Explore information related to network

Guest unable to reach host using macvtap interface - Fix it Now

This article covers how to fix the issue with guests unable to reach the host using macvtap interface.

This issue happens when A guest virtual machine can communicate with other guests, but cannot connect to the host machine after being configured to use a macvtap (also known as type='direct') network interface.


To resolve this error (guests unable to reach the host using macvtap interface), simply create an isolated network with libvirt:

1. Add and save the following XML in the /tmp/isolated.xml file. If the 192.168.254.0/24 network is already in use elsewhere on your network, you can choose a different network.

<network>

  <name>isolated</name>

  <ip address='192.168.254.1' netmask='255.255.255.0'>

    <dhcp>

      <range start='192.168.254.2' end='192.168.254.254' />

    </dhcp>

  </ip>

</network>

2. Create the network with this command: virsh net-define /tmp/isolated.xml

3. Set the network to autostart with the virsh net-autostart isolated command.

4. Start the network with the virsh net-start isolated command.

5. Using virsh edit name_of_guest, edit the configuration of each guest that uses macvtap for its network connection and add a new <interface> in the <devices> section similar to the following (note the <model type='virtio'/> line is optional to include):

<interface type='network'>

  <source network='isolated'/>

  <model type='virtio'/>

</interface>

6. Shut down, then restart each of these guests.

Since this new network is isolated to only the host and guests, all other communication from the guests will use the macvtap interface.

Read More


AWS Instance loses network connectivity - Fix this issue now

This article covers method to fix AWS Instance loses network connectivity error.

Basically, AWS Instance loses network connectivity if the instance has the wrong time set.


To fix Amazon EC2 Windows instance network connectivity issue:

You can create a temporary elastic network interface, and attach the network interface to the Amazon EC2 Windows instance. Then, you can  temporarily connect to the instance and fix the issue.

1. Open the Amazon EC2 console, and then choose Instances from the navigation pane.

2. Select your instance. From the Description tab, note the Subnet ID.

3. Create a new network interface in the same subnet as the instance.

Important: Be sure to select a security group that allows incoming Remote Desktop Protocol (RDP) traffic from your IP address.

4. Attach the new network interface to the instance.

Note: The network interface might take a few minutes to come online. If you connect to the instance using RDP, associate an Elastic IP address with the network interface.

5. Using the new network interface, connect to the instance using RDP.

6. Change the network connection settings in Windows to use DHCP. Or, specify the correct private IP address settings. For instructions, see Configuring a secondary private IPv4 address for your Windows instance.

7. Detach the temporary network interface.

Note: If you've associated an Elastic IP address with the network interface, and no longer need the Elastic IP address, release the Elastic IP address.

Read More


Boot a guest using PXE - Do it now

This article covers how to boot a guest using PXE. PXE booting is supported for Guest Operating Systems that are listed in the VMware Guest Operating System Compatibility list and whose operating system vendor supports PXE booting of the operating system.

The virtual machine must meet the following requirements:

1. Have a virtual disk without operating system software and with enough free disk space to store the intended system software.

2. Have a network adapter connected to the network where the PXE server resides.


A virtual machine is not complete until you install the guest operating system and VMware Tools. Installing a guest operating system in your virtual machine is essentially the same as installing it in a physical computer.


To use PXE with Virtual Machines:

You can start a virtual machine from a network device and remotely install a guest operating system using a Preboot Execution Environment (PXE). 

You do not need the operating system installation media. When you turn on the virtual machine, the virtual machine detects the PXE server.


To Install a Guest Operating System from Media:

You can install a guest operating system from a CD-ROM or from an ISO image. Installing from an ISO image is typically faster and more convenient than a CD-ROM installation. 


To Upload ISO Image Installation Media for a Guest Operating System:

You can upload an ISO image file to a datastore from your local computer. You can do this when a virtual machine, host, or cluster does not have access to a datastore or to a shared datastore that has the guest operating system installation media that you require.


How to Use a private libvirt network ?

