also demonstrates integrating Kafka with Node-RED by adding Kafka nodes to consume and produce messages.
This session will quickly show you how to describe the security configuration of your Kafka cluster in an AsyncAPI document. And if you've been given an AsyncAPI document, this session will show you how to use that to configure a Kafka client or application to connect to the cluster, using the details in the AsyncAPI spec.
Running High Performance and Fault Tolerant Elasticsearch Clusters on DockerSematext Group, Inc.
ย
Sematext engineer Rafal Kuc (@kucrafal) walks through the details of running high-performance, fault tolerant Elasticsearch clusters on Docker. Topics include: Containers vs. Virtual Machines, running the official Elasticsearch container, container constraints, good network practices, dealing with storage, data-only Docker volumes, scaling, time-based data, multiple tiers and tenants, indexing with and without routing, querying with and without routing, routing vs. no routing, and monitoring. Talk was delivered at DevOps Days Warsaw 2015.
This document summarizes a talk given at ApacheCon 2015 about replacing Squid with ATS (Apache Traffic Server) as the proxy server at Yahoo. It discusses the history of using Squid at Yahoo, limitations with Squid that prompted the switch to ATS, key differences in configuration between the two systems, examples of forwarding and reverse proxy use cases, and learnings around managing open source projects and migration testing.
The document describes Yahoo's failsafe mechanism for its homepage using Apache Storm and Apache Traffic Server. The key points are:
1. The failsafe architecture uses AWS components like EC2, ELB, S3 and autoscaling to serve traffic from failsafe servers if the primary servers fail.
2. Apache Traffic Server is used as a caching proxy between the user and origin servers. The "Escalate" plugin in ATS fetches content from failsafe servers if the origin server response is not good.
3. Apache Storm Crawler crawls content for different devices and maps URLs to the failsafe domain for storage in S3 with query parameters in the path. This provides more relevant fail
This document provides an overview of advanced Docker topics including Docker installation, Docker networking using bridges and volumes, and creating Dockerfiles. It discusses installing Docker on CentOS, the different types of Docker networks including bridge, host, overlay and macvlan. It also covers creating and managing Docker volumes, starting containers with volumes, and creating Dockerfiles with components like FROM, RUN, COPY and ENTRYPOINT.
Under the Hood with Docker Swarm Mode - Drew Erny and Nishant Totla, DockerDocker, Inc.
ย
Join SwarmKit maintainers Drew and Nishant as they showcase features that have made Swarm Mode even more powerful, without compromising the operational simplicity it was designed with. They will discuss the implementation of new features that streamline deployments, increase security, and reduce downtime. These substantial additions to Swarm Mode are completely transparent and straightforward to use, and users may not realize they're already benefiting from these improvements under the hood.
The document describes the process of setting up OpenStack Swift object storage. It includes installing and configuring Swift packages on both storage and proxy nodes, generating ring files to map objects to storage devices, and registering the Swift service with Keystone for authentication. Key steps are installing Swift packages, adding storage devices to the ring, distributing ring files, and configuring the proxy server and authentication filter.
Docker Swarm 1.1 introduces improvements to node management in Docker clusters, including monitoring node health and status from the Docker info command. It also adds experimental rescheduling of containers when nodes fail to help ensure application availability. Additional event types have been added to provide more visibility into cluster operations. The demo shows how resource constraints and networks can be used to deploy a multi-tier voting application across multiple Docker Engines managed as a single virtual Engine by Swarm.
The Docker network overlay driver relies on several technologies: network namespaces, VXLAN, Netlink and a distributed key-value store. This talk will present each of these mechanisms one by one along with their userland tools and show hands-on how they interact together when setting up an overlay to connect containers.
The talk will continue with a demo showing how to build your own simple overlay using these technologies.
This document provides an overview and instructions for Docker installation, networking, volumes, and Dockerfiles. It discusses installing Docker on CentOS, the different network drivers including bridge, and how to create and manage user-defined bridges and volumes. It also explains the components and usage of Dockerfiles to build images, including base images, environment variables, copying files, setting entrypoints and commands. The document includes examples of building an image locally and pushing it to a Docker repository.
Running services in virtualized systems provides many benefits, but has often presented performance and flexibility drawbacks. This has become critical when managing large databases, where resource usage and performance are paramount. We will explore a case study in the use of Docker to roll out multiple database servers distributed across multiple physical servers.
This document introduces Docker networking and Docker Swarm mode. It discusses the different types of Docker networks including bridge, null, and host networks. It also covers multi-host networking using overlay networks. For Docker Swarm mode, it describes the key features including self-healing, self-organizing, blue-print deployment, load balancing using a routing mesh, and not requiring additional components for service discovery or load balancing. The document aims to provide an overview of these topics and includes examples.
The Docker network overlay driver relies on several technologies: network namespaces, VXLAN, Netlink and a distributed key-value store. This talk will present each of these mechanisms one by one along with their userland tools and show hands-on how they interact together when setting up an overlay to connect containers.
The talk will continue with a demo showing how to build your own simple overlay using these technologies.
Running High Performance & Fault-tolerant Elasticsearch Clusters on DockerSematext Group, Inc.
ย
This document discusses running Elasticsearch clusters on Docker containers. It describes how Docker containers are more lightweight than virtual machines and have less overhead. It provides examples of running official Elasticsearch Docker images and customizing configurations. It also covers best practices for networking, storage, constraints, and high availability when running Elasticsearch on Docker.
Introductory Overview to Managing AWS with TerraformMichael Heyns
ย
The document provides an overview of Terraform including:
- Terraform is an open source tool from HashiCorp that allows defining and provisioning infrastructure in a code-based declarative way across multiple cloud platforms and services.
- Key concepts include providers that define cloud resources, configuration files that declare the desired state, and a plan-apply workflow to provision and manage infrastructure resources.
- Common Terraform commands are explained like init, plan, apply, destroy, output and their usage.
JDO 2019: Container orchestration with Docker Swarm - Jakub HajekPROIDEA
ย
This document discusses Docker Swarm and container orchestration. It provides an overview of key Docker Swarm features such as decentralized design, declarative service model, rolling updates, secrets, and configs. It then describes a demonstration environment running on AWS with Docker Swarm, NodeJS, Consul, Traefik, and Let's Encrypt. Diagrams are shown of the overlay networks, architecture, and stacks. The demonstration shows the cluster topology, service scaling, and response time testing. Contact information is provided to learn more about Docker Swarm, container orchestration, and the demonstration environment.
