Friday 25 May 2007

VMware Infrastructure 3 Demo: Magical Suite for IT People / Department.

A live demonstration video that show you some of the solutions you can build with the VMware Virtualization Suite.

Features:
1. Running number of Virtual servers off the fewer Physical Server.
2. Run different OS off the same Physical Server, its hardware independent.
3. You can build Virtual Web-Server, straight on the fly.
4. You can create many test setups, straight on the fly using the templates.

You can watch this video right here,

Monday 21 May 2007

BAD PASSWORD: it is based on dictionary word | Linux password issues | -Ashwin

The most reliable way to change your linux password is via a command prompt. You will need to start a terminal window. At the prompt, type passwd. You will be prompted to enter your current password, followed by the new password and the new password again. None of the passwords will be echoed on the screen.

If you do not see the message "authentication tokens updated successfully" there was an error changing the password. Just type passwd and try again. Pay careful attention to your typing.

You may get some errors: As shown in the Figure above .
BAD PASSWORD: it is based on a dictionary word
BAD PASSWORD: it's WAY too short or similiar.

That means your password doesn't meet the password requirements. Ideally it should be at least eight characters long, not based on a dictionary word and a mixture of letters, numbers and characters.

Solution: Incase you don't have time to think of any possible good password, make use of the "Online" password generator, the link is given below.


Random Password Generator, OnlinePasswordGenerator:
http://www.webcogs.com/passwordgenerator.aspx

Saturday 19 May 2007

Penguin Gallery : Funny, Cute and artistic penguins...

Super-Penguin , Here is a collection of the interesting penguins we have been able to find out there on the net. Note that we're not trying to gather up every occurence of a penguin somewhere - the idea here is to catalog the "derivative" penguins that are on the loose. Please click on the web URL given below to see penguins in different imagination.

In the beginning, sometime in early 1996, several people were talking on the linux-kernel mailing list about a suitable logo/mascot for Linux. Of the many, many suggestions, many involved parodies of other operating system logo's - or were strong, noble beasts such as Sharks or Eagles. At some point (I'm not sure when), Linus Torvalds (the father of Linux) casually mentioned that he was rather fond of Penguins - which rather stopped the debate in its tracks.


Penguins Gallery:
http://lwn.net/Gallery/

Penguin the Linux Mascot : Story goes like this..

Linus Torvalds, the creator of the Linux Kernel, was visiting his friend Andrew Tridgell, the creator of the Samba suite. They were walking through the Zoo in Canberra when, without warning, a huge flock of vampire attack penguins dove out of the sky and tried to carry Linus away. Fortunately, Andrew had an umbrella. Still, one of the birds was able to nip Linus' hand with its fanged beak. Rumor has it that on moonlit nights Linus still runs out into the darkness and jumps, stark naked, into icy water. Of course, he's Finnish and may always have done this. In any case, this is why the Penguin is the Linux Mascot.

Why Penguins?

This email from Linus in response to this very question seems to explain the significance of the Penguin:


Letter goes like this:

Re: Linux LogoLinus Torvalds (torvalds@cs.helsinki.fi)

Sun, 12 May 1996 09:39:19 +0300 (EET DST)

Umm.. You don't have any gap to fill in.

"Linus likes penguins". That's it. There was even a headline on it in some Linux Journal some time ago (I was bitten by a Killer Penguin in Australia - I'm not kidding). Penguins are fun.
As to why use a penguin as a logo? No good reason, really. But a logo doesn't really ave to _mean_ anything - it's the association that counts. And I can think of many worse things than have linux being associated with penguins.

Having a penguin as a logo also gives more freedom to people wanting to use linux-related material: instead of being firmly fixed with a specific logo (the triangle, or just "Linux 2.0" or some other abstract thing), using something like a penguin gives people the chance to make modifications that are still recognizable.

So you can have a real live penguin on a CD cover, for example, and people will get the association. Or you can have a penguin that does something specific (a Penguin writing on wordperfect for the WP Linux CD, whatever - you get the idea).

