centos lvm disk partition
Most Relevant Content
CentOS 7.5 Installation with GUI and LVM Partition
Red Hat/CentOS Linux is a popular server operating system. Specially who work on mail server, web server, web proxy server, ftp server and file server are so familiar with the Red Hat/CentOS Linux. In my previous article, I discussed how to install CentOS 7.5 Linux step by step with the standard partition. But if you want to work on mail server, web proxy server, ftp server, file server or any other application where disk space changes frequently, the standard partitioning is not recommended in this case because the standard partitioning is not able to manage disk partition dynamically. On the other hand, LVM (Logical Volume Manager) provides opportunity to manage your partition dynamically. So, LVM partitioning is always recommended for Red Hat/CentOS Linux installation. But LVM partitioning is not as easy as the standard partitioning. You should have knowledge about the basic terms of the LVM partitioning. In this article, I will discuss about the basic terms of LVM and the basic architecture of LVM. I will also discuss how to install CentOS 7.5 Linux with LVM partitioning. LVM Components The following three terms are the basic components of the LVM partitioning. Physical Volume: The underlying physical storage unit of [...]
- »
Ubuntu Server 20.04 Installation with LVM | May 28, 2021
Linux is a free and open source operating system developed by Linus Torvalds on September 17, 1991. It is mainly used as server environment. A lot of Linux distributions are present today. Among them, Ubuntu is one of the best stable Linux distributions. Ubuntu has both Desktop and Server distribution. Ubuntu Server is a high performance and stable enterprise Linux distribution and it can be easily used in production. Ubuntu Server has both community-support and well documentation. So, IT guys can use Ubuntu [...]
- »
LVM Management in CentOS/Red Hat 7 Linux | March 15, 2019
LVM (Logical Volume Manager) is the recommended partition method for CentOS/Red Hat 7 Linux. Specially, if we work on Mail Server, File Server, FTP Server, Web Proxy Server or any application where disk space changes frequently, the LVM partition is mandatory in this case. In my previous article, I discussed how to install CentOS 7.5 with LVM partitioning. If you are new here or CentOS 7 is not yet installed, I will suggest you to follow my previous article and [...]
- »
CentOS 7 Partition Management with fdisk Utility | February 11, 2019
CentOS or Red Hat Linux is a popular server operating system to the system administrators. Almost all the system admins or IT guys who play with mail server, file server, proxy server and so on are so known with CentOS or Red Hat Linux and cannot go a single day without this operating system. The guys who are also wish to be a system admin should be familiar with CentOS or Red Hat operating system. In my previous article, I [...]
- »
DHCP Server Configuration in MikroTik RouterOS 7 | October 14, 2015
Dynamic Host Configuration Protocol (DHCP) is a client/server protocol. DHCP server automatically provides an Internet Protocol (IP) address and other related information such as subnet mask, default gateway and DNS to DHCP clients. DHCP server and client use UDP port 67 and 68 for communication. In a network, a DHCP client (IP devices such as Desktop, Laptop, Smartphone etc.) requests for an IP lease to DHCP servers and a DHCP server responses allocating IP address and other related IP information [...]
- »
CAPsMAN Channel Planning with Non-Overlapping Frequency | March 16, 2020
MikroTik CAPsMAN is an excellent application for managing multiple CAPs (Controlled Access Point) in a Wireless Network. But multiple APs create frequency overlapping issue if channels are not configured properly. Channel overlapping is required for smooth connection while roaming but there should not be frequency overlapping because frequency overlapping makes wireless performance so poor. In my previous article, I discussed MikroTik CAPsMAN basic configuration with default channel configuration. In this article, I will discuss how to configure CAPsMAN channel to [...]
- »
7 Best WiFi Router Brands For Home Or Apartment | September 18, 2021
So, you are deciding to buy a WiFi Router for your home or apartment and finding which brand will be the best WiFi Router for your home. A lot of brands which manufacture WiFi Router for home usage are available nowadays in the market but all brands are not renowned and don’t provide best performance for home usage. So, before going to buy a WiFi Router, you should have better understanding about Best WiFi Router Brand that provides best WiFi [...]
- »
How to Separate MikroTik Hotspot and DHCP IP Pool | October 9, 2020
MikroTik default Hotspot Setup comes with a DHCP Server (which uses same IP Pool of Hotspot Server) to provide IP address and other network information to a connected device. Using this automatic IP address connected device can access Hotspot login page. After successfully login, a one to one NAT IP address is also assigned for the device and this process happens internally in Hotspot Server. User device cannot know this one to one NAT IP assigning. However, Hotspot Server actually [...]
- »
Firewalld Installation and Configuration in Ubuntu Server | May 5, 2022
Firewalld is an awesome host based firewall management tool for Linux Operating System. Firewalld has developed on Fedora but it is now available for almost all Linux distributions. So, Firewalld can be installed in Ubuntu Server although Ubuntu Server has UFW as the default firewall system. Firewalld is more robust and easy to maintain than UFW, I think. So, I am going to discuss how to install and configure Firewalld in Ubuntu Server. Installing Firewalld in Ubuntu Server By default [...]
- »
How to Block a Phone from WiFi Router | May 8, 2024
We usually buy a WiFi Router from market and configure SSID and password to access it. We also configure DHCP Server so that whenever a phone or IP device gets connected to this SSID with the password, the device can get an IP address automatically and can get internet access. It is not possible to secure the WiFi Network keeping only the password authentication method. Because the password can be shared by the users or can be hacked easily. So, [...]
More Similar Content
You May Also Like