Sir Full Notes
Sir Full Notes
Sir Full Notes
About RHEL
Operating system is an interface between user and the computer hardware. The
hardware of the computer cannot understand the human readable language as it works
on binaries i.e. 0's and 1's. Also it is very tough for humans to understand the
binary language, in such case we need an interface which can translate human
language to hardware and vice-versa for effective communication.
Why Linux?
? Fresh implementation of UNIX APIs
? Open source development model
? Supports wide variety of hardware
? Supports many networking protocols and Configurations
? Fully supported
1) Linux is a UNIX like OS: Linux is a similar to UNIX as the various UNIX versions
are to each other.
2) Multi-User and Multi-tasking: Linux is a multi-user and multi-tasking operating
system. That means that more than one person can be logged on to the same Linux
computer at the same time. The same user could even be logged into their account
from two or more terminals at the same time; Linux is also Multi-Tasking. A user
can have more than one program executing at the same time.
3) Wide hardware support: Red Hat Linux support most pieces modern x86 compatible
PC hardware.
4) Fully Supported: Red Hat Linux is a fully supported distribution Red Hat Inc.
provides many support programs for the smallest to the largest companies.
The kernel is a computer program at the core of a computer's operating system with
complete control over everything in the system.[1] It is an integral part of any
operating system. It is the "portion of the operating system code that is always
resident in memory".[2] It facilitates interactions between hardware and software
components. On most systems, it is one of the first programs loaded on startup
(after the bootloader). It handles the rest of startup as well as input/output
(I/O) requests from software, translating them into data-processing instructions
for the central processing unit. It handles memory and peripherals like keyboards,
monitors, printers, and speakers.
The Linux� kernel is the main component of a Linux operating system (OS) and is the
core interface between a computer�s hardware and its processes. It communicates
between the 2, managing resources as efficiently as possible.
The kernel is so named because�like a seed inside a hard shell�it exists within the
OS and controls all the major functions of the hardware, whether it�s a phone,
laptop, server, or any other kind of computer.
------------
------------------
EXT vs XFS:
=============
In simple words Metadata describes the structure of the file system. Most common
metadata structure are superblock, inode and directories.
===============================================================
1. How to create a file?
Directory contains files and sub directories. to see the directory ls -ld and to
see the content in that directory ls -l command can be used.
19. One directory having 7 permissions for owner .. Explain owner privilizes
# cp -R Pictures Pictures_backup
The command above creates the destination directory and recursively copy all files
and subdirectories from the source to the destination directory.
If the destination directory already exists, the source directory itself and its
content are copied inside the destination directory.
Or
22. Suppose if you are not getting any exact switch(argument) for a command, what
you will do?
=====================================================================
1. What is file? how many types of files u know? how to see the file type?
File contains data.. there are multiple type of files like ASSCI file, data file,
Executable file, block device and character device files.
2. if you create a file what are the permissions it will get ? and why ?
It will depends on umask value.As default umak is 0022, the defaults file
permissions are 644 and for directory 755.
Inode is gateway of a file. Inode contains 2 types of data, file permiisions and
addresses of the data blocks.By using ls -i command we will get the inode number.
9. What is sticky bit and how to know if sticky bit is applied on a file or
directory?
To apply:
chmod +t allAccess/
10. What is ACLs.How to apply it ? and how to know if ACL is applied on any file or
directory?
ACLs are special grained permissions. We can set user and group level permissions.
By using setfacl we can apply ACLs.
if you want to apply ACLs on a file, first you have to make sure whether that
mount is mounted with ACLs are not.
In ls -ltr command end of the first field you can see + symbol if ACLs are
applied on a file/directory.
SUID is set to user/file level. If you set SUID, all users can able to execute the
file as a owner of the file.
SGID will be set on directory. then all the files and sub directories that
directory inherits the group ownership from parent directory.
12. One user is not able read a file. Explain the trouble shooting methods.
check the permissions and analyze what kind of permissions that user has. And
accordingly try to fix the issue.
================================================================================
User Management:
1. What are the important files in user management and explain the fields?
in /etc/login.defs
3. How to set/reset the password? IF one user asked to reset his password, how do
you follow that request?
just check whether password really expired, and ask customer to reset his password
and set to ask to change in first login, and send mail to customer in 121 (one to
one) mail.In my environment we will update the password under "customer update-
private" notes.
4. While creating user with default parameters, what will happen backend?
It will collect information from /etc/default/useradd
Check whether server is up or not, Check user is existing or not, check the
password parameters,accvou finally check the secure log file for more information.
6. One user newly joined in your organization. How do you create his account?
from our jump server, we will run a script to create user in all the servers.
7. And one user leaving the company. How to remove his user account?
from our jump server, we will run a script to delete user in all the servers.
Initially we will remove only user .not Home directory. Later after few days we
will remove home directory as well.
There are 3 type of users. Root user, system users and normal users.
10. What type of user account you have? and where to check?
Based on the UID we will come to know. For upto RHEL 6 normal user ids start from
500 and 1000 for RHEL 7.
11. How to lock and unlock a user account and where to confirm whether is is locked
or unlocked?
By using usermod -L and uesrmod -u and in shadow file , password field, you will
see ! symbole before encrypted password.
By using usermod -G and aslo usermod -a -G (-a... it will not overrite old
secondery groups)
13. If you create user with default parameters, what will happen?
id -a username
17.user is not able to accesss even after resetting his password. Why?
pam_tally2 module is used to lock user accounts after certain number of failed ssh
login attempts made to the system. This module keeps the count of attempted
accesses and too many failed attempts.
/etc/pam.d/password-auth
auth required pam_tally2.so file=/var/log/tallylog deny=3
even_deny_root unlock_time=1200
Parameters
file=/var/log/tallylog � Default log file is used to keep login counts.
deny=3 � Deny access after 3 attempts and lock down user.
even_deny_root � Policy is also apply to root user.
unlock_time=1200 � Account will be locked till 20 Min. (remove this parameters if
you want to lock down permanently till manually unlock.)
==============================================================================
Disk Management:
partprobe is a program that informs the operating system kernel of partition table
changes, by requesting that the operating system re-read the partition table
Device files will be created under /dev. Kernel will intract with devices through
these files.
Block devices
Block special files or block devices provide buffered access to hardware devices,
and provide some abstraction from their specifics.[5] Unlike character devices,
block devices will always allow the programmer to read or write a block of any size
(including single characters/bytes) and any alignment. The downside is that because
block devices are buffered, the programmer does not know how long it will take
before written data is passed from the kernel's buffers to the actual device, or
indeed in what order two separate writes will arrive at the physical device.
