lvm resize
Most Relevant Content
LVM Management in CentOS/Red Hat 7 Linux
LVM (Logical Volume Manager) is the recommended partition method for CentOS/Red Hat 7 Linux. Specially, if we work on Mail Server, File Server, FTP Server, Web Proxy Server or any application where disk space changes frequently, the LVM partition is mandatory in this case. In my previous article, I discussed how to install CentOS 7.5 with LVM partitioning. If you are new here or CentOS 7 is not yet installed, I will suggest you to follow my previous article and install CentOS 7 with LVM partitioning and then continue this article. In this article, I will discuss how to manage LVM partitioning in CentOS/ Red Hat 7 Linux with the command line utility. Basic Components and Architecture of LVM Before going to start LVM management with command line tool, we should have basic knowledge on the basic LVM terms and architecture. The following three terms are the basic components of the LVM partitioning. Physical Volume: The underlying physical storage unit of an LVM is a block device such as a partition of a disk or the whole disk. To use the block device for an LVM logical volume, the device must be initialized as a physical volume (PV). Volume Groups: [...]
- »
MikroTik Site to Site VPN with L2TP/IPsec | March 3, 2018
VPN (Virtual Private Network) is a technology that provides a secure and encrypted tunnel across a public network. A private network user can send and receive data to any remote private network using this VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik L2TP server is one of the most popular VPN services. It provides a secure and encrypted tunnel across public network for transporting IP traffic using PPP. L2TP/IPsec is more secure than [...]
- »
How to Block Tor Browser with MikroTik Router | June 12, 2019
Tor Browser is an alternative to VPN and Web Proxy that breaks blocking firewall rule. If any user installs and uses Tor Browser, he/she can hide the public IP address of router and can unblock blocked websites applied on a network. So, administrators should block Tor Nodes along with other blocking firewall rule. In my previous article, I discussed how to block VPN and Proxy access with MikroTik Router and in this article I will discuss how to block Tor [...]
- »
MikroTik EoIP Tunnel for Bridging LANs over the Internet | April 22, 2018
VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides EoIP (Ethernet over IP) that is used to create a site to site VPN tunnel. EoIP tunneling is a MikroTik RouterOS protocol that creates an Ethernet tunnel between two MikroTik Routers on top [...]
- »
Red Hat/CentOS 7 Linux Installation (Minimal Packages) | April 18, 2017
Linux is a free and open source operating system developed by Linus Torvalds on September 17, 1991. It is mainly used as server environment. A lot of Linux distributions are present today. Among them, Red Hat Linux is used as enterprise Linux. Red Hat is also known as Red Hat commercial Linux that means Red Hat is a paid service program. CentOS (Community Enterprise Operating System) is another Linux distribution that provides a free and open source, enterprise-class, community-supported server platform functionally [...]
- »
MikroTik Configuration with PPPoE WAN Connection | July 18, 2018
MikroTik Router is a popular routing device to any network administrator because of having a lot of network features availability. MikroTik PPPoE Client is a special feature that is used to connect any PPPoE Server. If your ISP provides PPPoE connection, MikroTik Router is able to connect that PPPoE Server using PPPoE Client. In my previous article, I discussed how to configure MikroTik Router with static WAN connection and in this article I will show how to configure MikroTik Router [...]
- »
Getting Started with Red Hat Linux | May 20, 2017
Red Hat Linux is an open source server operating system. Although open source Red Hat is a commercial Linux distribution. So, most of the Linux administrators use CentOS because CentOS is a free and open source, enterprise-class and community-supported server platform as well as it is functionally compatible with Red Hat Enterprise Linux. In my previous article, I showed how to install CentOS 7 core packages in your server machine. Today I will introduce you with Red Hat Linux’s command [...]
- »
MikroTik VPN Configuration with PPTP (Connecting Remote Client) | August 17, 2016
VPN (Virtual Private Network) is a technology that extends private network across a public network. It enables private network users to send and receive data across public network as if their network devices were directly connected to the private network. There are many VPN services in MikroTik RouterOS 7. Among them, MikroTik PPTP is a mostly used VPN service. It is a client-server VPN technology. So, a user can access server, printer, IP phone and any other network devices of [...]
- »
How to Customize MikroTik Hotspot Login Page | September 12, 2020
MikroTik Hotspot is an awesome service that can be customized according to any organization need. MikroTik Hotspot is able to authenticate and authorize network users so easily. Besides premium Hotspot service, it can also be used as a public Hotspot network. Although public network is a free network service, it can be a better source of income by serving ads. As no user can get internet access without visiting Hotspot login page, the login page is main space for serving [...]
- »
MikroTik Router Web Proxy Configuration | August 28, 2016
A Proxy Server is usually placed between users and the internet so that the proxy server can track the activities of any user. Formerly, a proxy server was mainly used for caching the static content of any web server because the internet speed was too slow. So, users would get high speed for browsing as if they were browsing a local server. But nowadays the internet bandwidth has increased. So, the proxy server is usually not used for web caching [...]
You May Also Like