Compare that to a more abstract logo (like the windows logo - it's not a bad logo in itself). You can't really do anything with a logo like that. It just "is".

Anyway, go to "http://www.isc.tamu.edu/~lewing/linux/ for some nice examples..

Linus

Courtesy:

http://www.sjbaker.org/tux/
http://us5.samba.org/samba/docs/

SAMBA Permission Vs Linux Permission: Who takes precedence

Few things about Linux and Samba permissions:


1. Linux system permissions take precedence over Samba permissions. For example if a directory does not have Linux write permission, setting samba writeable = Yes , will not allow to write to shared directory / share.


2. The filesystem permission take precedence over Samba permission. For example if filesystem mounted as readonly, setting writeable = Yes will not allow to write to any shared directory or share via samba server.

How do I set permissions to Samba shares? Samba Basic permissions are as follows (configuration file is smb.conf [/etc/samba/smb.conf]):


1. Read only: This parameter controls whether an user has the ability to create or modify files within a share. This is default.

2. Guest ok: Usually this parameter is set to yes, the users will have access to the share withouthaving to enter a password. This can pose security risk.

3. Writeable: Specifies users should have write access to the share.


You can create the share called helpfiles with read only permission

[helpfiles]

path = /usr/share/docs

read only = Yes


You can create the share called salesdoc with write permission

[salesdoc]

path = /home/shared/sales

writeable = Yes


You can also create a list of users to give write access to the share with write list option. For example allow rocky and tony to write to the share called sales:

[salesdoc]

path = /home/shared/sales

write list = rocky tony



You can use following options:
Read list: This option accepts a list of usernames or a group as its value. Users will be given read-only access to the share.


Valid users: You can make a share available to specific users. Usernames or group names can be passed on as its value.


Invalid users: Users or groups listed will be denied access to this share.

Samba mask permission :

It is also possible to specify samba default file creation permission using mask.
create mask: This option is set using an octal value when setting permissions for files. directory mask: Directories must have the execute bit for proper access. Default parameter is 0755.

[salesdoc]

path = /home/shared/sales

write list = rocky syscreate mask = 0775

Courtesy: VIVEK

http://www.cyberciti.biz/tips/how-do-i-set-permissions-to-samba-shares.html

Friday 18 May 2007

New Samba 4.0 targets Active Directory

A next-generation test version of the open source Samba file sharing software has been made available, with features emulating Microsoft's Active Directory ID management software. The popular Samba suite is an implementation of Microsoft's SMB (Server Message Block)/CIFS (Common Internet File System) protocol that allows other operating systems to emulate or interoperate with Windows for the purposes of sharing files or printing.

Releasing a new version of the software today in conjunction with a speech on the subject by Australia-based Samba creator Andrew Tridgell at the Linux.conf.au conference in New Zealand, the team behind the software outlined its new features.

"Samba 4 supports the server-side of the Active Directory logon environment used by Windows 2000 and later, so we can do full domain join and domain logon operations with these clients," the group said in a statement on its Web site, noting this feature was "the main emphasis" for the new software.

"Our domain controller implementation contains our own built-in LDAP (Lightweight Directory Access Protocol) server and Kerberos key distribution centre as well as the Samba 3-like logon services provided over CIFS," the statement continued.

The Samba developers noted their implementation of Kerberos correctly dealt with the "infamous Kerberos PAC (Privilege Access Certificate)" -- a data field in the Kerberos authentication protocol which attracted controversy when critics claimed that Microsoft's version tied users into its own version of Kerberos.

Other improvements include the integration of Samba's Web-based administration tool (SWAT), a new scripting interface which allows Javascript programs to interface with Samba's "internals", and new Virtual Filesystem (VFS) features.

Also, "the Samba 4 architecture is based around an LDAP-like database that can use a range of modular backends". "We are aiming for Samba 4 to be a powerful front end to large directories," said the statement.

