lvm disk in centos/redhat 7
Most Relevant Content
CentOS 7.5 Installation with GUI and LVM Partition
Red Hat/CentOS Linux is a popular server operating system. Specially who work on mail server, web server, web proxy server, ftp server and file server are so familiar with the Red Hat/CentOS Linux. In my previous article, I discussed how to install CentOS 7.5 Linux step by step with the standard partition. But if you want to work on mail server, web proxy server, ftp server, file server or any other application where disk space changes frequently, the standard partitioning is not recommended in this case because the standard partitioning is not able to manage disk partition dynamically. On the other hand, LVM (Logical Volume Manager) provides opportunity to manage your partition dynamically. So, LVM partitioning is always recommended for Red Hat/CentOS Linux installation. But LVM partitioning is not as easy as the standard partitioning. You should have knowledge about the basic terms of the LVM partitioning. In this article, I will discuss about the basic terms of LVM and the basic architecture of LVM. I will also discuss how to install CentOS 7.5 Linux with LVM partitioning. LVM Components The following three terms are the basic components of the LVM partitioning. Physical Volume: The underlying physical storage unit of [...]
- »
Firewalld Installation and Configuration in Ubuntu Server | May 5, 2022
Firewalld is an awesome host based firewall management tool for Linux Operating System. Firewalld has developed on Fedora but it is now available for almost all Linux distributions. So, Firewalld can be installed in Ubuntu Server although Ubuntu Server has UFW as the default firewall system. Firewalld is more robust and easy to maintain than UFW, I think. So, I am going to discuss how to install and configure Firewalld in Ubuntu Server. Installing Firewalld in Ubuntu Server By default [...]
- »
How to Separate MikroTik Hotspot and DHCP IP Pool | October 9, 2020
MikroTik default Hotspot Setup comes with a DHCP Server (which uses same IP Pool of Hotspot Server) to provide IP address and other network information to a connected device. Using this automatic IP address connected device can access Hotspot login page. After successfully login, a one to one NAT IP address is also assigned for the device and this process happens internally in Hotspot Server. User device cannot know this one to one NAT IP assigning. However, Hotspot Server actually [...]
- »
How to Buy a Good WiFi Router for Home or Office | October 12, 2021
You are here because you want to buy a WiFi Router and want to know how to buy a good WiFi Router for your home or office or business. A lot of wireless routers are nowadays available in the market. But before buying a WiFi Router, you should know which one is a good WiFi Router for your need based on some features and specifications of the router. We will now see some key points those should have well understand [...]
- »
Unlocking Digital Opportunities: A Beginner’s Guide to Computer Networking | October 14, 2025
Summary Computer networking has created the digital world, enabling communication networks that unite various regions of the world and connect any device in some way or another. Networking provides new opportunities to secure employment, act as freelance workers, or even pursue volunteer work, which is why it is worth investing in for career development. Being practical should be valued even more than theory. Even after setting up a home lab, reviewing real projects, and consulting trusted sources, you will learn [...]
- »
MikroTik Bandwidth Management using Simple Queue | September 3, 2015
MikroTik is one of the most popular routers in computer networking. It is said that no office or ISP company cannot go a single day without MikroTik Router. MikroTik Router is also a popular router to a network administrator because MikroTik Router is easily maintainable with graphical user interface software named winbox than other routers. A lot of services are available in MikroTik router to run a network smoothly. Among these services, Bandwidth Management Service is the most popular service in [...]
- »
CentOS 7 Partition Management with fdisk Utility | February 11, 2019
CentOS or Red Hat Linux is a popular server operating system to the system administrators. Almost all the system admins or IT guys who play with mail server, file server, proxy server and so on are so known with CentOS or Red Hat Linux and cannot go a single day without this operating system. The guys who are also wish to be a system admin should be familiar with CentOS or Red Hat operating system. In my previous article, I [...]
- »
Setting Google as Default Search Engine | September 30, 2015
Google is one of the most popular search engines to any online user. It is said that no online user cannot go a single day without Google search engine. Google search statistics shows that over 40,000 search queries are processed every second by Google. If you have any query about any subject, just type in Google search box and Google will show you billion of results related to your search query within less than a second. So, usually you will want [...]
- »
MikroTik Firewall Basic Concept | October 6, 2017
MikroTik Firewall functions as a network security tool for preventing unauthorized access to networks as well as provides Network Address Translation functionality. So, a network administrator who is using MikroTik Router in his network cannot go a single day without MikroTik Firewall. Actually, the main duty of a MikroTik administrator is to maintain Firewall properly along with Bandwidth management after completing MikroTik Router basic configuration. So, a MikroTik administrator should have enough knowledge on MikroTik Firewall and so this article [...]
- »
How to Create Free SSL/TLS Certificate with OpenSSL | July 23, 2021
SSL/TLS certificate is required to encrypt data sent over internet communication. Without encryption, the sent data can be hacked by the middle man attack. SSL/TLS certificate is usually a pair key, public key and private key, solution where data is encrypted with public key and decrypted with private key. In public communication, public key is required to be signed by a CA (certificate authority) but in private communication, there is no need to be signed by any CA. If we [...]
You May Also Like