1. Boot a guest virtual machine using libvirt with PXE booting enabled. You can use the virt-install command to create/install a new virtual machine using PXE:

virt-install --pxe --network network=default --prompt

2. Alternatively, ensure that the guest network is configured to use your private libvirt network, and that the XML guest configuration file has a <boot dev='network'/> element inside the <os> element, as shown in the following example:

<os>

   <type arch='x86_64' machine='pc-i440fx-rhel7.0.0'>hvm</type>

   <boot dev='network'/>

   <boot dev='hd'/>

</os>

3. Also ensure that the guest virtual machine is connected to the private network:

<interface type='network'>

   <mac address='52:54:00:66:79:14'/>

   <source network='default'/>

   <target dev='vnet0'/>

   <alias name='net0'/>

   <address type='pci' domain='0x0000' bus='0x00' slot='0x03' function='0x0'/>

</interface>

Read More


An error occurred while reconnecting - Fix this Windows error now

This article covers methods to resolve fix 'An error occurred while reconnecting' Windows error. 


Causes for 'The Local Device Name is already in Use' Error on Windows:

1. Drive mapping has gone wrong – The process of network drive mapping can sometimes produce problems like this one when it comes to drive letters.

2. Some drive letters are unassigned – Some drives may have incorrect or even missing drive letters which causes this error to appear.

3. File and Printer Sharing is disabled – If this option is disabled in any firewall you might be using, networking becomes difficult and full of errors.

4. No space on the server – Users have reported that they had to free up at least a couple of gigabytes on the root drive of the network’s server to get rid of the problem.


To fix 'The Local Device Name is already in Use' Error on Windows:

Remap the Drive Using Command Prompt

Remapping the network drive is the official solution recommended by Microsoft for users facing this problem. However, it has worked for many users and it has become one of the most used methods for this problem. 

Check out the steps to implement this;

1. Search for “Command Prompt” either right in the Start menu or by tapping the search button right next to it. Right-click on the first result which will appear at the top and select the “Run as administrator” option.

2. Users who are using an older version of Windows can use the Windows Logo Key + R key combination in order to bring up the Run dialog box. Type in “cmd” in the box and use the Ctrl + Shift + Enter key combination in order to run Command Prompt as an administrator.

3. Copy and paste the command shown below and make sure you click the Enter key on your keyboard.

net use * /delete

4. After you see that the operation is completed successfully, run the following command:

net use Z: \\server\share /user:username password

5. Make sure you replace the username and password placeholders with the correct username and password. Check to see if the problem is resolved!

Read More


Map Network Drives or Shared Folders with Group Policy - How to do it

This article covers how to map network drives or shared folders with Group Policy.

Mapping network drives using Group Policy preferences is flexible, provides easy control over who receives the drive mappings, and has easy-to-use user interfaces, all of which are in stark contrast with the complexities associated with scripts.


To Set up drive mappings with Group Policy preferences:

1. Group Policy preferences are a set of extensions that increase the functionality of Group Policy Objects (GPOs). 

2. Administrators can use them to deploy and manage applications on client computers with configurations targeted to specific users. 

3. The Drive Maps policy in Group Policy preferences allows an administrator to manage drive letter mappings to network shares.


To Deploy item-level targeting with Group Policy preferences:

Item-level targeting (ILT) is a feature of Group Policy preferences that allows preference settings to be applied to individual users and/or computers dynamically. ILT allows an administrator to specify a list of conditions that must be met in order for a preference setting to be applied or removed to a user or computer object.

You can configure drive mapping, only users in the Product Managers group would receive the mapping. 

1. Under the Common tab of the mapped drive properties, check the Item-level targeting option, and then click Targeting….

2. In the Targeting Editor window, click New Item and select Security Group.

3. Click the … button, and type in the name of the security group.

4. Click OK to close the Targeting Editor once you're finished adding items to the list. 

Read More


Create CentOS Fedora RHEL VM Template on KVM - How to do it

This article covers how to create CentOS/Fedora/RHEL VM Templates on KVM. VM Templates are more useful when deploying high numbers of similar VMs that require consistency across deployments. If something goes wrong in an instance created from the Template, you can clone a fresh VM from the template with minimal effort.


