Howtos / Articles

Installing NGINX, PHP, and MySQL on CentOS 6

This “how to” guide will step you through the process of setting up Nginx, PHP, and MySQL on CentOS 6.…

Read more [...]

Installing HAProxy on CentOS 6

This guide will step you through the process of installing HAProxy on CentOS 6. To install HAProxy on CentOS 6 you first need to set up your installation to use the epel software repository. HAProxy is not available in the default CentOS repositories. (Note: All commands below require root privileges.) rpm -Uvh http://download.fedoraproject.org/pub/epel/6/i386/epel-release-6-7.noarch.rpm You can now install haproxy. yum -y install haproxy Now that HAProxy is installed, you can configure the haproxy.cfg file. vi /etc/haproxy/haproxy.cfg Once you have configured HAProxy,…

Read more [...]

Monitoring Compaq or HP Smart Array RAID status on CentOS

This howto will step you through the process of setting up the required software to be able to check the status of a Compaq or HP Smart Array and the attached physical and logical drives on CentOS 6 or RHEL. The required program to be able to talk to the Smart Array is called ‘hpacucli’, which can be found in the ‘HP Service Pack for ProLiant’ package. (Note: Some of the commands below require root privileges.) Obtaining and Installing the…

Read more [...]

Installing lspci on CentOS

The lspci command, which can be found in the pciutils package, is a great tool for finding information on the devices in your PC. the lspci command will allow you to get the model number/chip details for devices such as network interface cards, sound cards, raid cards, etc. To install pciutils on CentOS/RHEL using yum: (make sure you are logged in with root privileges) # yum install pciutils Example installation output: # yum install pciutils Loaded plugins: fastestmirror, presto Loading…

Read more [...]

How To Change The SSH Server Port Number

Changing the port number that your SSH server listens on is a simple way to prevent random brute force login attacks against your server. While people can still perform attacks against SSH running on a different port number, most automated tools will default to port 22, and not actually do a full port scan. Any port number can be used, as long as it is not already in use by another service. Note: Make sure you are logged in as…

Read more [...]



Page 2 of 3123