Additionally, if the same hardware exposes both character and block devices, there
is a risk of data corruption due to clients using the character device being
unaware of changes made in the buffers of the block device.
Both are for partition the disk. fdisk will use MBR partion and parted uses GPT
table.
And fdisk will be used for below 2 TB partition and parted is used for bigger than
2TB.
You can see that we can't add a new partition after reaching the limit of the 04
MBR primary partitions.
Another particularity of the MBR is that a single bit error can render a disk
useless. For these reasons, and more, the Unified Extensible Firmware Interface
(UEFI) specified that MBRs were to be replaced with GUID Partition Tables (GPT),
which overcome these limitations.
2- GPT
GPT for GUID Partition Tables is part of Intel�s EFI specification. The GPT is a
different format than the MBR, but for compatibility reasons, the MBR is stored in
the first logical block and the GPT is stored on the second block. GPT allows disk
with more than 2 TB and up to 128 partitions.
Ask whether it is for Linux or LVM if question if the request is not clear.
Check any free disk is there (lsblk or fdisk).
Ask storage team to assign a LUN
Then scan the HBAs for new LUN visibility.
Partiotion it , save and partprobe it.
Create file system.
And cretae a directory and mount it.
Give entry in fstab file to make it permanant to mount at boot time.
11. After add the disk it is not vissible in OS level. How to fix it?
Rescan the HBS.By sending - - - characters to scan file under HBA folder.
The three values stand for channel, SCSI target ID, and LUN. The dashes act as
wildcards meaning "rescan everything"
12. How to increase the existing Linux partition(example /dev/sdb2) which was
having data.
Process Management:
1) What is process?
it will show some useful information followed by processes running on the server.
with kill -9
Whenever we run a program it creates a parent process and a lot of child processes.
All of these child processes use resources such as memory and CPU allocated to them
by the kernel.
Once these child processes have finished executing they send an Exit call and die.
This Exit call has to be read by the parent process which later calls the wait
command to read the exit_status of the child process so that the child process can
be removed from the processes table. If the Parent reads the Exit call correctly
sent by the Child Process, the process is removed from the processes table.
But, if the parent fails to read the exit call from the child process, the child
process which has already finished its execution and is now dead will not be
removed from the processes table.
Nice defines the priority of a process to be run on CPU. default nice value is zero
and posible nice values are -19 to +20. you can change by using renice, or with top
command.
one way to check the performance is by checking the process. check what is process
consuming more cpu , memory by using top command and check the owner of the file
and inform to owner (Application/DB team ) to take necessary actions.
8) how to see available cpus in server from top command and also command line
with top command ..jusnt hit 1 ..you can see the num of cpus. And also with cat
/proc/cpuinfo.
10) if you see one process consuming more cpu/memory..How do you proceed to fix it?
check what is process consuming more cpu , memory by using top command and check
the owner of the file and inform to owner (Application/DB team ) to take necessary
actions.
It will not be killed using kill -9...Just take the approval from customer and
reboot the server.
signals are instructions send to the processes. You can list all the signals by
using kill -l command.
===================================================================================
====================================
Jobs:
Cron is to schedule the jobs repeated interval of times and at to create for a
single time.
3) How to see the cron jobs & how to delete the cronm jobs?
4) What are the fields in cron tabs? How to schedule the cron job?
Mins, hours,day of the month , month and day of the week and followed by the
command.
5) User is not able to schedule the cron job. What could be the reason?
Check whther user the there in /etc/cron.deny file, else add the user in
/etc/cron.allow file.
If the job is newly created, check the syntax of the crontab entry, check whether
crond is running or not..and finally check the cron log to get more information.
7) One user is there in cron.allow & cron.deny file. What will be the impact?
Under /var/log/cron
===============================================================
links:
1. What is a link?
6) what is the destination file size in hard link and what is in soft link?
For hard links inodes are same. But soft link inodes are different.
Hard link size will be same as original file.
Soft link size will be number of characters in source file path.
First get the partition UUID with blikid command and mount it.
# blkid partitionname
# mount UUID=UUID_number mount point name
Ex:
===============================================================
LVM:
LVM is a tool for logical volume management which includes allocating disks,
striping, mirroring and resizing logical volumes.
LVM allows for very flexible disk space management. It provides features like the
ability to add disk space to a logical volume and it is collection of multiple
physical hard drives and partitions into a single volume group which can then be
divided into logical volumes.
2) What is ihe hexa/ID number for LVM partition, swap , primary and extend?
Every partion type will have one ID..example for primary partition 83, extended 5,
swap 82 and LVM 8e.
Ask storage team for new LUN if no free disk is not availanle.
Rescan the HBAs
Once disk is visible in OS level,partion it and change id as LVM
create PV
Create VG
Create LV and cretae file system on it.
Create a directory and mount it and make entry in fstab to make it permananent at
boot level.
5) what is lvscan?
lvrescan scans all known volume groups or all supported LVM block devices in the
system for defined Logical Volumes. The output consists of one line for each
Logical Volume indicating whether or not it is active, a snapshot or origin, the
size of the device and its allocation policy.
https://www.thegeekdiary.com/corruption-or-accidental-deletion-in-lvm-how-to-
rebuild-lvm-from-archive-metadata-backups-in-rhel-centos/
# lvremove vg01/lv01
# cd /etc/lvm/archive/
Before running the actual restore you can do a dry run using the �test switch as
shown below.
First find the backed up configurations of Volume Group (vg1 in this case)
under /etc/lvm/archive/
Verify if the deleted volume has been successfully restored or not using �lvscan�.
lvscan
lvchange -a y /dev/vg01/lv01
1. Partition the disk ( replace XX with correct number for new device)
2. Create the PV
3.vgextend
vgextend vg_U01 /dev/mapper/mpath17p1
When the migration is completely finished, you will know because the �Copy%� column
will no longer register a value for the LV and VG that you�re working in.