Courtesy:http://www.zdnet.com.au/

Learning Tutorials: Linux | UNIX | Networking

Learn Unix in 10 Minutes
http://networking.ringofsaturn.com
networking.ringofsaturn.com/Unix/unixguide.php

Compiling the Linux Kerenel
http://networking.ringofsaturn.com/Unix/linux-kernel.php

How Network Traffic Flows – Getting Started
http://networking.ringofsaturn.com/IP/howtrafficflows.php

What is routing?
http://networking.ringofsaturn.com/IP/Routing.php

IBM ENTRY SAN: DS3000 Series, is a S.A.F.E.R option

S:Scalable :Start with low investment, later Grow to over 14 Terabytes of capacity
A:Affordable :Excellent Value
F:Flexible: Can attach to System x, BladeCenter and 3rd Party servers. Best for mixed-server vendor enviornment.
E:Easy : DS3000 Storage Manager software makes deployment & installation simple
R:Reliable : IBM quality

Watch Video:
http://youtube.com/watch?v=Kbb7xQACWxw

Wednesday 16 May 2007

What is Samba? -Ashwin

What is Samba?

Samba is an open source software package that mimics a Windows server. Its purpose is to offer an alternative to expensive, unstable Windows servers. Samba can replicate nearly all of Windows server functionality. It appears in the Network Neighborhood like any other Windows machine and functions in the same way. In fact, some servers on your network right now could be running Samba instead of Windows and no one would ever notice.


Samba essentially consists of two or three daemons. A daemon is a UNIX application that runs in the background and provides services. An example of a service is the Apache Web server for which the daemon is called httpd. In the case of Samba there are three daemons, two of which are needed as a minimum.


1. nmbd : Daemon acts as a WINS server service providing DNS-like name-to-IP address translations.

2. smbd : Daemon is the core Samba server service which enables file and printer sharing, network browsing, etc.


winbindd: (3rd Daemon)
This daemon should be started when Samba is a member of a Windows NT4 or ADS domain. It is also needed when Samba has trust relationships with another domain. The winbindd daemon will check the smb.conf file for the presence of the idmap uid and idmap gid parameters. If they are are found, winbindd will use the values specified for for UID and GID allocation. If these parameters are not specified, winbindd will start but it will not be able to allocate UIDs or GIDs.

SAMBA shell script resides in following dir:
/etc/init.d/samba

The main Samba configuration file called smb.conf and is located in this directory:
/etc/smb/samba.conf


Warning: Make sure you backup this file, before making any alterations. Use this command:
cp /etc/samba/smb.conf /etc/samba/org-smb.conf


The smb.conf file supplied with most linux distributions has six sections:

1. [global] - contains many subsections for network-related things such as the domain/workgroup name, WINS, some printing settings, authentication, logging and accounting, etc.
2. [homes] - for file sharing of user home directories
3. [netlogon] - commented out by default, for setting the server to act as a domain controller
4. [printers] - for printer sharing of locally-attached printers
5. [print$] - to set up a share for Windows printer drivers
6. [cdrom] - commented out by default, to optionally share the server's CD-ROM drive


I have only edited following section for my sharing:

[global]
Workgroup = Redhat-SAMBA
Server String = Samba Server
hosts allow = 1.1.1.8
encrpt passwords = yes
smb passwd file = /etc/samba/smbpasswd

[files]
comment = Shared Files
path = /myshare
writeable = yes
Browseable= yes
Valid users=username


Note: I presume , both Windows and Linux box can see/ping each other. Minimum requirement. It is advisable to add the netbios name entry in each other machine.

For Example:
Here is my /etc/samba/lmhosts file
windows machine IP address

And here is my /etc/hosts file:
Linux machine IP address


To configure Samba on your Red Hat Linux system to use encrypted passwords, follow these steps: If someone needs to access a share on your Samba server, they must be both a valid user of the system and a valid Samba user.

Adding Users to a Linux System

To add users to a Linux system, use the following command:

adduser

For example, to add user ashwin to the system, execute the command

adduser ashwin

After adding the user, specify a password for them with the command

passwd

For example to change ashwin password execute

passwd ashwin


Adding Samba Users

To add users to the Samba users list, execute the command

smbpasswd -a

For example, to add ashwin , execute the following

smbpasswd -a ashwin


That's it, now start the SMB service and reload the smb.conf file.