New Docker Features for Orchestration and ContainersJeff Anderson
ย
- Swarm mode in Docker Engine allows clustering of Docker hosts into a single virtual Docker engine with features like services, scaling, global services, and constraints.
- Services allow deploying replicated applications on a swarm using the docker service command and benefit from features like rolling updates, restarts on failure, and scaling.
- The routing mesh provides load balancing, service discovery, and transparent rerouting of traffic between nodes and containers.
This document provides an overview and agenda for a Docker presentation. It discusses the Docker architecture including underlying technologies like cgroups and namespaces. It also covers the Docker engine/daemon, API, Compose, networking, Swarm, Machine, security and storage. The presentation includes a demo of these Docker concepts and capabilities.
This document proposes using RPM packages to deploy Java applications to Red Hat Linux systems in a more automated and standardized way. Currently, deployment is a manual multi-step process that is slow, error-prone, and requires detailed application knowledge. The proposal suggests using Maven and Jenkins to build Java applications into RPM packages. These packages can then be installed, upgraded, and rolled back easily using common Linux tools like YUM. This approach simplifies deployment, improves speed, enables easy auditing of versions, and allows for faster rollbacks compared to the current process.
Percona Live 2012PPT๏ผ introduction-to-mysql-replicationmysqlops
ย
This document provides an overview of MySQL replication including:
- Replication enables data from a master database to be replicated to one or more slave databases.
- Binary logs contain all writes and schema changes on the master which are used by slaves to replicate data.
- Setting up replication involves configuring the master to log binary logs, granting replication privileges, and configuring slaves to connect to the master and read binary logs from the specified position.
- Commands like START SLAVE are used to control replication and SHOW SLAVE STATUS displays replication status and lag.
The Docker network overlay driver relies on several technologies: network namespaces, VXLAN, Netlink and a distributed key-value store. This talk will present each of these mechanisms one by one along with their userland tools and show hands-on how they interact together when setting up an overlay to connect containers. The talk will continue with a demo showing how to build your own simple overlay using these technologies. Finally, it will show how we can dynamically distribute IP and MAC information to every hosts in the overlay using BGP EVPN
Infrastructure Deployment with Docker & AnsibleRobert Reiz
ย
This is an introduction to Docker & Ansible. It shows how Ansible can be used as orchestration too for Docker. There are 2 real world examples included with code examples in a Gist.
The document discusses various networking devices used to connect and extend local area networks (LANs). It describes repeaters as devices that receive and regenerate signals to allow them to travel longer distances. Hubs are multiport repeaters that connect multiple nodes to a single device. Bridges operate at the data link layer and logically separate network segments. Switches provide dedicated connections and are multiport bridges that separate collision domains for improved performance.
Glassfish is an open source application server that supports Java EE technologies like Servlets, JSP, EJB. It uses Grizzly, which is based on Apache Tomcat, as its servlet container and uses Java NIO for improved performance. Key Java EE technologies it supports include Servlets, JSP, EJB, advanced XML technologies.
The document describes Yahoo's failsafe mechanism for its homepage using Apache Storm and Apache Traffic Server. The key points are:
1. The failsafe architecture uses AWS components like EC2, ELB, S3 and autoscaling to serve traffic from failsafe servers if the primary servers fail.
2. Apache Traffic Server is used as a caching proxy between the user and origin servers. The "Escalate" plugin in ATS fetches content from failsafe servers if the origin server response is not good.
3. Apache Storm Crawler crawls content for different devices and maps URLs to the failsafe domain for storage in S3 with query parameters in the path. This provides more relevant fail
This document provides an overview of advanced Docker topics including Docker installation, Docker networking using bridges and volumes, and creating Dockerfiles. It discusses installing Docker on CentOS, the different types of Docker networks including bridge, host, overlay and macvlan. It also covers creating and managing Docker volumes, starting containers with volumes, and creating Dockerfiles with components like FROM, RUN, COPY and ENTRYPOINT.
Under the Hood with Docker Swarm Mode - Drew Erny and Nishant Totla, DockerDocker, Inc.
ย
Join SwarmKit maintainers Drew and Nishant as they showcase features that have made Swarm Mode even more powerful, without compromising the operational simplicity it was designed with. They will discuss the implementation of new features that streamline deployments, increase security, and reduce downtime. These substantial additions to Swarm Mode are completely transparent and straightforward to use, and users may not realize they're already benefiting from these improvements under the hood.
The document describes the process of setting up OpenStack Swift object storage. It includes installing and configuring Swift packages on both storage and proxy nodes, generating ring files to map objects to storage devices, and registering the Swift service with Keystone for authentication. Key steps are installing Swift packages, adding storage devices to the ring, distributing ring files, and configuring the proxy server and authentication filter.
Docker Swarm 1.1 introduces improvements to node management in Docker clusters, including monitoring node health and status from the Docker info command. It also adds experimental rescheduling of containers when nodes fail to help ensure application availability. Additional event types have been added to provide more visibility into cluster operations. The demo shows how resource constraints and networks can be used to deploy a multi-tier voting application across multiple Docker Engines managed as a single virtual Engine by Swarm.
The Docker network overlay driver relies on several technologies: network namespaces, VXLAN, Netlink and a distributed key-value store. This talk will present each of these mechanisms one by one along with their userland tools and show hands-on how they interact together when setting up an overlay to connect containers.
The talk will continue with a demo showing how to build your own simple overlay using these technologies.
This document provides an overview and instructions for Docker installation, networking, volumes, and Dockerfiles. It discusses installing Docker on CentOS, the different network drivers including bridge, and how to create and manage user-defined bridges and volumes. It also explains the components and usage of Dockerfiles to build images, including base images, environment variables, copying files, setting entrypoints and commands. The document includes examples of building an image locally and pushing it to a Docker repository.
Running services in virtualized systems provides many benefits, but has often presented performance and flexibility drawbacks. This has become critical when managing large databases, where resource usage and performance are paramount. We will explore a case study in the use of Docker to roll out multiple database servers distributed across multiple physical servers.
This document introduces Docker networking and Docker Swarm mode. It discusses the different types of Docker networks including bridge, null, and host networks. It also covers multi-host networking using overlay networks. For Docker Swarm mode, it describes the key features including self-healing, self-organizing, blue-print deployment, load balancing using a routing mesh, and not requiring additional components for service discovery or load balancing. The document aims to provide an overview of these topics and includes examples.