5. Now, you can safely remove the original PV from the VG.
multipath -f /dev/mapper/mpath16
How to restore a volume group and its logical volumes after a disk (physical
volume) that the logical volume was using has failed or the volume has become
corrupted or was overwritten?
https://access.redhat.com/solutions/3334
Note the PV UUID line. This line contains the universally unique identifier (UUID)
of the physical volume that failed and will be needed in the next step:
If the physical volume failed, it must be replaced with a disk or partition that is
equal in size or larger than the failed volume. If the disk did not fail but was
overwritten or corrupted, the same volume can be re-used. Run the following command
to re-initialize the physical volume:
Now the new physical volume has been initialized with the UUID of the old physical
volume. The volume group metadata may be restored with the following command:
Run levels:
Runlevel is state of the server.who -r is the command to check the current runrevel
of the server.
N indicates previous runlevel. If server reboots then previous runlevel will show
as N
If server runlevel changes through init command then previous runlevel will show
instead of N.
Once all the entries in /etc/inittab for your runlevel are executed, the boot
process is completed, and you can log in.
id:runlevels:action:process
action � specific codes in this field tell init how to treat the process. Possible
values include: initdefault, sysinit, boot, bootwait, wait,once and respawn.
process � defines the command or script to execute.
===============================================================
Swap:
1) What is swap?
Swap is virtual memory configured on disk.swap will be used for inactive
pages(processes)
2) how to see the swap utilizaion?
By using free command
3) How to see how swap is assigned?
By using swapon -s
4) How to add (increse ) the swap?
Swap will added(increased) through a partition or through a file.and also by
increasing existing partition (downtime is required as swapoff is needed)
5) what is memory chunk,pagein and page out.
A peace of the memory is called memory chunk(memory page). Moving inactive page
from memory to swap is called pagein(swapin). And moving out from swap is pageout
(swapout)
6) How to see the size of the memory page?
By using getconf PAGE_SIZE command
7) Server(OS) is using swap though there is enough free RAM.why?
Might be because of swappiness. It might be configured less than default value(60)
Huge pages are helpful in virtual memory management in Linux system. As name
suggests, they help is managing huge size pages in memory in addition to standard
4KB page size. You can define as huge as 1GB page size using huge pages.
During system boot, you reserve your memory portion with huge pages for your
application. This memory portion i.e. these memory occupied by huge pages is never
swapped out of memory. It will stick there until you change your configuration.
This increases application performance to great extent like Oracle database with
pretty large memory requirement.
Using huge pages, means you will need fewer pages. This decreases number of mapping
tables to load by kernel to great extent. This increases your kernel level
performance which ultimately benefits your application.
In short, by enabling huge pages, system has fewer page tables to deal with and
hence less overhead to access / maintain them!
RAM (Random Access Memory) is the hardware in a computing device where the
operating system (OS), application programs and data in current use are kept so
they can be quickly reached by the device's processor.
================================================================
Monitoring:
p1, p2,p3,p4
s1,s2,s3,s4
Critical , high , medium , low.
4. What is the difference between monitoring team and service desk team?
Normally for priority cases(p1 and p2) , monitoring or service desk team will call
us and notify us about that incident and will assign to us ince we are okay with
that.
================================================================
Rpms:
1) What is rpm?
-First remove the existing metadata under /var/lib/rpm starts with _DB*
-Then run command rpm �restoredb command.
================================================================
Inodes:
Every Linux file or directory has an inode, and this inode contains all of the
file�s metadata (that is, all the administrative data needed to read a file is
stored in its inode). For example, the inode contains a list of all the blocks in
which a file is stored, the owner information for that file, permissions and all
other attributes that are set for the file. In a sense, you could say that a file
really is the inode, and names are attached to these inodes to make it easier for
humans to work with them.
Check whether free space is there in the FS , then check the inode availability.
If the error is read-only filesystem run fsck to fix the issue.
2) How to provide sudo access to a user..expalin? (means how you will edit the
sudoers file)
for user:
for group:
If you want same sudo permissions for number of different users, you can keep all
the users under user_alias and provide sudo access to that name.
Ex Entry:
User_Alias WEBMASTER = ADMINS, !johnathan
Cmnd_Alias SHUTDOWN = /sbin/poweroff, /sbin/halt, /sbin/reboot
If you want to provide access to multiple commands for different users you can keep
all the commands under command_alias and provide the sudo access.
===================================================================================
=======
By using mount command and better to use -t option. For NAS/NFS it is must.
Try to umount with umount -f and umount -l ( checking fuser & lsof is common
process)
4) unable to see any data in one filesystem. What you will do?
Ans>
a. First check what kind of filesystem it is.
b. If it is local, unmount and mount it, or unmount and run fsck and mount it, or
reboot the server.
c. id it is nas/nfs (remote) , unmount and mount it. Or check with staorage team
for NAS and nsf server for NFS mount.
It will check whether all all filesystems are mounted as per the entries in fstab
file.if not mounted anything it will mount it.
First check whether nfs share is enabled in client side (showmount -e IP_Address of
NAS).
1) How to start the servies? What is the other name for service?
example:
a. To start/stop the service completely while booting.
chkconfig servicename on
chkconfig servicename off
4) Curently one service (Ex: crond) is not running in the server. I used the
command chkconfig crond on. What about current
status of the service on server?
We have to start the service again with service command. The command chkconfig
crond on menas , we are instructiong to crond to be started while server boots.
===================================================================================
=======
passwordless ssh:
To allow users to do ssh from one server to another server without assking
passowrd.
a. login to sourece server with that user who wants passwordless ssh.
b. Create public and private keys (key pair) by using ssh-keygen -t rsa.keys will
be generated uner user home directory/.ssh/id_rsa.pub
c. Copy id_rsa.pub file to under destination server under userhome
directory/.ssh/authorized_keys ( you have to create this file)
d Make sure on detination server, permissions for .ssh folder should be 700 and
file authorized_keys permissions should be 640.
At SSH connect time, the client receives the servers public key, and verifies if
this matches the stored public key in $HOME/.ssh/known_hosts. If this test is
successful, and the server does not have the clients public key, a password is
required. Else, the server sends a message encrypted with the clients public key
and if the client manages to decrypt the message successfully, using its private
key, the connect is established.
===================================================================================
==
ssh and telnet:
===================================================================================
=======
Log files:
1.What are the log files u are aware in Linux and name them and explain its
purpose.
There are many log files related to OS under /var/log/
Example:
/var/log/messages : General message and system related stuff
/var/log/auth.log : Authenication logs
/var/log/kern.log : Kernel logs
/var/log/cron.log : Crond logs (cron job)
/var/log/maillog : Mail server logs
/var/log/httpd/ : Apache access and error logs directory
/var/log/boot.log : System boot log
/var/log/mysqld.log : MySQL database server log file
/var/log/secure or /var/log/auth.log : Authentication log
/var/log/utmp or /var/log/wtmp : Login records file
/var/log/yum.log : Yum command log file.