To start smb service:
/etc/rc.d/init.d/smb restart

or

# smb service restart

To reload smb.conf file:
/etc/rc.d/init.d/smb reload

or

# smb service reload


Finaly in Windows Machine:
Open the Windows machine Go to Mynetworkplaces Entire Network Microsoft Windows Network and You should find the "SAMBA" server. You can decide what workgroup name you want to give in the smb.conf file.


Courtesy: Samba: An Alternative to Windows Servers
http://www.mcsr.olemiss.edu/bookshelf/articles/Samba.html
http://samba.org/samba/docs/man/Samba-HOWTO-Collection/install.html

Thursday 10 May 2007

How 2 Setup Linux (network, smb, apache)

15 years Linux: past and future (video)

On 21 August 1991, Linus Torvalds first announced the existance of Linux in a posting to a Unix mailing list. This August, Linux will celebrate 16th birthday.

Sun Fire x4500 demonstration:

Sun Microsystems in July,2006 unveiled three new servers including the Sun Fire X4500: a 4-way AMD Opteron system with up to 24 terabytes of storage. The system's chief architect Andy Bechtolsheim walks us through the system's features.

Hardware-related questions about Complete PC Restore :

We’ve seen a lot of questions about restoring Complete PC Restore images to different hardware. Here are some answers to the common questions.

Q. Can you restore a Complete PC Backup image to a smaller drive if the amount of space used in the initial backup is smaller than the smaller disk?

A. The backup can be restored only if:

At least the same number of hard drives are present, and
Each disk is at least as big as the disk it replaces.

Here are some examples to illustrate this:

Working examples

During backup
---------------------------------
1x100GB drive
1x100GB drive
1x100GB drive
1x100GB drive,1x200GB drive
1x100GB drive,1x200GB drive

During restore
--------------------------------
1x100GB drive
1x200GB drive
1x200GB drive, 1x80GB drive
1x100GB drive, 1x200GB drive
2x200GB drive, 2x200GB drive

Non-working examples

During backup
----------------------------------------------
1x100GB drive
1x100GB drive
1x100GB drive
1x100GB drive, 1x200GB drive
1x100GB drive, 1x200GB drive
1x100GB drive, 1x200GB drive
During restore
---------------------------------------------
0 drives*
1x80GB drive
1x80GB drive, 1x40GB drive
1x500GB drive
1x500GB drive, 1x160GB drive
1x500GB drive, 1x80GB drive

*possibly due to no drivers loaded in Windows Recovery Environment (RE)


Courtesy: cfsbloggers
http://blogs.technet.com

Saturday 5 May 2007

Practical approach to ISCSI: - My personal views & understanding. - Ashwin

Is I-SCSI an Software Or Hardware ?


Still confused ? , well the answer is, its in both forms, as explained below.

I-SCSI can be thought as client-server architecture.
A "client" (ie: your system - OS) is an initiator, it initiates requests."
A "server" (ie: your storage device - Disks) is a target.

I-SCSI Software Package includes:
1. ISCSI- Initiator (Free download available)
2. ISCSI- Target (Free download available, NOT all vendors)

A software initiator and Target is just a driver that handles all requests and pairs the network interfaces driver and the SCSI drivers together to make it all work.

Bottom Line: There is no cost involved in using a software initiator and Target (Though some Vendors has price tag for target sofware ) . Disadvantage may be: High CPU usage on Host due to processing of TCP/IP + SCSI Commands.


I-SCSI Hardware Package includes:
1. ISCSI- HBA as Initiator as shown in pic above.
2. ISCSI- HBA as Target as shown in pic above.

Hardware Card is nothign but a ethernet card with a SCSI ASIC on-board to offload all the work (TCP/IP + SCSI processing) from the system CPU.

Note: Each iSCSI HBA adapter has two IP addresses: one for SCSI and one for LAN.With iSCSI HBA, TCP/IP and iSCSI protocol processing may be performed on an embedded processor.

Thank You, views from technical gurus are welcome.

