Sunday, February 4, 2024

Interview Questions for Linux/UNIX and Solaris

Linux Interview Questions 

Important One - https://geekstuffweb.wordpress.com/2016/07/12/linux-interview-questions-and-answers-for-l2-and-l3-engineers/


https://testbook.com/interview/linux-troubleshooting-interview-questions

https://awstip.com/sre-devops-interview-questions-linux-troubleshooting-1b8ffe82c16

https://mindmajix.com/linux-interview-questions

https://linuxopsys.com/topics/linux-interview-questions-answers

https://tuxcare.com/blog/5-common-linux-server-problems-and-how-to-fix-them/

https://www.thegeekstuff.com/2011/12/linux-performance-monitoring-tools/

https://www.linuxscrew.com/category/linux/


Subscribed one - https://testbook.com/interview/linux-networking-interview-questions

https://www.nightwolf.in/nightwolf-cotribution/network/


Booting Process of Linux 

https://www.freecodecamp.org/news/the-linux-booting-process-6-steps-described-in-detail/


Oracle - Exadata, PCA, ZFSSA, ODA, SuperCluster Definition and Function


1. Exadata,SuperCluster,ODA

https://licensingoracle.com/knowledge-center/exadata-supercluster/


2. Configuring an Oracle ZFS Storage ZS3-BA with an Oracle SuperCluster

https://www.oracle.com/technetwork/server-storage/sun-unified-storage/documentation/zs3ba-supercluster-config-2014-2227429.pdf


3. Exadata Architecture

https://www.oracle.com/database/technologies/exadata/architecture/


4.   Introduction to Oracle Exadata Database Machine and Oracle Exadata Storage Expansion Rack

https://docs.oracle.com/en/engineered-systems/exadata-database-machine/dbmso/exadata-introduction.html#GUID-B978FAD1-5E8D-4518-8BAA-2A06DB3F0883




Unix/Linux Command Reference 

https://files.fosswire.com/2007/08/fwunixref.pdf




Linux Blog 

https://learnlinuxconcepts.blogspot.com/2014/10/this-blog-is-to-help-those-students-and.html



Friday, December 18, 2020

Troubleshooting Solaris Interview Questions and Answers

 https://www.unixarena.com/2013/06/solaris-scenario-based-interview.html/


https://mylearnjoy.wordpress.com/2015/11/18/solaris-l3-interview-questions-answers/


https://mindmajix.com/sun-solaris-administration-interview-questions


https://docs.oracle.com/cd/E19455-01/806-1075/806-1075.pdf


https://iqsanswers.com/sun-solaris-interview-questions-and-answers/

Thursday, May 9, 2019

How to save LDOM configuration and restore from xml file

https://www.thegeekdiary.com/how-to-save-ldom-configuration-and-restore-from-xml-file/

Saving LDOM configuration

To save constraints of a single domain :
# ldm list-constraints -x ldom_name > ldom_name.xml

To save constraints of all the domains :



# ldm list-constraints -x > all_ldoms.xml

Restoring LDOM configuration

There are 2 ways to restore a LDOM configuration. 1. Using ldm add-domain command and xml file 2. Using ldm init-system command and xml file

Using ldm-add domain command

Build domain by using the xml file
# ldm add-domain -i ldom01.xml
Bind and start the LDOM
# ldm bind ldom01
# ldm start ldom01

Using ldm init-system command

1. Restore primary domain configuration Ensure that the current sp configuration is factory default. If not set it to factory default. Refer the post here. primary# ldm list-config | grep “factory-default” factory-default [current]
primary# ldm init-system -r -i primary.xml
-r -> reboot after configuration is complete
-i -> specify xml file location
2. Restore all domains configuration We can also restore all the domains configuration ata time using ldm init-system and xml configuration file.
# ldm init-system -r -i all_ldoms.xml
After the system reboots, bind and restart all the domains.
# ldm bind ldom01 
# ldm start ldom01
# ldm bind ldom02
# ldm start ldom02

How to save LDOM configuration and restore from xml file


https://www.thegeekdiary.com/how-to-save-ldom-configuration-and-restore-from-xml-file/
https://www.thegeekdiary.com/how-to-save-ldom-configuration-and-restore-from-xml-file/

Tuesday, April 2, 2019

SAN Related Questions and Answers..............

What is SAN storage and how it works?

A Storage Area Network is a high-speed sub network of shared storage devices. A SAN's architecture works in a way that makes all storage devices available to all servers on a LAN or WAN. As more storage devices are added to a SAN, they too will be accessible from any server in the larger network.

zoning



In a storage area network (SAN), zoning is the allocation of resources for device load balancing and for selectively allowing access to data only to certain users. Essentially, zoning allows an administrator to control who can see what in a SAN.

Zoning is done using a structure similar to that of a computer file system. A zone is the equivalent of a folder or directory. Zoning can be either hard or soft. In hard zoning, each device is assigned to a particular zone, and this assignment does not change. In soft zoning, device assignments can be changed by the network administrator to accommodate variations in the demands on different servers in the network.