3.message file or some other log file is not updating . What could be the reason?
Might be syslogd is not running. check and restart it.
compression:
Tar is to compress the folders and other compress commands to compress the files.
GZIP is based on an algorithm known as DEFLATE. It uses both the LZ77 algorithm
and Huffman coding.
# tar -xvf cleanfiles.sh.tar cleanfiles.sh (Untar Single file from tar File)
OR
# tar --extract --file=cleanfiles.sh.tar cleanfiles.sh
# tar -xvf cleanfiles.sh.tar cleanfiles.sh (Untar Single file from tar File)
OR
# tar --extract --file=cleanfiles.sh.tar cleanfiles.sh
===================================================================================
===============
sar followed by an option (without specifying a saXX data file). This will look for
the current day�s saXX data file and report the performance data that was recorded
until that point for the current day.
sar followed by an option, and additionally specifying a saXX data file using -f
option. This will report the performance data for that particular day. i.e XX is
the day of the month.
sysstat.
3. where are old files will be stores and how many old files can be saved.
under /var/log/sa and max 28 files will be saved after that old file will be
rotated.
4. whar are the options to get cpu, mem, load, network, IOs....
sar -u Displays CPU usage for the current day that was collected until that point.
CPU Usage of Individual CPU or Core (sar -P)
Memory Free and Used (sar -r)
Swap Space Used (sar -S)
Overall I/O Activities (sar -b)
Individual Block Device I/O Activities (sar -d)
Reports run queue and load average (sar -q)
Report network statistics (sar -n)
Report Sar Data Using Start Time (sar -s)
Example:
Using �-s hh:mi:ss� option, you can specify the start time. For example, if you
specify �sar -s 10:00:00�,
===================================================================================
================
Networking:
ifconfig -a or ip a command.
ethtool NIC
5. If NIC card card is down and unable to up, what you will do?
First ask DC team to reseat/replace the NIC cable, if still issue persists,raise a
case with HP to order the part and ask DC team to replace it.
It is the montoting value in milliscconds. If kernel did not get keep alive
acknowledgement in that time, it treats that NIC is down and immediately it will
bring other one up.
And but in RHEL 7 above process didnt work even service/server restart also)
# cp /etc/localtime /etc/.localtime-PRE-VMAC-1308042
# rm -f /etc/localtime && cp /usr/share/zoneinfo/UTC /etc/localtime
# chmod 0644 /etc/localtime
# cp /etc/sysconfig/clock /etc/sysconfig/clock-PRE-VMAC-1308042
# echo "ZONE=\"UTC"\" > /etc/sysconfig/clock
# hwclock --systohc
# hwclock --show
# date
In RHEL7: VA1BS5DCRYSDB01
date or timedatectl
timedatectl list-timezones
timedatectl set-timezone timezonename
timedatectl
hwclock --systohc
reboot the server
15. timezone is showing different for root and normal users. Why?
Just check the file /etc/localtime permissions. It should be 644 not 640 and 600.
https://access.redhat.com/solutions/2428001
Example output:
1. e2label or tune2fs
The commands e2label or tune2fs used for changing label of ext2, ext3 and ext4 type
partitions.
==================
suid sgid:
1. What is SUID and how to apply?
SUID will be applied on files.If you apply SUID all users can able to excute that
file as a owner of that file
3. What is SGID and how to apply and how to understand SGID is applied?
SGID will be applied on a directory. If you apply SGID on a directory, all the
files and sub directories created under that , inherits the group ownership from
the parent directory (where u applied SGID)
===================================================================================
=================
LUN scannng:(Rescan the HBAs)
The three values stand for channel, SCSI target ID, and LUN. The dashes act as
wildcards meaning "rescan everything"
===================================================================================
=================
diff between Linux 4,5 and 6
===================================================================================
=================
diif between ext2 3 and 4
===================================================================================
=================
HW models in HP:
DL360 G6
DL360 G7
DL360P G8
DL360 Gen9
DL380 G6
DL380 G7
DL380P G8
DL380 Gen9
DL385P G5
DL385 G6
DL385 G7
DL385P G8
DL560 G8
DL560 Gen9
DL580 G7
DL580 G8
DL580 Gen9
DL585 G5
DL585 G6
DL585 G7
DL980 G7
DL 360
DL 560
DL 380
===================================================================================
=================
YUM:
fsck:
The fsck can be run in two ways. Automatically and manually. The automatic run is
happening at the time of booting. A system administrator can run the utility
manually. The operations by this command will work on the data structures stored on
the disk directly. This data is internal and specific to the particular file system
in use. There are various fsck. The exact behavior of various implementation can
vary, but there is a common order of internal operations and a command line
interface.
The ext2, ext3, and ext4 file systems use the e2fsck utility to perform file system
checks and repairs. The file names fsck.ext2, fsck.ext3, and fsck.ext4 are
hardlinks to the e2fsck utility. These binaries are run automatically at boot time
and their behavior differs based on the file system being checked and the state of
the file system.
After running fsck, it will return an exit code. These cods can be seen in fsck�s
manual
0 - No errors
1 - File system errors corrected
2 - System should be rebooted
4 - File system errors left uncorrected
8 - Operational error
16 - Usage or syntax error
32 - Fsck canceled by user request
128 - Shared library error
5) You need to run a fack on /data01 filesystem? how you will proceed.
1. first unmount the filesystem (by taking approval, checking fuser and lsof )
2. run fsck
3 mount it back.
6) And how to run fsck on OS related filesystems?
Take the server into single user mode and run fsck.
fsck without journaling will check entire file system. SO, it will take huge time.
But the file system having journaling feature will take less time for fsck because
it will check only journal log and updates are copied back from the journal to the
filesystem.
## A thread writes data to the f/s and each transaction is flagged. After a crash,
updates are copied back from the journal to the filesystem and any incomplete
transactions are gone. In case of a failure, a journaled file system will ensure
that all inconsistencies are restored back to its prior state.###
With mount command, cat /proc/mounts , and also by writing something on that file
system , you will get the error.
================================================================================
housekeeping:
once we find the most consuming folder/file, based the type of the FS, we perform
the housekeeping.