FYI: With due courtesy to following sites.
Reference: (Courtesy:http://www.snwonline.com/implement/isci_feasible_04-15-2002.asp)Reference: (Courtesy:http://www.cuddletech.com/articles/iscsi/index.html)
Reference(Courtesy:http://www03.ibm.com/systems/i/
bladecenter/flash/iscsi_systemx_install.swf)

Thursday 3 May 2007

I-SCSI network , really cool concept. It has scalability and capability.-Ashwin

Today i tested the I-SCSI theory which i have been reading and writing about since last week, I installed the initiator on my production Windows XP machine and the target on my Test Server running Windows 2003 Ent server. I must tell you it worked out-of-box and this is what i call customers delight.

Theory: iSCSI Protocol Concepts and Implementation
http://www.cisco.com/en/US/products/hw/ps4159/ps2160/
products_white_paper09186a00800a90e4.shtml

Installation Sofware:

I-SCSI Initiator:
You can get the iSCSI Initiator from the Microsoft download website:

Courtesy:
http://www.microsoft.com/downloads/details.aspx?familyid
=12CB3C1A-15D6-4585-B385-BEFD1319F825&displaylang=en

I-SCSI Target:
Download FREE StarWind iSCSI Target evaluation version 3.2.2 from following link:

Courtesy:
http://www.rocketdivision.com/download_starwind.html


You can even watch a video on I-SCSI setup:mms://wm.microsoft.com/ms/inetpub/keithcombs/iSCSI.wmv for the iSCSI demo.

Courtesy: Keith Combs
http://blogs.technet.com/keithcombs


Four Stages to implimenting iSCSI :Courtesy:
http://www.iscsi-storage.com/iscsi_stages.htm

Microsoft Storage Technologies - iSCSI

http://www.microsoft.com/windowsserver2003

/technologies/storage/iscsi/default.mspx

Tuesday 1 May 2007

what the hell is i-SCSI ? -Ashwin


what the hell is i-SCSI ?

When i first heard this term two years back , i thought it is "Ice-SCSI", it sounded like that, and for no reason i felt it is something complicated technology and my assumption was quite natural and i guess every individual have certain assumption on the way technical term sounds, though my theory of assumption is ridiculous but let me tell you its not complicated.

Coming back to "What is I-SCSI" ? , let me try to explain in the less complicated manner.

I-stands for Internet and SCSI as you know stands for Small Computer System Interface. SCSI deals in "Blocks" and Internet deals in "Packet" i.e IP Packet. Here both SCSI and Ethernet technology work together to perform SCSI Data transfers over TCP/IP networks.

It basically allows the block storage SCSI commands to be carried by the standard TCP/IP protocols over the Ethernet wire.

Until recently, Ethernet was too slow to compare to the performance of direct attach storage. With the advent of 1 Gigabit and 10 Gigabit Ethernet, an Ethernet network is now fast enough to use for storage applications.

Technically, this is how it works:
Basically, iSCSI is composed of "initiators" and "targets" that will be used at both ends of the Ethernet wire. The iSCSI initiator connects the computer that initiates the request for data stored on the disk with the Ethernet wire. The iSCSI target connects the Ethernet wire with the storage device, whether it be an array of disks or perhaps a tape device. The initiator encapsulates the SCSI commands and data, so that they can be sent over TCP/IP; and, the target extracts the commands and data at the storage device end of the wire.

From end-user point of view, this is how it works:
When an end user or application sends a request for data, the operating system creates the appropriate SCSI commands, which then go through encapsulation and, in some circumstances, encryption. A packet header is added to the resulting IP packets, and the data is transmitted, typically over an Ethernet connection. When a packet is received, it is decrypted and disassembled, separating the SCSI commands and the data request. The SCSI commands are sent on to the SCSI controller, and from there to the storage device. Because iSCSI is bi-directional, the protocol can also be used to return data in response to the original request.

IBM is already shipping a native iSCSI IP storage system, the IBM TotalStorage IP Storage 200i. Analysts say other companies will speed products to market, once the IETF formalizes the standard. Since 2001 , other companies have also introduced ISCSI storage products.