To install KVM in your Linux system:

The KVM service (libvirtd) should be running and enabled to start at boot.

$ sudo systemctl start libvirtd

$ sudo systemctl enable libvirtd

Enable vhost-net kernel module on Ubuntu/Debian.

$ sudo modprobe vhost_net

# echo vhost_net | sudo tee -a /etc/modules


How to Prepare CentOS / Fedora / RHEL VM template ?

1. Update system

After you finish VM installation, login to the instance and update all system packages to the latest versions.

$ sudo yum -y update

2. Install standard basic packages missing:

$ sudo yum install -y epel-release vim bash-completion wget curl telnet net-tools unzip lvm2 

3. Install acpid and cloud-init packages.

$ sudo yum -y install acpid cloud-init cloud-utils-growpart

$ sudo sudo systemctl enable --now acpid

4. Disable the zeroconf route

$ echo "NOZEROCONF=yes" | sudo tee -a /etc/sysconfig/network

5. Configure GRUB_CMDLINE_LINUX – For Openstack usage.

If you plan on exporting template to Openstack Glance image service, edit the /etc/default/grub file and configure the GRUB_CMDLINE_LINUX option. Your line should look like below – remove rhgb quiet and add console=tty0 console=ttyS0,115200n8.

GRUB_CMDLINE_LINUX="crashkernel=auto rd.lvm.lv=cl/root rd.lvm.lv=cl/swap console=tty0 console=ttyS0,115200n8"

Generate grub configuration.

$ sudo grub2-mkconfig -o /boot/grub2/grub.cfg

6. Install other packages you need on your baseline template.

7. When done, power off the virtual machine.


How to Clean VM template ?

You need virt-sysprep tool for cleaning the instance.

$ sudo virt-sysprep -d centos7

Read More


Best Server Monitoring Software Products - Advantages and Disadvantages

This article covers the Best Server Monitoring Software. Basically, Server management software takes the burden of managing servers and other critical applications.

Reporting and monitoring is critical in business, especially when it comes to IT infrastructure such as network connectivity and server monitoring.

Being able to look back at historical trends and faults is especially useful when troubleshooting an issue on a critical server or service, so if you don’t already have a solution in place, then it might be time to seriously consider it.


Server Monitoring Software is able to check everything about your system, such as:

1. CPU usage

2. RAM utilization

3. Hard Disk Space

4. System Temperatures

5. Server Alerts (Hardware status warnings)

6. RAID Array health checks

7. Virtual Machine Alerts

8. You can also monitor user logins, suspicious activity on your server, and the status of your services and daemons


Best server monitoring software and tools includes:

1. SolarWinds Server & Application Monitor - Tracks the statuses of key server components and also watches the performance of applications running on each server. The tool runs on Windows Server but can also monitor Linux servers across a network.

2. Atera - A remote monitoring and management system that includes server monitoring features. Ideal for managed service providers.

3. Site24x7 Server Monitoring - A cloud-based monitoring system that can track the statuses of Windows and Linux servers as part of a company’s infrastructure.

4. ManageEngine Applications Manager - A server and applications monitoring system that includes extra capabilities such as VM monitoring. Runs on Windows Server and Linux.

5. Paessler PRTG - A package of monitors that includes a range of server status trackers. Installs on Windows Server.

6. Nagios XI - A comprehensive infrastructure monitoring system that includes live server monitoring services. Installs on Linux.

7. Opsview - A system monitoring tool that includes sever monitoring and is billed as an alternative to Nagios XI. Runs on Linux.

8. Zenoss - A system monitoring tool that includes a server monitoring module and is also available in a free version. Installs on Linux.

9. OP5 - Monitor Server monitoring as part of a system-wide monitor tool that accepts Nagios plug-ins. Install on Linux.

10. AppOptics - A cloud-based server and applications monitoring system that will track the performance of Windows and Linux servers.

