CEPH – Part 2 – Philosophy and Design

Tags: cephcloudcrushStorage

Published on : November 10, 2015 by

CEPH – Part 2 – Philosophy and Design

To understand the CEPH storage architecture and architecture of an Infinite Storage System explained in Part-1, we need to first understand the very basics of information storage. In historic times, before the invention of paper and ink, humans shared information by passing them orally/verbally to one another. The only storage medium available then was the […]

Continue Reading...


Infinite Storage Scaling Using CEPH -Part-1 [INTRODUCTION]

Tags: cephcrushdata scalingStorage

Published on : September 5, 2015 by

Infinite Storage Scaling Using CEPH -Part-1 [INTRODUCTION]

Since the dawn of mankind, we humans have been creating information. We also invented technologies to store the information and keep growing those technologies to keep up with the growing requirements. So, using technology is not something which we can stop, the thing we have to do is not to stop building technologies, rather find […]

Continue Reading...


How to setup a Network RAID aka Distributed Replicated Block Device [DRBD]

Tags: block devicedrbdhard diskslogical volumesmirroringpartitionsRAID devicesreplicationStorage

Published on : November 22, 2012 by

How to setup a Network RAID aka Distributed Replicated Block Device [DRBD]

Distributed Replicated Block Device (DRBD)  or network raid mirrors block devices between multiple hosts. A block device is the type of device used to represent storage in the Linux Kernel. All physical disk devices present a block device interface. DRBD mirrors a partition between two machines allowing only one of them to mount it at […]

Continue Reading...


How To Setup A Backup LDAP Server Through LDAP Replication With TLS Authentication

Tags: ldapldap replication tlstls authentication

Published on : July 5, 2012 by

How To Setup A Backup LDAP Server Through LDAP Replication With TLS Authentication

If you have set up replication between servers, it is an always a better practice to encrypt (StartTLS) the replication traffic to stop others from sniffing your data. This is distinct from using encryption with authentication as we did in https://www.supportsages.com/2012/06/ldap-configuration-for-user-and-group-centralised-authentication-on-ubuntu-lts-12-04-part-3 . Le us see discuss how to do the LDAP replication with tls authetication. […]

Continue Reading...


How To Setup A Backup LDAP Server Through LDAP Replication

Tags: ldap backupldap server replicationreplicationtls replication

Published on : by

How To Setup A Backup LDAP Server Through LDAP Replication

Since all the LDAP clients depend on the LDAP server for its functioning, it is very important that the LDAP server is available all the time to serve the request of the clients. In such an environment, it is a standard practice to setup LDAP backup server into LDAP setup to prevent the LDAP server […]

Continue Reading...


Let's Connect

Categories

Your Cart

Cart is empty.

Subtotal
₹0.00
APPLY
0
Send this to a friend