>> If it is NAS Filesystem, we have to find out the files consuming space and let
customer know if any housekeeping required OR to increase the NAS volume from
storage team side.
>> If it is Customer related filesystem and local, find out the files consuming
space and owner of those files and let customer know and suggest how to proceed
further with housekeeping.
>> If it is OS related filesystem, we have to find out the files consuming space,
and to performed housekeeping based on the filesystem type.
B) if it is /boot:
Verify how many old kernels are there.
just keep only one old kernel ( total 2 , 1 is latest and other one is old)
and remove remaining duly taking approval from the customer.
- using du command or find command get the file which is consuming more space.
- Check the owner of the file and inform him to perform housekeeping.
- If root is owning, try to understand the file and zip it, if it is not live.
- If it is owned by other users, try to understand the file and zip it, if it is
not live.If it is live file, better not to touch and to notify
to the user.
(motto is find out the folder where huge number of smallest files are there. and
check the time stamp of the files)
===================================================================================
==
ping failed:
whenever we get any alert stating that server not reachable/not pinging,
## If server is pinging .
-Check whether monitoring agent is running or not if it is not running start it.
OR
-Check the performance of the server, like load and work accordingly.
------
- Check the Server information from ILO (like server status and HW related issues.
If HW issues, follow the process to replace the failed parts)
- Start the console session and check the status.
a) if server is hung, take the approval and reboot it.
b) if server able to login through console, check the sshd is running or not. if
not running start it.
c) If ssh is already running, check the NIC cards status and whether gateway is
pinging or not, If any issues with NIC cards try to replace with the help of
Vendors. If issue with gateway, contact to network team.
======================
Firmware: (Bios/SPP)
https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-c00719376#N10011
Firmware is a software program that is stored in Read-Only Memory (ROM) chip on the
system board or on an add-on controller. Firmware is responsible for the behavior
of the system when it is first switched on and for passing control of the server to
the operating system. (BIOS stage in booting process)
===================================================================================
===========
log rotation:
full_path_of_the_log file{
compress
copytruncate
daily
dateext
notifempty
missingok
}
EOF
Validation:
NFS:
1) What is nfs?
Nfs utils
nfs daemons:
rpc.nfsd:
rpc.lockd:
rpc.statd:
Server side:
Client Side:
a. Verify whether that nfs share is exported to this client by using showmount -
e IP_nfs_server
b. Then update fstab file with nfs share
c. Run mount -a or mount with nfs command with -t option.
d. Verify the mount in df -h command.
===================================================================================
====
samba:
===================================================================================
====
SCP & ftp and winscp
Secure Copy Protocol and File Transfer Protocol both offer simple command line
methods for transferring files between computers, but that's pretty much where the
similarities end.
scp is secure & encrypted while ftp is plain text...
SCP is better designed for a one-time transfer between two computers on the same
network, though it can be used remotely over the Internet as well. Conversely, FTP
is used to not only transfer data to a remote server, but also to manage that data.
Its main function is secure file transfer between a local and a remote computer.
=======================================================================
lost+found
The fsck command puts files and directories that are allocated but
unreferenced in the lost+found directory located in that file system. The
inode number of each file is assigned as the file name. If the lost+found
directory does not exist, the fsck command creates it. If not enough space
exists in the lost+found directory, the fsck command increases the
directory�s size.
========================================================================
Booting Process:
tcpdump:
Tcpdump is a command line utility that allows you to capture and analyze network
traffic going through your system. It is often used to help troubleshoot network
issues, as well as a security tool.
A powerful and versatile tool that includes many options and filters, tcpdump can
be used in a variety of cases. Since it's a command line tool, it is ideal to run
in remote servers or devices for which a GUI is not available, to collect data that
can be analyzed later. It can also be launched in the background or as a scheduled
job using tools like cron.
To get the network packets from a single interface, use
$ tcpdump -i eth0
To write all the captured packets to a file, use the �-w� option,
To read an already created, old tcpdump file, use the following command,
$ tcpdump -r packets_file
This command saves the output in a file named webserver.pcap. The .pcap extension
stands for "packet capture" and is the convention for this file format.
Tcpdump creates a file in binary format so you cannot simply open it with a text
editor. To read the contents of the file, execute tcpdump with the -r option:
===================================================================================
===========
traceroute, ping
Traceroute is a command which can show you the path a packet of information takes
from your computer to one you specify(destination). It will list all the routers it
passes through until it reaches its destination, or fails to and is discarded (* *
* ). In addition to this, it will tell you how long each 'hop' from router to
router takes.
It show max 30 routes.It does not mean only 30 routes between source and
destination server.it will show you main routes it will ignore few intermediate
routers.
1 1 ms 1 ms 1 ms 192.168.0.1
2 12 ms 8 ms 8 ms 100.92.16.1
3 23 ms 12 ms 11 ms 113.193.5.37
4 * * * Request timed out.
5 10 ms 9 ms 9 ms 113.193.233.173
6 9 ms 9 ms 9 ms 14.141.145.137.static-Bangalore.vsnl.net.in
[14.141.145.137]
7 18 ms 29 ms 24 ms 172.31.167.54
8 29 ms 14 ms 14 ms 14.140.100.6.static-vsnl.net.in [14.140.100.6]
9 15 ms 14 ms 28 ms 115.112.71.65.STDILL-Chennai.vsnl.net.in
[115.112.71.65]
10 21 ms 16 ms 13 ms 121.240.1.50
11 20 ms 18 ms 18 ms 74.125.242.129
12 14 ms 17 ms 14 ms 216.239.54.197
13 15 ms 13 ms 19 ms maa05s10-in-f14.1e100.net [216.58.200.142]
Trace complete.
*** because of either firewall settings not allowed to pass through or route IP
not responded on requested time.
The main difference between Ping and Traceroute is that Ping is a quick and easy
utility to tell if the specified server is reachable and how long will it take to
send and receive data from the server whereas Traceroute finds the exact route
taken to reach the server and time taken by each step (hop).
===================================================================================
==
sysctl command/Kernal parameters in RHEL 4,5,6,7
We can change the default kernel parameters by editing /etc/sysyctl.conf file and
by modifieng with sysctl -w command.