11. Monitis - A cloud-based monitoring system that specializes in tracking the performance of Web servers and Web applications.

12. ManageEngine Free Windows Admin Tools - A collection of 15 free tools that cover different aspects of server monitoring including disk space, software inventory, and user lists.


What is server maintenance?

Server maintenance is process of keeping a server software updated and running so that a computer network can operate smoothly and avoid downtime or loss of data. Regular maintenance will keep the server running as expected and will help avoid a total or partial network failure.

Read More


Advantages of SAN over NAS

This article covers more insight about the advantages of SAN over NAS.

A storage area network (#SAN) is a dedicated, independent high-speed network that interconnects and delivers shared pools of storage devices to multiple servers. Each server can access shared storage as if it were a drive directly attached to the server.

Network Attached Storage (#NAS) is a device that allows users to access files through a network. It allows users to access and share files from their individual stations through a central server. NFS (Network File System) is a protocol that is used to serve and share files on a network.


Some advantages of a SAN:

1. Reduces LAN bandwidth problems. A key benefit of SANs is bandwidth improvement. 2. Improved data security. Data security is paramount for every business.

3. Responsive backup.

4. Increased scalability.

5. Reliable disaster recovery.


What is the purpose of a SAN?

SANs are primarily used to access data storage devices, such as disk arrays and tape libraries from servers so that the devices appear to the operating system as direct-attached storage. 

A SAN typically is a dedicated network of storage devices not accessible through the local area network (LAN).

Read More


MongoDB error topology was destroyed - Fix it now

This article covers method to fix the error 'MongoDB error topology was destroyed' which happens due to many reasons that include interruption of the node server’s connection to the MongoDB instance while it was trying to write to it. If the mongo driver drops the connection for any reason.
Another reason could be mongoose disconnecting before the creation of mongo document indexes.
You might try updating mongo.
There's also a mongo config setting that can easily in the database using too much memory and being killed by the kernel.

Read More


Perform Monitoring with PRTG

This article covers how to use #monitoring with PRTG. With PRTG. Today, nearly every business relies on a computer and network infrastructure for internet, internal management, telephone, and email.
Here comes the role of PRTG to ensure that business data flows seamlessly between employees, offices, and customers.


Monitoring availability, bandwidth, and usage of your network is easy when you have PRTG. As a versatile solution, PRTG adapts to your needs and supports you with monitoring your application servers and services as whole and not only separate single aspects of these.
To set up your network monitoring, download the PRTG installer from the Paessler website and follow the steps in the installation wizard, or set up a PRTG Hosted Monitor instance on https://www.paessler.com/prtg-hosted-monitor and install a remote probe in your LAN.
PRTG Network Monitor is Paessler's powerful network monitoring solution.

In #PRTG, you can view Toplists for all xFlow sensors. xFlows are monitoring data pushed from network devices to PRTG.
You can use them to monitor where and how much data is traveling to and from.
This way, they determine which machine, protocol, or user is consuming bandwidth.

Remote probes allow you to monitor different sub-networks that are separated from your PRTG on premises core server by a firewall and to keep an eye on remote locations. You can install one or more remote probes.

The best network monitoring tools:
1. SolarWinds Network Performance Monitor (FREE TRIAL).
2. Datadog Network Performance Monitoring (FREE TRIAL).
3. ManageEngine OpManager (FREE TRIAL).
4. Progress WhatsUp Gold (FREE TRIAL).
5. Site24x7 Network Monitoring (FREE TRIAL).
6. Paessler PRTG Network Monitor (FREE TRIAL).
7. Nagios Core.
8. Zabbix.

Read More


Failed to restart network service CentOS error

This article covers methods to fix 'Failed to restart network.service' on both RHEL 7 and RHEL 8. You can use "NetworkManager.service" as the default networking service in RHEL 8.
Red Hat Enterprise Linux 8 uses the default networking service, NetworkManager, which is a dynamic network control and configuration daemon to keep network devices and connections up and active when they are available.