The user of zoning is said to minimize the risk of data corruption, help secure data against hackers, slow the spread of viruses and worms, and minimize the time necessary for servers to reboot. However, zoning can complicate the scaling process if the number of users and servers in a SAN increases significantly in a short period of time.

Difference between SAN and NAS

An illustration of the differences between SAN and NAS.

Storage area networks (SANs) and network attached storage (NAS) both provide networked storage solutions. A NAS is a single storage device that operates on data files, while a SAN is a local network of multiple devices.
The differences between NAS and SAN can be seen when comparing their cabling and how they're connected to the system, as well as how other devices communicate with them. However, the two are sometimes used together to form what's known as a unified SAN.

SAN vs. NAS Technology

A NAS unit includes a dedicated hardware device that connects to a local area network, usually through an Ethernet connection. This NAS server authenticates clients and manages file operations in much the same manner as traditional file servers, through well-established network protocols.
To reduce the costs that occur with traditional file servers, NAS devices generally run an embedded operating system on simplified hardware and lack peripherals like a monitor or keyboard and are instead managed through a browser tool.
A SAN commonly utilizes Fibre Channel interconnects and connects a set of storage devices that are able to share data with one another.

Important NAS and SAN Benefits

The administrator of a home or small business network can connect one NAS device to a local area network. The device itself is a network node, much like computers and other TCP/IP devices, all of which maintain their own IP address and can effectively communicate with other networked devices.
Given that the network attached storage device is attached to the network, all the other devices on that same network have easy access to it (given that proper permissions are set up). Because of their centralized nature, NAS devices offer an easy way for multiple users to access the same data, which is important in situations where users are collaborating on projects or utilizing the same company standards.
Using a software program provided with the NAS hardware, a network administrator can set up automatic or manual backups and file copies between the NAS and all the other connected devices. Therefore, a NAS device is also useful for the opposite reason: to offload local data to the network storage device's much larger storage container.
This is useful not only to ensure that users do not lose data, since the NAS can be backed up on a regular schedule regardless of the end-user's ability to back up, but also to give other network devices a place to keep large files, especially large files that are often shared among other network users.
Without a NAS, users have to find another (often slower) means to send data to other devices on the network, like over email or physically with flash drives. The NAS holds many gigabytes or terabytes of data, and administrators can add additional storage capacity to their network by installing additional NAS devices, although each NAS operates independently.
Administrators of large enterprise networks may require many terabytes of centralized file storage or extremely high-speed file transfer operations. While installing an army of many NAS devices is not a practical option, administrators can instead install a SAN containing a high-performance disk array to provide the needed scalability and performance.
However, SANs are not always physical. You can also create virtual SANs (VSANs) that are defined by a software program. Virtual SANs are easier to manage and offer better scalability since they're hardware independent and controlled entirely by easy-to-change software.



Lun Masking vs Zoning

Zoning and Lun Masking are often confused for each other, probably because both of them are used to restrict access to storage.  They should both be used to secure the storage network and reduce unnecessary traffic.

Zoning

If you want to specify only certain hosts from accessing a storage device then you would want to setup zoning.  For instance, in the example below, you can see that the two servers on the right can access three of the four storage devices, whereas the two on the left can only access two of the SANs.  This configuration is done on the Fibre Channel switch.  iSCSI, NFS, and FCoE can also be segmented, but they would use typical TCPIP segmentation methods like setting up a VLAN.
There are two type of zoning techniques: Hard Zoning and Soft Zoning.
Soft zoning filters one device from seeing another device.  However, if the ports are manually setup, the switch will not stop the devices from communicating.  Hard zoning by comparison prevents one port from sending traffic to the other port and is more secure.
Zoning can also be setup based off the port or the World Wide Name (WWN).    Port zoning grants access from one port on a switch to another port on a switch.  This would require physical security to be setup around the Fibre Switch, because the zones could be changed around simply by moving the cables in the switch.  This also makes it more of a struggle for management if switches need to be moved or re-cabled.  WWN zoning is setup by allowing access between two WWNs which makes management a little easier, but also is susceptible to WWN spoofing which could allow access to the storage device.
Zoning
LUN Masking

Once the zoning is done, we can further lock down access to the storage by setting up LUN  (Logical Unit Number)  Masking on the storage device.  The SAN would prevent certain devices from seeing a specific LUN that it is hosting.  This may be used more to keep a misbehaving server from accessing a LUN that it doesn’t need access to more than it is a security concern.
In the Example below we have taken a small subset of servers that are accessing one storage device.  The SAN is presenting four LUNs to the server on the right side (with the red arrows) but it is only presenting two LUNs to the server on the left (with the green arrows).
LUNMasking

VLAN Vs Subnet

http://www.fiber-optic-transceiver-module.com/vlan-vs-subnet.html

Interview Questions for Linux/UNIX and Solaris

Linux Interview Questions  Important One -  https://geekstuffweb.wordpress.com/2016/07/12/linux-interview-questions-and-answers-for-l2-and-l...