The Docker network overlay driver relies on several technologies: network namespaces, VXLAN, Netlink and a distributed key-value store. This talk will present each of these mechanisms one by one along with their userland tools and show hands-on how they interact together when setting up an overlay to connect containers.
The talk will continue with a demo showing how to build your own simple overlay using these technologies.
Running High Performance & Fault-tolerant Elasticsearch Clusters on DockerSematext Group, Inc.
ย
This document discusses running Elasticsearch clusters on Docker containers. It describes how Docker containers are more lightweight than virtual machines and have less overhead. It provides examples of running official Elasticsearch Docker images and customizing configurations. It also covers best practices for networking, storage, constraints, and high availability when running Elasticsearch on Docker.
Introductory Overview to Managing AWS with TerraformMichael Heyns
ย
The document provides an overview of Terraform including:
- Terraform is an open source tool from HashiCorp that allows defining and provisioning infrastructure in a code-based declarative way across multiple cloud platforms and services.
- Key concepts include providers that define cloud resources, configuration files that declare the desired state, and a plan-apply workflow to provision and manage infrastructure resources.
- Common Terraform commands are explained like init, plan, apply, destroy, output and their usage.
JDO 2019: Container orchestration with Docker Swarm - Jakub HajekPROIDEA
ย
This document discusses Docker Swarm and container orchestration. It provides an overview of key Docker Swarm features such as decentralized design, declarative service model, rolling updates, secrets, and configs. It then describes a demonstration environment running on AWS with Docker Swarm, NodeJS, Consul, Traefik, and Let's Encrypt. Diagrams are shown of the overlay networks, architecture, and stacks. The demonstration shows the cluster topology, service scaling, and response time testing. Contact information is provided to learn more about Docker Swarm, container orchestration, and the demonstration environment.
New Docker Features for Orchestration and ContainersJeff Anderson
ย
- Swarm mode in Docker Engine allows clustering of Docker hosts into a single virtual Docker engine with features like services, scaling, global services, and constraints.
- Services allow deploying replicated applications on a swarm using the docker service command and benefit from features like rolling updates, restarts on failure, and scaling.
- The routing mesh provides load balancing, service discovery, and transparent rerouting of traffic between nodes and containers.
This document provides an overview and agenda for a Docker presentation. It discusses the Docker architecture including underlying technologies like cgroups and namespaces. It also covers the Docker engine/daemon, API, Compose, networking, Swarm, Machine, security and storage. The presentation includes a demo of these Docker concepts and capabilities.
This document proposes using RPM packages to deploy Java applications to Red Hat Linux systems in a more automated and standardized way. Currently, deployment is a manual multi-step process that is slow, error-prone, and requires detailed application knowledge. The proposal suggests using Maven and Jenkins to build Java applications into RPM packages. These packages can then be installed, upgraded, and rolled back easily using common Linux tools like YUM. This approach simplifies deployment, improves speed, enables easy auditing of versions, and allows for faster rollbacks compared to the current process.
Percona Live 2012PPT๏ผ introduction-to-mysql-replicationmysqlops
ย
This document provides an overview of MySQL replication including:
- Replication enables data from a master database to be replicated to one or more slave databases.
- Binary logs contain all writes and schema changes on the master which are used by slaves to replicate data.
- Setting up replication involves configuring the master to log binary logs, granting replication privileges, and configuring slaves to connect to the master and read binary logs from the specified position.
- Commands like START SLAVE are used to control replication and SHOW SLAVE STATUS displays replication status and lag.
The Docker network overlay driver relies on several technologies: network namespaces, VXLAN, Netlink and a distributed key-value store. This talk will present each of these mechanisms one by one along with their userland tools and show hands-on how they interact together when setting up an overlay to connect containers. The talk will continue with a demo showing how to build your own simple overlay using these technologies. Finally, it will show how we can dynamically distribute IP and MAC information to every hosts in the overlay using BGP EVPN
Infrastructure Deployment with Docker & AnsibleRobert Reiz
ย
This is an introduction to Docker & Ansible. It shows how Ansible can be used as orchestration too for Docker. There are 2 real world examples included with code examples in a Gist.
The document discusses various networking devices used to connect and extend local area networks (LANs). It describes repeaters as devices that receive and regenerate signals to allow them to travel longer distances. Hubs are multiport repeaters that connect multiple nodes to a single device. Bridges operate at the data link layer and logically separate network segments. Switches provide dedicated connections and are multiport bridges that separate collision domains for improved performance.
Glassfish is an open source application server that supports Java EE technologies like Servlets, JSP, EJB. It uses Grizzly, which is based on Apache Tomcat, as its servlet container and uses Java NIO for improved performance. Key Java EE technologies it supports include Servlets, JSP, EJB, advanced XML technologies.
Syslog Centralization Logging with Windows ~ A techXpress GuideAbhishek Kumar
ย
Syslog Centralization Logging with Windows ~ A techXpress Guide ~ Setting up a centralized Syslog Server to get EventLogs from all Windows Hosts for analysis
Ethernet Bonding for Multiple NICs on Linux ~ A techXpress GuideAbhishek Kumar
ย
Ethernet Bonding for Multiple NICs on Linux ~ A techXpress Guide ~ for Load Balancing the Network Traffic on Multiple Etheret Cards attached on a Linux Box
An Express Guide ~ Zabbix for IT Monitoring Abhishek Kumar
ย
Zabbix is an open source infrastructure monitoring solution. It has two main parts - the Zabbix server and client.
The document provides step-by-step instructions to install and configure Zabbix on a Linux server. This includes installing prerequisites like NTP, PHP, MySQL, compiling and installing the Zabbix server and client, configuring the database, web interface, and more. Finally, it discusses initial configuration steps after installation like securing login credentials.
[WSO2] Deployment Synchronizer for Deployment Artifact Synchronization Betwee...Kasun Gajasinghe
ย
Setting up a cluster is important when developing enterprise software and deploying them in production environments. Distributing deployment artifacts & related metadata to all nodes in a homogeneous cluster is a typical requirement for a clustered deployment of any middleware platform. In such a cluster, all nodes should contain the deployed artifacts as well as the related metadata.