If any of these scripts are required, the installation of the deprecated network scripts in the system is still possible with the following command:

# yum install network-scripts

In RHEL 7 /etc/rc.d/init.d/network was owned by initscripts but with RHEL 8 this tool is part of network-scripts rpm.

Also, you can restart you network by issuing following command:

sudo systemctl restart NetworkManager.service


You can also stop and start it by issuing:

sudo systemctl stop NetworkManager.service
sudo systemctl start NetworkManager.service

Read More


Manage Networking with NetworkManager in RHEL CentOS 8

This article covers NetworkManager daemon for managing the networking service to dynamically configure and control network devices and keep connections up and active when they are available.
Netstat is a command line utility that can be used to list out all the network (socket) connections on a system.
It lists out all the tcp, udp socket connections and the unix socket connections.
To reboot Linux using the command line: To reboot the Linux system from a terminal session, sign in or “su”/”sudo” to the “root” account.
Then type “ sudo reboot ” to reboot the box. Wait for some time and the Linux server will reboot itself.

To troubleshoot network connectivity with Linux server:
i. Check your network configuration.
ii. Check the network configuration file.
iii. Check the servers DNS records.
iv. Test the connection both ways.
v. Find out where the connection fails.
vi. Firewall settings.
vii. Check Host status information.

To change the hostname in Linux Ubuntu:
i. Type the following command to edit /etc/hostname using nano or vi text editor: sudo nano /etc/hostname. Delete the old name and setup new name.
ii. Next Edit the /etc/hosts file: sudo nano /etc/hosts.
iii. Reboot the system to changes take effect: sudo reboot.

To reinstall #network service in #Linux (#Ubuntu / #Debian):
i. Use the following command to restart the server networking service. # sudo /etc/init.d/networking restart or
# sudo /etc/init.d/networking stop # sudo /etc/init.d/networking start else # sudo systemctl restart networking.
ii. Once this done, use the following command to check the server network status.

Read More


Configure AWS load balancer with Cloudformation

This article will guide you on how to create an Application Load balancer and its dependencies using CloudFormation. 

Load balancing is defined as the methodical and efficient distribution of network or application traffic across multiple servers in a server farm. 

Each load balancer sits between client devices and backend servers, receiving and then distributing incoming requests to any available server capable of fulfilling them.

Software load balancers is that hardware load balancers require proprietary, rack-and-stack hardware appliances, while software load balancers are simply installed on standard x86 servers or virtual machines.

Another critical difference between hardware and software load balancers lies in the ability to scale.


Elastic Load Balancing supports the following types of load balancers: 

1. Application Load Balancers, Network Load Balancers, and Classic Load Balancers. 

2. Amazon ECS services can use either type of load balancer. 

3. Application Load Balancers are used to route HTTP/HTTPS (or Layer 7) traffic.

Read More


Docker error initializing network controller

This article will guide you on tips to resolve the error 'Docker error initializing network controller'. This docker error happens in the process of trying to start the docker service. 

To fix docker failed to start daemon: Error initializing network controller no network available:

Add a docker0 bridge interface;

# ip link add name docker0 type bridge

# ip addr add dev docker0 172.17.0.1/16


Docker originally used Linux Containers (LXC) and was designed for Linux kernel only.

In the case of Windows, Docker uses Hyper-V which is in-built virtualization technology provided by Windows. Docker uses Hypervisor framework in the case of MacOs for virtualization.

Docker is a platform and tool for building, distributing, and running Docker containers.

Kubernetes is a container orchestration system for Docker containers that is more extensive than Docker Swarm and is meant to coordinate clusters of nodes at scale in production in an efficient manner.

Read More


Perfmon counters for Disk Usage

This article will guide you on use performance counters (#Perfmon) to identify SQL server disk bottlenecks. 

The performance impact is negligible in updating. Microsoft's intent is that you always write to the performance counters. It's the monitoring of (or capturing of) those performance counters that will cause a degradation of performance. So, only when you use something like perfmon to capture the data.