After changing paraameters , use sysctl -p command to make persistant after reboot.
kernel.shmall = 4294967296
kernel.shmmax = 68719476736
kernel.msgmni = 1024
kernel.shmmni = 4096
kernel.sem = 500 256000 250 1024
net.ipv4.tcp_keepalive_time = 300
vm.swappiness = 0
vm.nr_hugepages = 8500
===================================================================================
=
ulimit value:
1. User is not able to execute any commands.
2. How to change the ulimit values.
3. Tell me few ulimit values you know.
Sample outputs:
===================================================================================
==============
performance tuning:
When we see any issue in server performance (Application team facing any issue)
===================================================================================
==============
HW issues:
When we see any HW issues like, Battery , MB failure, PSU issues,HBA issues & NIC
issues etc.,
>> Validate from your side using hpasmcli // systool // dmidecode commands.
>> Also check from ILO about system information and make sure tere was a HW issue.
>> Then raise case with Vendor and upload the AHS logs report.
1) After ordering part from HP, For hot pluggable (Online) activities, we will
reach out to DC
(if it is CRU) to replace the part by raising the Change request.
2) Incase , if HP support requires,We will schedule the activity and provide
access to HP
engineer in DC at that time.
3) In case any down time required, first take the customer approval then plan
for the
replacement schedule.
4) For Vendor activities (HP & DELL ) , we need to send the Vendor Engg details
to DC to
get the Visitor pass to enter into DC.
===================================================================================
==============
Scheduled Reboot:
1. It will check whether server is coming back to online without any issues (HW)
2. clears the cache and buffers.
3. clears the /tmp
4.The reboot is needed so that the changes that the user have done can be affected
on the server. For example, if the user is re-compiling the server�s kernel that is
going through some more advanced server administration, then he needs to restart
the machine in order to complete the compilation and to have a new updated kernel
version on the server.
--------
Reboot your system after 02:00 A.M :
If you want your system to discard the previously scheduled restart or shutdown you
can simply call another shutdown command with the �c option and broadcast with it a
message for the users about the cancellation of the restart.
Cancel your scheduled Reboot: The previously scheduled reboot can be canceled by
the system administrator by simply issuing another shutdown command with the �c
option and an optional message argument.
===================================================================================
==================
rsync (page174):
First time when you use rsync, it will copy all the files to destination.
===================================================================================
=================
Deletion of mount point & reclaim the storage:
1. unmount the lv
2. remove or commnet out entry in fstab file
3. Deactivite LV (vgchange -an vg_data02) (to activate vgchange -ay vg_data02 )
4. remove lv,vg,pv
5. If the disk is under multipath , flush the device and delete the paths.
5. ask storage team to reclaim the LUN.
For VMs,
1. Unmount the lv
2. remove or commnet out entry in fstab file
3. Deactivite LV (vgchange -an vg_data02) (to activate vgchange -ay vg_data02 )
4. remove lv,vg,pv
5. From VC level , on VM , right click and go to settings, and remove the mentioned
disk.
6. Finally recan the hbas
===================================================================================
===================
difference between in reboot commands:
We can reboot servers in multiple ways. Example by init 6 , shutdown -r and reboot.
init 6 , shutdown -r are graceful shutdown and boot.
reboot is for forceful shutdown and boot.
===================================================================================
===================
Some times customer will ask to just shutdown the servers(soft decommissions)
===================================================================================
=====================
inittab file fields:
The /etc/inittab file is the configuration file used by the System V (SysV)
initialization system in Linux. This file defines three items for the init process:
Since this "initdefault" line contains "3" as the second field, run state 3 is the
default.
Another important line on Linux systems is the sysinit line shown below. This tells
the system to run the /etc/rc.d/rc.sysinit script when the system is booted.
===================================================================================
=========================
lsblk command:
===================================================================================
=========================
kdump:
Kdump is an utility used to capture the system core dump in the event of system
crashes.
These captured core dumps can be used later to analyze the exact cause of the
system failure and implement the necessary fix to prevent the crashes in future.
This crash kernel is used the capture the core dump image whenever the system
crashes.
Memory reserved for the kdump kernel is always reserved during system boot, which
means that the amount of memory is specified in the system's boot loader
configuration. This section will explain how to change the amount of reserved
memory on AMD64 and Intel 64 systems and IBM Power Systems servers using the GRUB
boot loader, and on IBM System z using zipl. To configure the amount of memory to
be reserved for the kdump kernel, edit the /boot/grub/grub.conf file and add
crashkernel=<size>M or crashkernel=auto to the list of kernel options as shown in
Example 32.1, �A sample /boot/grub/grub.conf file�. Note that the crashkernel=auto
option only reserves the memory if the physical memory of the system is equal to or
greater than:
The server will reboot itself and the crash dump will be generated.
===================================================================================
========================
initrd image:
The initial RAM disk (initrd) is an initial root file system that is mounted prior
to when the real root file system is available. The initrd is bound to the kernel
and loaded as part of the kernel boot procedure. The kernel then mounts this initrd
as part of the two-stage boot process to load the modules to make the real file
systems available and get at the real root file system.
===================================================================================
==========================
ports:
ssh
telnet
dns
ftp
nfs
samba
===================================================================================
==========================
rpc: Remote proceedural call. ( the calls sending from clients to servers)
rpcbind service replaces portmap, which was used in previous versions of Red Hat
Enterprise Linux to map RPC program numbers to IP address port number combinations.
When a client wishes to make an RPC call to a given program number, it first
contacts rpcbind on the server machine to determine the address where RPC requests
should be sent.
===================================================================================
=================================
chattr command:
chattr (Change Attribute) is a command line Linux utility that is used to set/unset
certain attributes to a file in Linux system to secure accidental deletion or
modification of important files and folders, even though you are logged in as a
root user.
In Linux native filesystems i.e. ext2, ext3, ext4, btrfs, etc. supports all the
flags, though all the flags won�t support to all non-native FS. One cannot delete
or modify file/folder once attributes are sets with chattr command, even though one
have full permissions on it.
If a file is accessed with �A� attribute set, its atime record is not updated.
If a file is modified with �S� attribute set, the changes are updates synchronously
on the disk.
A file is set with �a� attribute, can only be open in append mode for writing.
A file is set with �i� attribute, cannot be modified (immutable). Means no
renaming, no symbolic link creation, no execution, no writable, only superuser can
unset the attribute.
A file with the �j� attribute is set, all of its information updated to the ext3
journal before being updated to the file itself.
A file is set with �t� attribute, no tail-merging.
A file with the attribute �d�, will no more candidate for backup when the dump
process is run.
When a file has �u� attribute is deleted, its data are saved. This enables the user
to ask for its undeletion.