The Deployment Synchronizer (DepSync) is the mechanism used in the WSO2 platform for distributing these artifacts and metadata across all nodes in the cluster. It provides the ability to synchronize data between the worker nodes of a product cluster. When used with the WSO2 Application Server, or the WSO2 ESB, you can synchronize your deployable artifacts like web services, and web applications etc. across the cluster nodes. In addition, with the latest WSO2 Carbon 4 release, WSO2 provides the ability to synchronize service metadata which includes service policies, transports, and service-type specific data. Now you only have to deploy and configure services in one node - called the manager. Then, DepSync will replicate those to other nodes - workers.
In this presentation, we present how this is done in the WSO2 Cloud-enabled middleware platform. Typical deployment artifacts will include webapps, JAXWS/JAXRS apps, data services, proxy services, and BPEL processes . The WSO2 platform also natively supports multi-tenancy. Tenants & tenant artifacts are loaded on demand. We will demonstrate how DepSync works efficiently with multi-tenancy.
Kasun Gajasinghe did the demonstration section of this webinar presentation while Pradeep Fernando provided technical aspects of Deployment Synchronizer
WSO2 Dep Sync for Artifact Synchronization of Cluster NodesWSO2
ย
The document discusses deployment synchronization between cluster nodes in WSO2 products. It introduces the need for deployment synchronization in clustered environments to distribute artifacts and metadata transparently. It demonstrates how the Deployment Synchronizer (DepSync) feature works in WSO2 products using a SVN repository. It shows how to configure a minimal WSO2 cluster with one management node and one worker node connected by a load balancer, by enabling DepSync and making the appropriate configuration changes.
Step by Step to Install oracle grid 11.2.0.3 on solaris 11.1Osama Mustafa
ย
The document provides step-by-step instructions to install Oracle Grid Infrastructure 11g Release 2 (11.2.0.3) on Solaris 11.1. It describes preparing the OS by creating users, groups and directories. It also covers configuring networking, disks and memory parameters. The main steps are: installing Grid software and configuring ASM, followed by installing the Oracle Database and configuring it on the RAC nodes using dbca. Setting up SSH access between nodes and troubleshooting installation errors are also addressed. The goal is to build a fully configured two-node Oracle RAC environment with ASM and single sign-on capabilities.
This document provides guidance on deploying and upgrading a MongoDB sharded cluster. It discusses the components of a sharded cluster including config servers, shards, and mongos processes. It recommends a production deployment have at least 3 config servers, 3 nodes per shard replica set, and multiple mongos instances. The document outlines steps for deploying each component, including initializing replica sets and adding shards. It also provides a checklist for upgrading between minor and major versions, such as changes to configuration options, deprecated operations, and connectivity changes.
This document provides an overview and instructions for deploying, upgrading, and troubleshooting a MongoDB sharded cluster. It describes the components of a sharded cluster including shards, config servers, and mongos processes. It provides recommendations for initial deployment including using replica sets for shards and config servers, DNS names instead of IPs, and proper user authorization. The document also outlines best practices for upgrading between minor and major versions, including stopping the balancer, upgrading processes in rolling fashion, and handling incompatible changes when downgrading major versions.
This document provides guidance on deploying and upgrading a MongoDB sharded cluster. It discusses the components of a sharded cluster including config servers, shards, and mongos processes. It recommends a production deployment has at least 3 config servers, 3 nodes per shard replica set, and multiple mongos instances. The document outlines steps for deploying each component, including initializing replica sets and adding shards. It also provides a checklist for upgrading between minor and major versions, such as changes to configuration options, deprecated operations, and connectivity changes.
The document discusses OpenShift security context constraints (SCCs) and how to configure them to allow running a WordPress container. It begins with an overview of SCCs and their purpose in OpenShift for controlling permissions for pods. It then describes issues running the WordPress container under the default "restricted" SCC due to permission errors. The document explores editing the "restricted" SCC and removing capabilities and user restrictions to address the errors. Alternatively, it notes the "anyuid" SCC can be used which is more permissive and standard for allowing the WordPress container to run successfully.
The document describes deploying Cosmos DB resources using Terraform in Azure. It outlines prerequisites, environment details, and the configuration files and process used to create a resource group, Cosmos DB account, database, and collection. The main.tf file defines these resources, variables.tf contains configurable values, and output.tf displays output after deployment. Running terraform init and terraform plan commands prepares for deploying the resources.
Docker and friends at Linux Days 2014 in Praguetomasbart
ย
Docker allows deploying applications easily across various environments by packaging them along with their dependencies into standardized units called containers. It provides isolation and security while allowing higher density and lower overhead than virtual machines. Core OS and Mesos both integrate with Docker to deploy containers on clusters of machines for scalability and high availability.
The document discusses Docker containers and Docker Compose. It begins with definitions of containers and images. It then covers using Docker Compose to define and run multi-container applications with a compose file. It shows commands for starting, stopping, and viewing containers. The document also introduces Portainer as a tool for visually managing Docker containers and provides installation instructions for Portainer.
The document provides instructions for installing and configuring new storage LUNs on a Solaris system. It includes steps to install required OS packages, check that the HBAs are detected, collect information about existing LUNs, assign new LUNs, format and mount the LUNs, and configure Veritas (if used) to recognize the new LUNs.
Running Docker in Development & Production (#ndcoslo 2015)Ben Hall
ย
The document discusses running Docker in development and production. It covers:
- Using Docker containers to run individual services like Elasticsearch or web applications
- Creating Dockerfiles to build custom images
- Linking containers together and using environment variables for service discovery
- Scaling with Docker Compose, load balancing with Nginx, and service discovery with Consul
- Clustering containers together using Docker Swarm for high availability
The document summarizes a presentation on integrating Oracle Real Application Clusters (RAC) with Oracle GoldenGate 12c. The presentation covers:
- Configuring an ASM Cluster File System (ACFS) for the shared storage needed by GoldenGate in a RAC environment.
- Installing Oracle GoldenGate 12c and configuring it to use the ACFS.
- Creating an application VIP and registering GoldenGate with the Oracle Grid Infrastructure bundled agent to enable automated startup and failover of GoldenGate processes on RAC nodes.
- Demonstrations of stopping GoldenGate on one node and verifying failover to the other node.
The document discusses UBIC, a toolkit for writing daemons, init scripts, and services in Perl. It provides several key classes for common service tasks like starting, stopping, and getting the status of services. These classes standardize service management and make services more robust. UBIC sees wide use at Yandex across many packages, clusters, and hosts to manage services.