Reliability #Monitor shows you your system stability history at a glance and lets you see details on a day-by-day basis about events that impact reliability. Reliability Monitor provides a quick view of how stability the system has been.

1. The Performance Monitor is primarily for viewing real time #statistics. 

2. By default only one counter is selected; the %Processor Time counter. However you can add additional counters by clicking on the green plus sign. 

3. This will allow you to monitor any counters you wish in real time.

4. Difference Between Performance Monitor and #Resource Monitor is that a performance monitor is a program that assesses and reports information about various computer resources and devices. 

5. While Resource Monitor is a tool by which you can monitor the usage of your CPU.

Read More


Perfmon Counters for memory usage

This article will guide you on how to use Perfmon Counters for memory usage. You will also learn some commonly used performance counters which can be used to identify #SQL server memory pressure.

To detect a memory leak using #Performance #Monitor, monitor these counters: The Memory/Available Bytes counter lets you view the total number of bytes of available memory. This value normally fluctuates, but if you have an application with the memory leak, it will decrease over time.

A system performance report is a part of Performance Monitor that details the status of local hardware resources, system response times, and processes on the local computer. You can use this information to identify possible causes of performance issues.

SQL performance tuning consists of making queries of a relation database run as fast as possible. 

To Check Detailed #Memory #Usage with Performance Monitor:

1. To open up Performance Monitor type: perfmon into the Run window (Windows Key + R). 

2. In the window that comes up, click the Performance Monitor under Monitoring Tools in the left pane. 

Read More


ICMP Flood Attack Methods to mitigate

This article will guide you on methods to mitigate ICMP flood #attack. This is the type of Denial of Service (DoS) attack in which an attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command.

Many network administrators feel that ICMP is a security risk, and should therefore always be blocked at the firewall. It is true that ICMP does have some security issues associated with it, and that a lot of #ICMP should be blocked. 

But this is no reason to block all ICMP traffic!

To mitigate Ping flood attack:

1. Disabling a ping flood is most easily accomplished by disabling the ICMP functionality of the targeted router, computer or other device. 

2. A network administrator can access the administrative interface of the device and disable its ability to send and receive any requests using the ICMP, effectively eliminating both the processing of the request and the Echo Reply. 

3. The consequence of this is that all network activities that involve ICMP are disabled, making the device unresponsive to ping requests, traceroute requests, and other network activities.

Read More


Perfmon Counters for CPU usage

This article will guide you on how to use #Perfmon Counters for CPU #Usage and #Optimization.
Monitoring #CPU #Performance #Counters:
1. System, #Counter: Processor Queue Length. This Performance Monitor counter displays the number of threads waiting to be executed in the queue, which all the processors on your system share.
2. Processor, Counter: % Processor Time.
3. Processor, Counter: Interrupts/sec and Performance Object; Processor, Counter: % DPC Time.

Read More


Windows block remote network access for local user accounts

This article will guide you on ways to #restrict remote network access for a local user account.

To restrict local #accounts in #Windows 10,

Open the Settings app, then select Accounts. Select Family & other users. Scroll down to the Other Users section, then choose Add someone else to this PC. If the new user already has a #Microsoft account, enter the associated #email address, then click Next.

To restrict a Windows user:

1. Select Settings.

2. Tap Accounts.

3. Select Family & other users.

4. Tap "Add someone else to this #PC."

5. Select "I don't have this person's sign-in information."

6. Select "Add a user without a Microsoft account."

Read More


Docker Network How to create it

This article will guide you on how to create a #docker #network and attach a #container to it. If you want to add a container to a network after the container is already running, use the docker network connect subcommand. You can connect multiple containers to the same network. Once connected, the containers can communicate using only another container's #IP address or name.

There are three common Docker network types:

1. bridge networks, used within a single host.

2. overlay networks, for multi-host communication.

3. macvlan networks which are used to connect Docker containers directly to #host network interfaces.