Operator
+ : Adds the attribute to the existing attribute of the files.
� : Removes the attribute to the existing attribute of the files.
= : Keep the existing attributes that the files have.
===================================================================================
=============================
RHN channel subscription from channel
rhn-channel -a -c rhel-x86_64-server-extras-7
rhn-channel -r -c rhel-x86_64-server-extras-7
"RHEL EUS Server High Availability (v. 7.6 for 64-bit x86_64) *"
" RHEL EUS Server SAP (v. 7.6 for 64-bit x86_64) via REPOSYNC *"
" RHEL EUS Server SAP HANA (v. 7.6 for 64-bit x86_64) via REPOSYNC *"
rhel-x86_64-server-7.6.eus
rhel-x86_64-server-ha-7.6.eus
rhel-x86_64-server-sap-7.4.eus-reposync
rhel-x86_64-server-sap-hana-7.6.eus-reposync
===================================================================================
================================
NFS mount can be done in either as a �soft mount� or as a �hard mount�. These mount
options define how the NFS client should handle NFS server crash/failure. In this
article, we will see the difference between soft and hard mounts.
1) Soft Mount
Suppose you have mounted a NFS filesystem using �soft mount�. When a program or
application requests a file from the NFS filesystem, NFS client daemons will try to
retrieve the data from the NFS server. But, if it doesn�t get any response from the
NFS server (due to any crash or failure of NFS server), the NFS client will report
an error to the process on the client machine requesting the file access. The
advantage of this mechanism is �fast responsiveness� as it doesn�t wait for the NFS
server to respond. But the main disadvantage of this method is data corruption or
loss of data. So this is not a recommended option to use.
2) Hard Mount
If you have mounted the NFS filesystem using hard mount, it will repeatedly retry
to contact the server. Once the server is back online, the program will continue to
execute undisturbed from the state where it was during server crash. We can use the
mount option �intr� which allows NFS requests to be interrupted if the server goes
down or cannot be reached. Hence the recommended settings are hard and intr
options.
===================================================================================
=============================
/proc fs
===================================================================================
================================
===================================================================================
===============================
fastboot
===================================================================================
====
su - & su
>> su username >> user sits into previous user home directory.
>> If normal user switches to other user, he has to give his passoword.
>> Root user can switch to other without providing any password.
===================================================================================
=============
server naming:
We can understand whether server is physical or virual by its name , or from tool,
or from dmidecode command.
===================================================================================
===========
Booting isssues:
https://www.youtube.com/watch?v=AI58iBCd6C8&t=324s
MBR corrupted
Grub.conf file corrupted
/etc/inittab file issue.
NFS mount issues
FSCK issues.
===================================
Network protocals:
There are many protocols while establishing a connection in the internet. According
to the type of connection need to be established, the protocols used varies. The
protocols define the characteristics of the connection.
https://www.interserver.net/tips/kb/common-network-protocols-ports/
==================================
=================
3) suppose inittab got corrupted.
If server is not booting due to inittab file missing,server will not know to which
runlevel it should go.
it will show clearly that inittab file is missing and it will ask runlevel to boot.
So, we need to boot the server into rescue mode and try to install the inittab rpm
by mounting the CD on /mnt.
=========================================================
LDAP command to check user is existing.
===================================================================================
Kernal patching:
Example:
# Kernel version - 2.6.18...
a. 2.6 = major version
b. .18 = minor version
c. anything else after the minor version indicates that the kernel was patched by
the distributor
===================================================================================
Filesystem cleaning /lsof
Senarios:
1. File system is consuming space but du -sh command is not reflecting the
consumption . why?
2. I have deleted a file of 5GB size.But space not released after deletion. What
could be the reason?
Ans:
1. varify with lsof for any deleted files. Kill that PID.
2. Still issue persists : unmount and mount it
3. Still issue persists : reboot the server with approval.
===================================================================================
=
In Linux, the init 6 and shutdowns are command gracefully reboots the system
running all the K* shutdown scripts first, before rebooting. The reboot command
does a very quick reboot. It doesn�t execute any kill scripts, but just unmounts
filesystems and restarts the system. The reboot command is more forceful.
===================================================================================
journaling:
A journaled file system is much easier to recover then a standard one, because you
do not need to use fsck anymore for recovery. Data integrity occurs because updates
to files are written to logs before the actual data blocks are updated. A thread
writes data to the f/s and each transaction is flagged. After a crash, updates are
copied back from the journal to the filesystem and any incomplete transactions are
gone. In case of a failure, a journaled file system will ensure that all
inconsistencies are restored back to its prior state.
=============================================================================
FOR RHEL6:
Via console select the grub and edit grub's boot option. Press "e" to edit the
first grub menu option and navigate to kernel line.
Press "e" key again to edit and remove:
quiet splash
ADD:
init=/bin/bash (init=/bin/bash to the kernel parameters when we want it to boot to
a root shell instead of a normal boot to init level 3 or 4.)
Press "Enter"
Note: You may have some different boot options but the main part you need to
change/add is init=/bin/bash.
we have edited grub boot menu, and we are ready to boot. Press "b" key to boot.
Remount the / FS.
# mount -o remount,rw /
# passwd (Enter the password same as on password.savvis.net)
FOR RHEL 7:
1) Boot your system and wait until the GRUB2 menu appears.
2) In the boot loader menu, highlight any entry and press e.
3) Find the line beginning with linux. At the end of this line, append the
following:
add rd.break
4) Press F10 or Ctrl+X to boot the system using the options you just edited.
when the system boots, run the following command to remount the root filesystem in
read-write mode:
# mount -o remount,rw /sysroot
# chroot /sysroot
# passwd (Enter the password same as on password.savvis.net)
# touch /.autorelabel
In RHEL, after we
do an rd.break, and all the procedure, and
do a touch /.autorelabel,
what does the /.autorelabel do?
The rd.break parameter interrupts the boot process before the control is passed
over to the kernel. At this point, when you run the passwd command to do the
password reset, the associated shadow file (/etc/shadow) is modified with an
incorrect SELinux context. The touch /.autorelabel command creates a hidden file
named .autorelabel under the root directory. On the next boot, the SELinux
subsystem will detect this file, and then relabel all of the files on that system
with the correct SELinux contexts. On large disks, this process can take a good
amount of time.
5) type exit to leave the chroot environment.
6) type exit to log out, note this will also reboot the system.
