Daily Shell Backup Script Rumi, April 19, 2013 #!/bin/sh DAY=`/bin/date +%Y%m%d` TFILE="/var/log/pdns-cache/$(basename $0).$DAY.csv" rec_control dump-cache $TFILE echo "cache dump completed, dump script by rumi (hasan.emdad@mango.com.bd)" Continue Reading
Manage Multiple MySQL Servers using PHPmyAdmin Rumi, April 19, 2013April 19, 2013 In my environment, I have 5 different MySQL database servers running separately under different geographical location. Since it run standalone and not in cluster mode, I need to have one platform to manage these database servers altogether. PHPmyAdmin is able to do this, with some changes on the configuration files…. Continue Reading
CentOS: Configure Piranha as Load Balancer (Direct Routing Method) Rumi, April 19, 2013 I am currently working on a web cluster project using CentOS. In this project, I have 2 web servers running on Apache and mounted the same document root to serve the HTTP content. I also have 2 servers in front of it to become the load balancer and failover to… Continue Reading
Munin adding up new eth interface Rumi, April 17, 2013 root@pluto:/usr/share/munin/plugins# ./if_ suggest ath0 eth0 –shell munin-node-configure –shell creates symlink commands to link useful plugins from the plugin library to the plugin service directory (usually /etc/munin/plugins). To continue the if_ example: root@pluto:/usr/share/munin/plugins# munin-node-configure –shell ln -s /usr/share/munin/plugins/if_ /etc/munin/plugins/if_ath0 ln -s /usr/share/munin/plugins/if_ /etc/munin/plugins/if_eth0 Continue Reading
John Goddard- World Famous Adventurer Rumi, April 7, 2013 One rainy afternoon an inspired 15-year old boy named John Goddard sat down at his kitchen table in Los Angeles and wrote three words at the top of a yellow pad, "My Life List." Under that heading he wrote down 127 goals. These were not simple or easy goals. They… Continue Reading
Centos Install and Configure MRTG Rumi, April 6, 2013 The Multi Router Traffic Grapher (MRTG) is a tool to monitor the traffic load on network-links. MRTG generates HTML pages containing PNG images which provide a LIVE visual representation of this traffic. You need the following packages: mrtg : Multi Router Traffic Grapher net-snmp and net-snmp-utils : SNMP (Simple Network… Continue Reading
Creating a Certificate Signing Request Using Certreq.exe Rumi, April 6, 2013 Create a file named CSRParameters.inf on the C:\ drive using the contents below as a template (replace the single quotes with double quotes): [NewRequest] Subject="CN=mailgw.mango.com.bd,OU=IIG,O=Mango Teleservices Limited,S=Not Applicable,L=Dhaka,C=BD" KeySpec=1 KeyLength=2048 Exportable=TRUE MachineKeySet=TRUE SMIME=False PrivateKeyArchive=FALSE UserProtected=FALSE UseExistingKeySet=FALSE ProviderName="Microsoft RSA SChannel Cryptographic Provider" ProviderType=12 RequestType=PKCS10 KeyUsage=0xa0 Silent=TRUE [EnhancedKeyUsageExtension] OID=1.3.6.1.5.5.7.3.1 Open a command… Continue Reading
Replacing the default (self signed) certificate on a RD Session Host server Rumi, April 1, 2013April 1, 2013 Many times I wanted to get rid of that annoying certificate warning message when I make a RDP connection to a RD Session Host server or a workstation. If you are using RDP inside an Active Directory network, the warning is gone, because the connection is using kerberos for security,… Continue Reading
Creating a Windows Server 2008 R2 Failover Cluster Rumi, April 1, 2013April 1, 2013 I hear you…you want your SQL, DHCP, Hyper-V or other services to be highly available for your clients or your internal users. They can be if you create a Windows Failover Cluster and configure those services in the cluster. By doing that if one of the servers crashes the other(s)… Continue Reading
Configuring DKIM signing in MDaemon Rumi, March 25, 2013March 25, 2013 DomainKeys Identified Mail (DKIM) is an open protocol for protecting email users against email address identity theft and email message content tampering. It does this by providing positive identification of the signer’s identity along with an encrypted “hash” of the message content. To configure and use DKIM: The system administrator… Continue Reading