Read More


Remote Transport Pruning Failure How to troubleshoot

This article will guide you on steps to solve remote transport #pruning #failure in #cPanel which can occur when a directory has too much size, network #error, or due to the lowness of backup drive.

The remote transport process may time out if it tries to prune a very large directory. The following options can help you to solve this issue:

The transport may produce an error if it is unable to prune the directory due to its size. You can manually delete the directory from the remote backup location to troubleshoot this error.

Read More


Virtual Machines (VMs) in oVirt 4 0 Environment

This article will guide you on the steps to create a Virtual Machines (#VMs) in oVirt 4.0 Environment.

The #oVirt engine acts as the control center for oVirt environments. The engine enables admins to define #hosts and #networks, as well as to add storage, create VMs and manage user permissions. Included in the oVirt engine is a graphical user interface (GUI), which manages oVirt #infrastructure resources.

To Create a Virtual Server:

i. Access the Virtual Server class tab in the Class #Manager.

ii. Click the Add Virtual Server link.

iii. Specify the name of the virtual server, its connections, and the URL Hosts. ...

iv. Click OK and then Apply to save and apply your changes.

To to Create Virtual Machines (VMs) in oVirt 4.0 Environment:

1. Create new Data Center.

2. Configure Cluster for Data Center.

3. Add Host or oVirt Node to above created data center & cluster.

4. Creating Storage #Domains.

5. Upload #ISO files to ISO Storage Domain.

6. Create Virtual Machine.

Read More


Using Bpytop to monitor Linux and FreeBSD Resources

This article will guide you on how to use Bpytop Monitoring for Linux & FreeBSD Resources.

#Bpytop is a great utility which is useful on your #Linux, #macOS, and #FreeBSD as a #resource #monitor. It is much faster than bashtop and works pretty well as Python 3 is standard on many Unix boxes.

Read More


ifconfig centos 7

This article will guide you on the steps to #install #ifconfig in #CentOS using the yum #package #manager.

The ifconfig command can tell you a lot about your Unix server's connection to your #network and the role it's playing in both generating and receiving network traffic.

Read More


SQL Network Interfaces error 28 Steps to fix it

This article will guide you in fixing "SQL #Network #Interfaces #error 28" which happens while trying to connect to #SQL #Server instance either using #SSMS (SQL Server Management Studio) or using any other way.

Read More


Instance limit exceeded error in aws Steps to fix it

This article will guide you on the steps to fix instance limit exceeded error in aws which occurs when trying to launch a new instance or restart a stopped instance thereby triggering the InstanceLimitExceeded error. It generally happens when the default limit of instances per region exceeds.

Read More


Steps to Install GNS3 on Ubuntu in a single command

This article will guide you on the steps to install GNS3 on Ubuntu.

Read More


Configuring Static IP and Hostname in FreeBSD 12 Steps to take

This article will guide you on how to configure network settings in FreeBSD by setting static IP addresses and DHCP addresses.

Read More


The Local Device Name is Already in Use how to fix it

This article will guide you on how to tackle "The Local Device Name is Already in Use" which error occurs when attempting to access a network drive, generally a mapped drive.

Read More


How to use netsh to configure port forwarding on windows

This article will guide you on how to configure port forwarding on windows using netsh in order to redirect an incoming TCP connection from the local TCP port to any other port number.

Read More


Openstack instance generating status error

This article will guide you on the best method of fixing Openstack instance generating status error caused by network issues or security issues.

Read More


Munin installation on CentOS

This article will guide you through the steps to get Muni installed on CentOS Server.

Read More


DHCP Server installation error 0x800f0922

In this article, you will see the complete guide to follow in order to fix DHCP server install error 0x800f0922 when trying to install DHCP on a Windows Server.

Read More


How to get rid of Docker error 255

Docker errors such as the exit status error 255 are quite difficult to troubleshoot because it tends to stop the process giving that error status.

Read More


Fix no such device error when using ethtool

Ethtool is a great utility for Linux kernel-based operating system which helps to display and modify some important parameters of network interface controllers and their device drivers.

Read More