===================================================================================
======
shell:
What is shell:
Shell is an environment in which we can run our commands, programs, and shell
scripts. There are different flavors of a shell, just as there are different
flavors of operating systems. Each flavor of shell has its own set of recognized
commands and functions.
Shell Prompt
The prompt, $, which is called the command prompt, is issued by the shell. While
the prompt is displayed, you can type a command.
Shell reads your input after you press Enter. It determines the command you want
executed by looking at the first word of your input. A word is an unbroken set of
characters. Spaces and tabs separate words.
===================================================================================
=======
sosreport:
https://access.redhat.com/solutions/3592
Vendor(Redhat) will analyze this report and find the root cause of this OS related
issues.
===================================================================================
=======
System call:
===================================================================================
====
To clear the cache:
if any process is eating away your memory and you want to clear it, Linux provides
a way to flush or clear ram cache.
Every Linux System has three options to clear cache without interrupting any
processes or services.
sync will flush the file system buffer. Command Separated by �;� run sequentially.
The shell wait for each command to terminate before executing the next command in
the sequence. As mentioned in kernel documentation, writing to drop_cache will
clean cache without killing any application/service, command echo is doing the job
of writing to file.
If you have to clear the disk cache, the first command is safest in enterprise and
production as �...echo 1 > �.� will clear the PageCache only. It is not recommended
to use third option above �...echo 3 >� in production until you know what you are
doing, as it will clear PageCache, dentries and inodes.
Is it a good idea to free Buffer and Cache in Linux that might be used by Linux
Kernel?
When you are applying various settings and want to check, if it is actually
implemented specially on I/O-extensive benchmark, then you may need to clear buffer
cache. You can drop cache as explained above without rebooting the System i.e., no
downtime required.
Linux is designed in such a way that it looks into disk cache before looking onto
the disk. If it finds the resource in the cache, then the request doesn�t reach the
disk. If we clean the cache, the disk cache will be less useful as the OS will look
for the resource on the disk.
Moreover it will also slow the system for a few seconds while the cache is cleaned
and every resource required by OS is loaded again in the disk-cache.
Now we will be creating a shell script to auto clear RAM cache daily at 2am via a
cron scheduler task. Create a shell script clearcache.sh and add the following
lines.
==========================
=============================
lsof
=================================
https://access.redhat.com/articles/2130961#:~:text=Red%20Hat%20Errata%20help
%20users,analysis%20by%20Red%20Hat%20engineering.&text=Errata%20are%20published
%20for%20low,which%20are%20delivered%20as%20packages.
This article explains what Red Hat Errata are, why Red Hat produces them, how users
can consume them, the difference between major types (RHSA, RHBA, and RHEA), and
the numbering and naming of advisories.
Red Hat Security Advisory (RHSA) : RHSAs contain one or more security fixes and
might also contain bug or enhancements fixes. RHSAs are generally considered the
most important type of errata for many organizations. RHSAs are ranked using a
severity rating of Low, Moderate, Important, or Critical based on the severity of
the vulnerability.
Red Hat Bug Advisory (RHBA): RHBAs always contain one or more bug fixes and might
contain enhancements, but do not contain security fixes. Because RHBAs are released
for bug fixes, they are often considered more important than an RHEA in priority.
Red Hat Enhancement Advisory (RHEA): RHEAs contain one or more enhancements or new
features and do not contain bug fixes or security fixes. Essentially, a RHEA is
released when new features are added and an updated package is shipped.
VMware Inc. is a software company that develops many suites of software products
specially for providing various virtualization solutions. There are many cloud
products, datacenter products, desktop products and so on.
What is datastore?
Datastore is a storage location where virtual machine files are stored and
accessed. Datastore is based on a file system which is called VMFS, NFS.
What is a Template?
Whan a VM is converted into a format which can be used to create a VM with pre-
defined settings is called a template. An installed VM can be converted into a
template but it cannot be powered-on.
What is Snapshot?
To create a copy of a VM with the time stamp as a restore point is called a
snapshot. Snapshots are taken when an upgrade or software installation is required.
For better performance, a snapshot should be removed after particular task is
performed.
a. If the VM is not already shut down, go to the Summary tab of the VM and click
"Shut Down Guest".
b. Go to the Summary tab of the VM and click "Edit Settings".
c. Go to the Hardware tab and select "CPUs".
d. Adjust the number of virtual processors from 8 to 14
e. Click OK.
f. Verify the new vCPU's if displaying in vSphere.
7. Increase Memory.
a. If the VM does NOT have hot-add RAM enabled, click "Shut Down Guest". (If the VM
does have hot-add RAM enabled, you do not need to shut down the guest.)
b. Go to the Summary tab of the VM and click "Edit Settings".
c. Go to the Hardware tab and select "Memory".
d. Adjust the memory size from 48GB to 95GB. (Currently S610497DC4CL03_S610497-
002.NTAP_VALUE_170 has 1.28TB GB free space. Before increment re-verify the status)
e. Go to the Resources tab and select Memory
f. Verify the "Unlimited" checkbox is checked
g. Click OK.
h. Verify the new RAM is now displaying in vSphere.
a.) Select each host from the server list and rescan all for storage.
select the host --> click configuration --> storage --> select
s616038at1cl08_s616038-001.3par_qos0_35 and click on rescan all.
The snapshot feature is most useful when you want to preserve the state of the
virtual machine so you can return to the same state repeatedly.
https://www.vmware.com/support/ws4/doc/preserve_snapshot_ws.html#:~:text=You%20can
%20take%20a%20snapshot,on%2C%20powered%20off%20or%20suspended.
Remove the snapshot - When you remove the snapshot, the changes accumulated in the
redo-log files are written permanently to the base disks., either the virtual disk
files or the physical disks, depending on your virtual machine's hard disk
configuration. This is similar to committing changes to a disk in VMware
Workstation 3.
Revert to the snapshot - When you revert to the snapshot, the contents of the redo-
log files are discarded. Any additional changes are, once again, accumulated in the
redo-log files. This is similar to discarding changes to a disk in VMware
Workstation 3.
Take a snapshot - If you take a snapshot when the virtual machine already has a
snapshot, changes stored in the redo-log files are written permanently to the base
disk. Then any subsequent changes are, once again, accumulated in the redo-log
files.
Right click on s214610rgvl030 --> Snapshot --> Take snapshot --> Enter name and
details as "CRQ000000090988-15-Feb-2018" and untick all square boxes --> ok
5. VM Migration:
--------------
==========================