The document describes UBIC, a toolkit for writing daemons, init scripts, and services in Perl. It provides common classes that handle tasks like starting, stopping, and monitoring services that simplify writing init scripts. Services can be organized hierarchically and non-root users can run services. The toolkit also provides HTTP status endpoints and watchdog functionality to restart services that fail. UBIC sees widespread use at Yandex across many packages, clusters, and hosts.
OpenStack Tokyo Meeup - Gluster Storage DayDan Radez
ย
November 2012 Tokyo OpenStack meetup was dedicated to using Gluster storage. This presentation showed the fuse mount method to integrating gluster into OpenStack. There are new drivers that have been developed that make mounting gluster volumes to instances more efficient. This presentation doesn't show how to use them.
The age of orchestration: from Docker basics to cluster managementNicola Paolucci
ย
The container abstraction hit the collective developer mind with great force and created a space of innovation for the distribution, configuration and deployment of cloud based applications. Now that this new model has established itself work is moving towards orchestration and coordination of loosely coupled network services. There is an explosion of tools in this arena at different degrees of stability but the momentum is huge.
On the above premise this session we'll delve into a selection of the following topics:
- Two minute Docker intro refresher
- Overview of the orchestration landscape (Kubernetes, Mesos, Helios and Docker tools)
- Introduction to Docker own ecosystem orchestration tools (machine, swarm and compose)
- Live demo of cluster management using a sample application.
A basic understanding of Docker is suggested to fully enjoy the talk.
This document discusses using Docker and Ansible together for infrastructure as code. It begins with an overview of problems with traditional deployment approaches and advantages of defining infrastructure programmatically. It then provides in-depth explanations of Docker concepts like images, containers, Dockerfiles and how Docker works. The remainder covers using Ansible for configuration management, explaining concepts like modules, inventory, playbooks and roles. It emphasizes that Docker and Ansible together provide an easy way to start automating infrastructure while removing dependencies on specific technologies.
xml-motor
what, why & how about the new technique xml-parser rubygem
http://justfewtuts.blogspot.com/2012/03/xml-motor-what-it-is-how-why-should-you.html
A new compact XML algorithm without any dependencies. Its implemented as a rubygem to provide Non-native XML parser for particular usages. RubyGem at http://rubygems.org/gems/xml-motor and https://github.com/abhishekkr/rubygem_xml_motor
Squid for Load-Balancing & Cache-Proxy ~ A techXpress GuideAbhishek Kumar
ย
Squid for Load-Balancing & Cache-Proxy ~ A techXpress Guide ~ Setting up a secured Chained-Proxy between different offices using Squid for a specific URL set.
An Express Guide ~ "dummynet" for tweaking network latencies & bandwidthAbhishek Kumar
ย
It's an Express Guide to "dummynet" for testing Web/Network Applications in real-use-case scenario ~~~~~ it can allow you to tweak Network Latencies and bandwidth to any value and test the application in those circumstances
An Express Guide ~ Cacti for IT Infrastructure Monitoring & GraphingAbhishek Kumar
ย
It's an Express Guide to "Setup of Cacti Server with purpose of IT Infrastructure Monitoring & Service Graphs" ~~~~~ its aimed at monitoring of various IT services and brilliant graphing of statistics
An Express Guide ~ SNMP for Secure Rremote Resource MonitoringAbhishek Kumar
ย
It's an Express Guide to "Basic & Secure Setup of SNMP with purpose of Remote Resource Monitoring" ~~~~~ described here with a use-case of setting it up for monitoring availability of Network Connection on a remote machine and Trap notification in case the link goes down ~~~~~ for both Linux & Windows platforms
Presentation on "XSS Defeating Concept in (secure)SiteHoster" : 'nullcon-2011'Abhishek Kumar
ย
Nullcon is an annual hacker conference held in India. The document discusses defeating web application attacks through offensive security techniques like bug hunting and disarming malicious script tags. It also covers techniques for preventing cross-site scripting attacks, such as parsing user input and only allowing safe HTML tags.
An Approach Eradicating Effect of JavaScript Events in
User Input Being A Part of Web2.0 Facilities... in short the final nail to coffin of XSS Attacks
This document proposes a technique to prevent XSS attacks by modifying how browsers render <script> tags inserted into the <body> of an HTML document. The technique involves the web server transforming the page generated by the application server by wrapping the <body> contents in a <script> tag. This causes any <script> tags in the original <body> to not execute while preserving those in the <head>. The goal is to enable security without requiring input validation by web developers. A proof-of-concept implementation demonstrates how this modification disables injected malicious scripts.
This document provides instructions to install FreeSWITCH on CentOS/RedHat/Fedora in 13 steps: 1) Install dependencies with YUM; 2) Download and extract FreeSWITCH source; 3) Add OpenZAP support to configuration; 4) Compile and install FreeSWITCH; 5) Create symlinks for main binaries; 6) Launch FreeSWITCH as a service or from the command line; 7) Use fs_cli to access the command line.
How Can I use the AI Hype in my Business Context?Daniel Lehner
ย
๐๐จ ๐ผ๐ ๐๐ช๐จ๐ฉ ๐๐ฎ๐ฅ๐? ๐๐ง ๐๐จ ๐๐ฉ ๐ฉ๐๐ ๐๐๐ข๐ ๐๐๐๐ฃ๐๐๐ง ๐ฎ๐ค๐ช๐ง ๐๐ช๐จ๐๐ฃ๐๐จ๐จ ๐ฃ๐๐๐๐จ?
Everyoneโs talking about AI but is anyone really using it to create real value?
Most companies want to leverage AI. Few know ๐ต๐ผ๐.
โ What exactly should you ask to find real AI opportunities?
โ Which AI techniques actually fit your business?
โ Is your data even ready for AI?
If youโre not sure, youโre not alone. This is a condensed version of the slides I presented at a Linkedin webinar for Tecnovy on 28.04.2025.
AI and Data Privacy in 2025: Global TrendsInData Labs
ย
In this infographic, we explore how businesses can implement effective governance frameworks to address AI data privacy. Understanding it is crucial for developing effective strategies that ensure compliance, safeguard customer trust, and leverage AI responsibly. Equip yourself with insights that can drive informed decision-making and position your organization for success in the future of data privacy.
This infographic contains:
-AI and data privacy: Key findings
-Statistics on AI data privacy in the todayโs world
-Tips on how to overcome data privacy challenges
-Benefits of AI data security investments.
