centos disk partitioning best practice

Most Relevant Content

  • CentOS 7.5 Installation with GUI and LVM Partition

    Red Hat/CentOS Linux is a popular server operating system. Specially who work on mail server, web server, web proxy server, ftp server and file server are so familiar with the Red Hat/CentOS Linux. In my previous article, I discussed how to install CentOS 7.5 Linux step by step with the standard partition. But if you want to work on mail server, web proxy server, ftp server, file server or any other application where disk space changes frequently, the standard partitioning is not recommended in this case because the standard partitioning is not able to manage disk partition dynamically. On the other hand, LVM (Logical Volume Manager) provides opportunity to manage your partition dynamically. So, LVM partitioning is always recommended for Red Hat/CentOS Linux installation. But LVM partitioning is not as easy as the standard partitioning. You should have knowledge about the basic terms of the LVM partitioning. In this article, I will discuss about the basic terms of LVM and the basic architecture of LVM. I will also discuss how to install CentOS 7.5 Linux with LVM partitioning. LVM Components The following three terms are the basic components of the LVM partitioning. Physical Volume: The underlying physical storage unit of [...]

    READ MORE »

  • You May Also Like

  • »

    How to Create Free SSL/TLS Certificate with OpenSSL |   July 23, 2021

    SSL/TLS certificate is required to encrypt data sent over internet communication. Without encryption, the sent data can be hacked by the middle man attack. SSL/TLS certificate is usually a pair key, public key and private key, solution where data is encrypted with public key and decrypted with private key. In public communication, public key is required to be signed by a CA (certificate authority) but in private communication, there is no need to be signed by any CA. If we [...]

    READ MORE »

  • »

    MikroTik EoIP Tunnel for Bridging LANs over the Internet |   April 22, 2018

    VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides EoIP (Ethernet over IP) that is used to create a site to site VPN tunnel. EoIP tunneling is a MikroTik RouterOS protocol that creates an Ethernet tunnel between two MikroTik Routers on top [...]

    READ MORE »

  • »

    MikroTik WiFi MAC Authentication with UserMan RADIUS Server |   December 23, 2019

    MikroTik Wireless Router is popularly used as WiFi AP. MikroTik WiFi AP has a lot of features to tune WiFi network as your requirements. MAC authentication is one the amazing and useful features in MikroTik WiFi. MAC authentication enables filtering MAC address that means no MAC can be able to connect to WiFi AP without authentication.  MAC authentication can be done either local database or RADIUS Server. MAC authentication with RADIUS Server provides facility to manage multiple APs from centralized [...]

    READ MORE »

  • »

    How to Properly Downgrade MikroTik RouterOS and Firmware |   October 2, 2019

    MikroTik RouterOS is in constant development and new features or bug fixes are frequently available, sometimes even monthly. So, it is always recommend upgrading MikroTik RouterOS to a latest and stable version before beginning any configuration. But sometimes you may face that the upgraded version is not working properly according to your demand or you may upgrade to a new version that you don’t want. In this case, you should come back to your workable RouterOS version and firmware. Upgrading RouterOS [...]

    READ MORE »

  • »

    MikroTik Load Balancing and Link Redundancy with PBR |   March 31, 2019

    In computer networking, the Load Balancing technique is used to send network traffic over multiple gateways. If you have multiple ISP connections available, you can use load balancing technique to establish a stable network. You may now ask, why will I use multiple ISP connections? What are the benefits to use multiple ISP connections in my network? For your satisfaction, the following points are some reasons to use load balancing technique in your network. No ISP can give you 100% [...]

    READ MORE »

  • »

    MikroTik Dual WAN Load Balancing with Failover using PCC |   May 27, 2018

    Hi geek, going through this article means you are finding Load Balancing as well as Link Redundancy solution for your MikroTik network because you already have multiple WAN connections or you are planning to lease multiple WAN connections. MikroTik has various Load Balancing and Link Redundancy methods such as ECMP, PCC and so on. ECMP method provides an easy configurable load balancing with failover solution but it has some known issues too in a large network. On the hand, PCC [...]

    READ MORE »

  • »

    CentOS 7 Network Configuration Using nmtui Tool |   August 27, 2018

    After completing CentOS 7 fresh installation, the first task to a system administrator is to configure its network so that it can communicate to other network devices. In my previous article, I discussed how to install CentOS 7.5 GUI (GNOME Desktop) step by step. If you are a new CentOS 7 user and yet you have not installed CentOS 7.5 on your server machine, feel free to study my previous article and install CentOS 7.5 GNOME Desktop according to that [...]

    READ MORE »

  • »

    How to Block WiFi Access although Password is Known |   April 23, 2024

    We usually get internet connection from any ISP and buy any WiFi Router and then configure wireless/AP with password and configure DHCP Server to get connection from own WiFi devices. We use these WiFi Routers/APs at home, office, workspace or any other public places. Usually, we get connected to our WiFi using our provided WiFi password. Initially there will be no problem to keep your network safe using password authentication. But day by day your password will be known by [...]

    READ MORE »

  • »

    OpenVPN Configuration over Port 443 on Ubuntu Linux |   June 20, 2022

    OpenVPN provides a secure and encrypted VPN tunnel across public network. Unlike PPTP and L2TP VPN Services which can be blocked, OpenVPN can highly be customized and even can be run over so popular TCP Port 443. So, OpenVPN cannot easily be blocked. OpenVPN uses SSL/TLS Certificates. So, OpenVPN Tunnel is a trusted tunnel to send and receive data across public network. OpenVPN Server can easily install on Ubuntu Server. Installing OpenVPN Server on Ubuntu Server, we can connect Windows, [...]

    READ MORE »