Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for How To Monitor A System With Sysstat On Centos 4.3

Linux

Performance Tools for Optimizing Linux: Process-Specific CPU

Post date: June 1, 2005, 07:06 Category: Optimizing Views: 3991 Comments
Tutorial quote: The tools to analyze the performance of applications are varied and have existed in one form or another since the early days of UNIX. It is critical to understand how an application is interacting with the operating system, CPU, and memory system to understand its performance. This chapter will help you understand where the bottleneck in your system is occuring, and how to fix it.
Mandriva

A Guide to Virtualization on Mandriva Linux 2007 Spring

Post date: May 14, 2007, 23:05 Category: System Views: 4276 Comments
Tutorial quote: Have you ever wished you had another computer handy? Maybe you want to try a new operating system out. Maybe you want to test something experimental without potentially breaking your own system. Maybe you need to run some software that only runs in a different operating system. Mandriva Linux 2007 Spring comes with a range of virtualization options that can help.
Debian

How To Set Up Software RAID1 On A Running System (Debian Lenny)

Post date: August 30, 2009, 16:08 Category: Installing Views: 3786 Comments
Tutorial quote: This guide explains how to set up software RAID1 on an already running Debian Lenny system. The GRUB bootloader will be configured in such a way that the system will still be able to boot if one of the hard drives fails (no matter which one).
Ubuntu

How To Set Up Software RAID1 On A Running LVM System (Ubuntu 10.04)

Post date: June 24, 2010, 10:06 Category: Miscellaneous Views: 3468 Comments
Tutorial quote: This guide explains how to set up software RAID1 on an already running LVM system (Ubuntu 10.04). The GRUB2 bootloader will be configured in such a way that the system will still be able to boot if one of the hard drives fails (no matter which one).
Debian

Debian RAID 1/5 system installer

Post date: May 28, 2005, 22:05 Category: Installing Views: 3815 Comments
Tutorial quote: Instructions for installing a very clean Debian GNU/Linux system that boots from RAID 1, and has RAID 1 or RAID 5 root and data filesystems.

The examples assume two identical harddrives, sda and sdb, on which after a small boot partition, 1 GB is used for swap, 25 GB is used for the root filesystem and everything else is for a big "data" partition that will hold non-system stuff.
Linux

Step-By-Step Configuration of NAT with iptables

Post date: November 22, 2006, 18:11 Category: Network Views: 6783 Comments
Tutorial quote: This tutorial shows how to set up network-address-translation (NAT) on a Linux system with iptables rules so that the system can act as a gateway and provide internet access to multiple hosts on a local network using a single public IP address. This is achieved by rewriting the source and/or destination addresses of IP packets as they pass through the NAT system.
OpenSUSE

Measuring the performance/latency of OpenSuse system - LatencyTOP

Post date: February 17, 2009, 08:02 Category: Optimizing Views: 5971 Comments
Tutorial quote: Skipping audio, slower servers, everyone knows the symptoms of latency. But to know what's going on in the system, what's causing the latency, how to fix it... that's a hard question without good answers right now.

LatencyTOP is a Linux* tool for software developers (both kernel and userspace), aimed at identifying where in the system latency is happening, and what kind of operation/action is causing the latency to happen so that the code can be changed to avoid the worst latency hiccups.
Fedora+Core

Tripwire on your Fedora Box

Post date: April 16, 2005, 00:04 Category: Security Views: 5719 Comments
Tutorial quote: Tripwire is an Intrusion Detection System. This can be used to alert users whenever their system is compromised. Tripwire detects and reports changes in system files. It will alert you through email whenever a change is detected. If the change is due to normal system activity, you can instruct Tripwire not to report the change to that file in future. If the change is not due to normal system activity, then it is a clear indication that something is wrong and you need to act immediately and fix the issue. Thus tripwire comes very handy to maintain the integrity of the system.

There is lot of information on the web about Tripwire. Some people might argue that AIDE (Advanced Intrusion Detection Environment) is better than tripwire and so on. This comparison is beyond the scope of this article. This is an introductory article for novice users who are interested in installing Tripwire on their Fedora Box. Advanced users can refer to the web for relevant information or they can contact appropriate mailing lists like fedora users mailing list.
Linux

Mastering the Enterprise Volume Management System

Post date: April 13, 2005, 19:04 Category: System Views: 3448 Comments
Tutorial quote: The Enterprise Volume Management System, or EVMS, is a disk, partition, and file system manager for Linux that claims to be a comprehensive tool for all disk management tasks. I ran across EVMS and found the idea appealing, so I decided to try it out. I've been working with it for a couple of weeks now, and this article describes what I found.
Debian

Creating A Fully Encrypted Para-Virtualised Xen Guest System Using Debian Lenny

Post date: May 3, 2009, 10:05 Category: Miscellaneous Views: 4310 Comments
Tutorial quote: This document explains how to set up a fully encrypted para-virtualized XEN instance. In this howto, the host system is running Debian Etch, while the guest system to be installed will be using Debian Lenny. If you are concerned about your privacy, you might want to consider using hard disk encryption to protect your valuable private data from spying eyes. Usually, the easiest way would be to use your distribution's installer to set up a fully encrypted system; I think most recent Linux distributions support this. However, when you are using XEN to provide virtualization, there are situations where you might not want to encrypt your whole computer with all guest instances, but instead only encrypt one OS instance. This howto will deal with exactly this situation. It assumes that the XEN host system is already up and running.
Web-based applications and online marketing solutions - LumoLink