Keep up-to-date on how AI is reshaping privacy standards and what this entails for both individuals and organizations.
Artificial Intelligence is providing benefits in many areas of work within the heritage sector, from image analysis, to ideas generation, and new research tools. However, it is more critical than ever for people, with analogue intelligence, to ensure the integrity and ethical use of AI. Including real people can improve the use of AI by identifying potential biases, cross-checking results, refining workflows, and providing contextual relevance to AI-driven results.
News about the impact of AI often paints a rosy picture. In practice, there are many potential pitfalls. This presentation discusses these issues and looks at the role of analogue intelligence and analogue interfaces in providing the best results to our audiences. How do we deal with factually incorrect results? How do we get content generated that better reflects the diversity of our communities? What roles are there for physical, in-person experiences in the digital world?
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfSoftware Company
ย
Explore the benefits and features of advanced logistics management software for businesses in Riyadh. This guide delves into the latest technologies, from real-time tracking and route optimization to warehouse management and inventory control, helping businesses streamline their logistics operations and reduce costs. Learn how implementing the right software solution can enhance efficiency, improve customer satisfaction, and provide a competitive edge in the growing logistics sector of Riyadh.
Quantum Computing Quick Research Guide by Arthur MorganArthur Morgan
ย
This is a Quick Research Guide (QRG).
QRGs include the following:
- A brief, high-level overview of the QRG topic.
- A milestone timeline for the QRG topic.
- Links to various free online resource materials to provide a deeper dive into the QRG topic.
- Conclusion and a recommendation for at least two books available in the SJPL system on the QRG topic.
QRGs planned for the series:
- Artificial Intelligence QRG
- Quantum Computing QRG
- Big Data Analytics QRG
- Spacecraft Guidance, Navigation & Control QRG (coming 2026)
- UK Home Computing & The Birth of ARM QRG (coming 2027)
Any questions or comments?
- Please contact Arthur Morgan at [email protected].
100% human made.
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxJustin Reock
ย
Building 10x Organizations with Modern Productivity Metrics
10x developers may be a myth, but 10x organizations are very real, as proven by the influential study performed in the 1980s, โThe Coding War Games.โ
Right now, here in early 2025, we seem to be experiencing YAPP (Yet Another Productivity Philosophy), and that philosophy is converging on developer experience. It seems that with every new method we invent for the delivery of products, whether physical or virtual, we reinvent productivity philosophies to go alongside them.
But which of these approaches actually work? DORA? SPACE? DevEx? What should we invest in and create urgency behind today, so that we donโt find ourselves having the same discussion again in a decade?
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxAnoop Ashok
ย
In today's fast-paced retail environment, efficiency is key. Every minute counts, and every penny matters. One tool that can significantly boost your store's efficiency is a well-executed planogram. These visual merchandising blueprints not only enhance store layouts but also save time and money in the process.
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfAbi john
ย
Analyze the growth of meme coins from mere online jokes to potential assets in the digital economy. Explore the community, culture, and utility as they elevate themselves to a new era in cryptocurrency.
Role of Data Annotation Services in AI-Powered ManufacturingAndrew Leo
ย
From predictive maintenance to robotic automation, AI is driving the future of manufacturing. But without high-quality annotated data, even the smartest models fall short.
Discover how data annotation services are powering accuracy, safety, and efficiency in AI-driven manufacturing systems.
Precision in data labeling = Precision on the production floor.
AI Changes Everything โ Talk at Cardiff Metropolitan University, 29th April 2...Alan Dix
ย
Talk at the final event of Data Fusion Dynamics: A Collaborative UK-Saudi Initiative in Cybersecurity and Artificial Intelligence funded by the British Council UK-Saudi Challenge Fund 2024, Cardiff Metropolitan University, 29th April 2025
https://alandix.com/academic/talks/CMet2025-AI-Changes-Everything/
Is AI just another technology, or does it fundamentally change the way we live and think?
Every technology has a direct impact with micro-ethical consequences, some good, some bad. However more profound are the ways in which some technologies reshape the very fabric of society with macro-ethical impacts. The invention of the stirrup revolutionised mounted combat, but as a side effect gave rise to the feudal system, which still shapes politics today. The internal combustion engine offers personal freedom and creates pollution, but has also transformed the nature of urban planning and international trade. When we look at AI the micro-ethical issues, such as bias, are most obvious, but the macro-ethical challenges may be greater.
At a micro-ethical level AI has the potential to deepen social, ethnic and gender bias, issues I have warned about since the early 1990s! It is also being used increasingly on the battlefield. However, it also offers amazing opportunities in health and educations, as the recent Nobel prizes for the developers of AlphaFold illustrate. More radically, the need to encode ethics acts as a mirror to surface essential ethical problems and conflicts.
At the macro-ethical level, by the early 2000s digital technology had already begun to undermine sovereignty (e.g. gambling), market economics (through network effects and emergent monopolies), and the very meaning of money. Modern AI is the child of big data, big computation and ultimately big business, intensifying the inherent tendency of digital technology to concentrate power. AI is already unravelling the fundamentals of the social, political and economic world around us, but this is a world that needs radical reimagining to overcome the global environmental and human challenges that confront us. Our challenge is whether to let the threads fall as they may, or to use them to weave a better future.
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc
ย
Most consumers believe theyโre making informed decisions about their personal dataโadjusting privacy settings, blocking trackers, and opting out where they can. However, our new research reveals that while awareness is high, taking meaningful action is still lacking. On the corporate side, many organizations report strong policies for managing third-party data and consumer consent yet fall short when it comes to consistency, accountability and transparency.
This session will explore the research findings from TrustArcโs Privacy Pulse Survey, examining consumer attitudes toward personal data collection and practical suggestions for corporate practices around purchasing third-party data.
Attendees will learn:
- Consumer awareness around data brokers and what consumers are doing to limit data collection
- How businesses assess third-party vendors and their consent management operations
- Where business preparedness needs improvement
- What these trends mean for the future of privacy governance and public trust
This discussion is essential for privacy, risk, and compliance professionals who want to ground their strategies in current data and prepare for whatโs next in the privacy landscape.
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPathCommunity
ย
Join this UiPath Community Berlin meetup to explore the Orchestrator API, Swagger interface, and the Test Manager API. Learn how to leverage these tools to streamline automation, enhance testing, and integrate more efficiently with UiPath. Perfect for developers, testers, and automation enthusiasts!
