rhel 7 disk partitioning with lvm

Most Relevant Content

  • CentOS 7.5 Installation with GUI and LVM Partition

    Red Hat/CentOS Linux is a popular server operating system. Specially who work on mail server, web server, web proxy server, ftp server and file server are so familiar with the Red Hat/CentOS Linux. In my previous article, I discussed how to install CentOS 7.5 Linux step by step with the standard partition. But if you want to work on mail server, web proxy server, ftp server, file server or any other application where disk space changes frequently, the standard partitioning is not recommended in this case because the standard partitioning is not able to manage disk partition dynamically. On the other hand, LVM (Logical Volume Manager) provides opportunity to manage your partition dynamically. So, LVM partitioning is always recommended for Red Hat/CentOS Linux installation. But LVM partitioning is not as easy as the standard partitioning. You should have knowledge about the basic terms of the LVM partitioning. In this article, I will discuss about the basic terms of LVM and the basic architecture of LVM. I will also discuss how to install CentOS 7.5 Linux with LVM partitioning. LVM Components The following three terms are the basic components of the LVM partitioning. Physical Volume: The underlying physical storage unit of [...]

    READ MORE »

  • You May Also Like

  • »

    How to Clear Google Chrome History |   August 20, 2015

    Google Chrome is one of the most popular web browsers to online users. It provides a lot of features which help to use this browser smoothly and securely. Google Chrome history is one of the useful features in Google Chrome which helpfully caches or remembers a lot of browsing information specially username and password or login credential of your important web account when you visit various websites in internet. If you are the only user of your desktop or laptop, [...]

    READ MORE »

  • »

    Setting Google as Default Search Engine |   September 30, 2015

    Google is one of the most popular search engines to any online user. It is said that no online user cannot go a single day without Google search engine. Google search statistics shows that over 40,000 search queries are processed every second by Google. If you have any query about any subject, just type in Google search box and Google will show you billion of results related to your search query within less than a second. So, usually you will want [...]

    READ MORE »

  • »

    MikroTik Firewall Basic Concept |   October 6, 2017

    MikroTik Firewall functions as a network security tool for preventing unauthorized access to networks as well as provides Network Address Translation functionality. So, a network administrator who is using MikroTik Router in his network cannot go a single day without MikroTik Firewall. Actually, the main duty of a MikroTik administrator is to maintain Firewall properly along with Bandwidth management after completing MikroTik Router basic configuration. So, a MikroTik administrator should have enough knowledge on MikroTik Firewall and so this article [...]

    READ MORE »

  • »

    IP Based Virtual Hosting on CentOS 7 with Apache Server |   July 18, 2019

    Virtual Hosting is a method of hosting multiple domains on single web server. If you have multiple domains (such as domain1.com, domain2.com and so on) and want to host on single web server, Virtual Web Hosting is your right choice. Apache web server provides an easy way to manage Virtual Hosting. Virtual Hosting can be either Name Based or IP Based. In Name Based Virtual Hosting, multiple domains can be hosted on single IP address. On the other hand, in [...]

    READ MORE »

  • »

    MikroTik Site to Site OpenVPN Server Setup (RouterOS Client) |   April 9, 2018

    VPN (Virtual Private Network) technology provides a secure and encrypted tunnel across a public network. So, a private network user can send and receive data to any remote private network through VPN tunnel as if his/her network device was directly connected to that private network. MikroTik OpenVPN Server provides a secure and encrypted tunnel across public network for transporting IP traffic using PPP. OpenVPN Server uses SSL Certificates. So, OpenVPN Tunnel is a trusted tunnel to send and receive data [...]

    READ MORE »

  • »

    MikroTik Blocking All Websites Except a Few Websites |   May 7, 2019

    A few days ago, someone asked me how to block all websites except one with MikroTik Firewall. For this, I have decided to discuss about blocking all websites except someone’s whitelist. Unlike firewall devices, MikroTik Firewall by default allows all websites. So, if you need to block any website, you have to create a firewall rule that will block the specific website. Now if we want to block all websites and want to allow a few websites, we have to [...]

    READ MORE »

  • »

    How to Block a Phone from WiFi Router |   May 8, 2024

    We usually buy a WiFi Router from market and configure SSID and password to access it. We also configure DHCP Server so that whenever a phone or IP device gets connected to this SSID with the password, the device can get an IP address automatically and can get internet access. It is not possible to secure the WiFi Network keeping only the password authentication method. Because the password can be shared by the users or can be hacked easily. So, [...]

    READ MORE »

  • »

    MikroTik Site to Site VPN with L2TP/IPsec |   March 3, 2018

    VPN (Virtual Private Network) is a technology that provides a secure and encrypted tunnel across a public network. A private network user can send and receive data to any remote private network using this VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik L2TP server is one of the most popular VPN services. It provides a secure and encrypted tunnel across public network for transporting IP traffic using PPP. L2TP/IPsec is more secure than [...]

    READ MORE »

  • »

    MikroTik IPIP Tunnel with IPsec (Site to Site VPN) |   March 18, 2018

    VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides IPIP tunnel that is used to create a site to site VPN. IPIP tunnel is a simple protocol that encapsulates IP packets in IP to make a tunnel between two routers. To encapsulate [...]

    READ MORE »