๐ Agenda
Welcome & Introductions
Orchestrator API Overview
Exploring the Swagger Interface
Test Manager API Highlights
Streamlining Automation & Testing with APIs (Demo)
Q&A and Open Discussion
Perfect for developers, testers, and automation enthusiasts!
๐ Join our UiPath Community Berlin chapter: https://community.uipath.com/berlin/
This session streamed live on April 29, 2025, 18:00 CET.
Check out all our upcoming UiPath Community sessions at https://community.uipath.com/events/.
Procurement Insights Cost To Value Guide.pptxJon Hansen
ย
Procurement Insights integrated Historic Procurement Industry Archives, serves as a powerful complement โ not a competitor โ to other procurement industry firms. It fills critical gaps in depth, agility, and contextual insight that most traditional analyst and association models overlook.
Learn more about this value- driven proprietary service offering here.
Generative Artificial Intelligence (GenAI) in BusinessDr. Tathagat Varma
ย
My talk for the Indian School of Business (ISB) Emerging Leaders Program Cohort 9. In this talk, I discussed key issues around adoption of GenAI in business - benefits, opportunities and limitations. I also discussed how my research on Theory of Cognitive Chasms helps address some of these issues
Spark is a powerhouse for large datasets, but when it comes to smaller data workloads, its overhead can sometimes slow things down. What if you could achieve high performance and efficiency without the need for Spark?
At S&P Global Commodity Insights, having a complete view of global energy and commodities markets enables customers to make data-driven decisions with confidence and create long-term, sustainable value. ๐
Explore delta-rs + CDC and how these open-source innovations power lightweight, high-performance data applications beyond Spark! ๐
Solaris Zones (native & lxbranded) ~ A techXpress Guide
1. Express-Guide
~to~
Basic Setup of
Solaris Zones
Native Zones & lx-Branded Zones
by, ABK ~ http://www.twitter.com/aBionic
::Task Detail::
๎ Creating/Managing Solaris Zones
๎ mirroring an existing CentOS Box over a Zone
๎ setting up SVN service over a Zone
๎ setting CIFS over a Zone
::Background::
Solaris Zones are a part of Solaris Container Technology. Zones manage the
namespace isolation for containers implementing virtualization.
In Solaris 10, containers are zone using Resource Management Feature via Solaris
Resource Manager. There is no performance overhead to this approach.
Resources are used as a 'Dynamic resource Pool' managed between containers using
a 'Fair Share Scheduler'.
Broadly there are two types of zones:
๎ Native Zone
These are basic stripped down native Solaris O.S. Instances.
Native zones are further of two types where
โฆ 'Small Zones' (also known as Sparse Root Zone) have several system
directories shared with Solaris O.S. or Global Zone in non-writable mode
โฆ 'Big Zones' (also known as Whole Root Zone) have all independent
directories
๎ lx-Branded Zone
these are zones installed from installer of O.S., currently only linux branded
zones are available also called lx-zones.
2. ::Execution Method::
(a.) Creating native {small,big} and lx-branded zones
๎ Setting up Resource Pool to be used by zones
โฆ Enabling Resource Pool features
โช #pooladm -e
โฆ Saving current resource pool
โช #pooladm -s
โฆ List current Pools
โช #pooladm
โช {generally only 'pool_default' is present on fresh zone}
โฆ Configuring 'default_pool' to enable Fair Share Scheduler
over it
โช #poolcfg -c 'modify pool pool_default (string
pool.scheduler="FSS")'
โช #pooladm โc
โฆ Priority Controller moving all processes and resources under
Fair Share Scheduler
โช #priocntl -s -c FSS -i class TS
โช #priocntl -s -c FSS -i pid 1
๎ Configuring a Solaris Zone
โฆ This lists the current zones
โช #zoneadm list -cv
โฆ Configuring a new Native Zone
โช registering a new Zone
โข #zonecfg -z newZoneName
โฆ regarding 3 different types of zones follow respective command
โช for creating a native small-zone {with shared directories}
โข zonecfg:newZoneName>create
โช for creating a native big-zone {with independent directories}
โข zonecfg:newZoneName>create -b
โช for creating a lx-branded zone
โข zonecfg:lxZoneName>create -t SUNWlx
3. โฆ assigning it a location on HDD to be installed
โช zonecfg:newZoneName>set
zonepath=/export/home/zones/newZoneName
โฆ Adding a Network Interface Resource to it
โช zonecfg:newZoneName>add net
โช zonecfg:newZoneName:net>set address=192.168.16.61
โช zonecfg:newZoneName:net>set physical=eth0
โช zonecfg:newZoneName:net>end
โฆ Assign a Resource Pool (should be already existing) to it
โช zonecfg:newZoneName>set pool=pool_default
โฆ Adding a resource controller to this Zone
โช zonecfg:newZoneName>add rctl
โช zonecfg:newZoneName:rctl>set name=zone.cpu-shares
โช zonecfg:newZoneName:rctl>
add value (priv=privileged,limit=1,action=none)
โช zonecfg:newZoneName:rctl>end
โฆ Giving a CD-ROM access (required if installing lx-zone from ISO or CD)
โช zonecfg:newZoneName>add fs
โช zonecfg:newZoneName:fs>set dir=/cdrom
โช zonecfg:newZoneName:fs>set special=/cdrom
โช zonecfg:newZoneName:fs>set typr=lofs
โช zonecfg:newZoneName>set options=[nodevices]
โช zonecfg:newZoneName>end
โฆ Verify, Save and Exit
โช zonecfg:newZoneName>verify
โช zonecfg:newZoneName>commit
โช zonecfg:newZoneName>exit
โฆ Creating the HDD location for Zone
โช #mkdir -p /export/home/zones/newZoneName
โฆ Granting required permissions to location
โช #chmod 700 /export/home/zones/newZoneName
โฆ Confirming the registration of Zone Configuration
โช #zoneadm list -cv
4. โฆ It should show a listing for currently created zone like
โช newZoneName configured at /export/home/zones/newZoneName, it is
native and shared (small-zone)
๎ Installing the already configured zone
โฆ Installing the zone if it's a Native {small or big} zone
โช #zoneadm -z newZoneName install
โฆ if it's a lx-brand zone with O.S. TarBall, automatically creating ZFS
โช #zoneadm -z newZoneName install -d /tmp/os.tgz
โฆ if it's a lx-branded zone with O.S. TarBall, not creating ZFS
โช #zoneadm -z newZoneName install -x nodataset -d /tmp/os.tgz
โฆ if no archive path is given then default is Disc Drive, but if you are
installing from Disc Drive, you need to install VOLFS like:
โช #svcadm enable svc:/system/filesystem/volfs:default
โช #svcs | grep volfs
โฆ If its installed without any error, just check its status using
โช #zoneadm list -cv
โฆ it should show a listing for currently created zone like newZoneName
installed /export/home/zones/newZoneName native shared
๎ Using the installed Zone
โฆ Now either make it ready to boot, or directly boot which will make it
ready itself
โช #zoneadm -z newZoneName ready
โข It should show a listing for currently created zone like
โฆ newZoneName ready /export/home/zones/newZoneName
native shared
โฆ #zoneadm -z newZoneName boot
โฆ It should show a listing for currently created zone like
โช newZoneName running /export/home/zones/newZoneName
native shared
โฆ To login
โช #zlogin newZoneName
โช Now you are inside the Zone, running 'uname -a' should present you
with newZoneName
5. โฆ To login into Zone Console like remote connect
โช #zlogin -C newZoneName
โฆ To exit the zone
โช #exit
โฆ To halt the zone simply use
โช #zoneadm -z newZoneName halt
โฆ it should show a listing for currently created zone like
โช newZoneName running /export/home/zones/newZoneName
native shared
โฆ To reboot the zone simply use
โช #zoneadm -z newZoneName reboot
โฆ To uninstall the zone
โช #zoneadm -z newZoneName uninstall -F
(b.) Mirroring an existing CentOS Box over a Zone
๎ There are two ways to achieve this
โฆ TarBall the entire distro you want to port to Zone and use that TarBall to
install the Zone.
โฆ Suppose, you already have an lx-branded zone and use the same. Then
you need to use utility like RSync to Sync the files from Source Machine
to lx-Zone.
๎ You can also add packages like svn, gcc, make, netsnmp, openssl,
CoolStack's ( apache2, mysql, php, perl, python, ruby, squid) to lx-zone and
they work great over Zone.
(c.) Setting up SVN service over a Zone
๎ Users connect to svn mirror servers, the WebDAV SVN module serves
content from the local system, and sends commits to the main server. Then
main server pushes commit to mirrors using 'svnsync' over a protected link
only writable by main server.
โฆ Install Collabnet SVN client & server binaries {available at
6. 'http://www.collab.net/downloads/subversion/solaris.html'}
โฆ Create a symlink collabnet modules a
โช #ln -s /opt/CollabNet_Subversion/modules/mod_dav_svn.so
/etc/httpd/modules/mod_dav_svn.so
โช #
ln -s /opt/CollabNet_Subversion/modules/mod_authz_svn.so
/etc/httpd/modules/mod_authz_svn.so
โฆ Add below lines to 'httpd.conf' under Apache2 directory as
โช LoadModule dav_svn_module /etc/httpd/modules/mod_dav_svn.so
LoadModule authz_svn_module /etc/httpd/modules/mod_authz_svn.so
<Location /someproject>
DAV svn
SVNPath /repos/svn/repos/someproject
AuthzSVNAccessFile /repos/svn/access/someproject/svn_access.conf
AuthType Basic
AuthName "Active Directory LDAP Authentication"
AuthBasicProvider ldap
AuthzLDAPAuthoritative off
AuthLDAPBindDN [email protected]
AuthLDAPBindPassword somePassword
AuthLDAPURL "ldap://adserver.company.com:389/ou=Principal,dc=
dcString1,dc=dcStrin2?SAMAccountName?sub?(&(objectClass=user))"
require vaild-user
SVNPathAuthz off
</Location>
โฆ Reload httpd service
โฆ
โฆ Add following lines to '/repos/svn/access/someproject/svn_access.conf'
โช can_write_group=aduserA, aduserB,aduserC
read_only_group=aduserD,aduserE,aduserF
no_access_group=aduserG,aduserH,aduserJ
[repository:/]
@can_write_group=rw
@read_only_group=r
@no_access_group=
โฆ Create a repository as follows:
โช svnadmin create /repos/svn/repos/someproject
โช change permissions as follows
โช chmod -R g+w /repos/svn/repos/someproject
โช chown -R apache.apache /repos/svn/repos/someproject
โฆ Similarly, you can setup mirror server with the configuration given at
Link Above.
7. (d.) Setting CIFS over a Zone
๎ Initial reading disclosed its not possible over local zones, only global zone
could support CIFS.
๎ So just did practical with setting up SAMBA server on Solaris Zones;
implemented SWAT (Samba Web Admin Tool) for easy configuration.
โฆ for Solaris 10, SAMBA came up real easy to configure
โช #svcs samba wins swat
โช #svcadm enable samba
โช #svcadm enable wins
โช #svcadm enable swat
โฆ Simply browsing http://samba_Zone_IPaddress:901/ presents with a nice
SWAT GUI to configure SAMBA service on that zone.
To get start with, you need to
โช > select 'Shares', add new share with proper configuration
โช > select 'Users', to add Users
โช > Restart Services from UI itself
โช > now try accessing this share from Windows as normal
Windows Share using User created
::Tools/Technology Used::
๎ Solaris Zones: http://www.solarisinternals.com/wiki/index.php/Zones
๎ CoolStack Software Bundles: {now superseded by WebStack} ~
http://hub.opensolaris.org/bin/view/Project+webstack/sunwebstack
๎ Rsync: http://en.wikipedia.org/wiki/Rsync
๎ SVN: http://subversion.apache.org/
๎ Apache: http://www.apache.org/
๎ CIFS: http://msdn.microsoft.com/en-us/library/aa302188.aspx
๎ Samba: http://www.samba.org/
๎ SWAT: http://linux.die.net/man/8/swat
::Inference::
๎ Solaris Zones is a highly under-used and over-capable technology.
8. ๎ Due to its minimal overhead architecture on Virtualization, its the best
option according to me for Virtualization of Linux Boxes.
๎ There is still a great scope left to be developed in this technology.
::Troubleshooting/Updates::
๎ Problem: The Apache mod_dav and mod_dav_svn module was failing to
integrate with SVN implementation.
Solution:
Initially I was using CoolStack's Software Bundle of Apache+PHP+MySQL
due to ease of use on Native-Small Zone, but found out that actually it's
implementation raised the incompatibility issue. So, created a Native Big-
Zone and used standard Apache release, and it worked.