SlideShare a Scribd company logo
1 of 7
Download to read offline
Something very basic and yet interesting
aspect of 'LINUX'
"Linux": Do we pay attention to the 'kernel' distributions or "distros", for example:
In general, do we really care:
• What distribution it belongs to?
• What kernel is shipped with?
• What is the Major version for the kernel?
• What is the Minor version for the kernel?
• What is the patch revision to the kernel?
To find out which kernel your linux server run, you can use this command:
# uname -r
2.6.32-358.el6.x86_64
INTERESTING : The fact of the matter is, the "version number" of a Linux distribution and the "release
number" of a Linux kernel use different naming schemes. In other words, all it means is that, while
planning a distribution, each distributor chooses a particular kernel release (for example, 2.6.32) and
adds some modifications of its own before placing the kernel into a distribution. Current Red Hat
distributions identify their kernel modifications by adding a number to the base kernel release; for
example, RHEL 6.3 ships a 2.6.32-279 kernel. To reduce the amount of variation encountered in
support contracts, distributors support a small set of kernels...hmmm I see, didn't know this myself.
Is it ok to patch 'kernel' without considering the "distros"?
For me it's just a sand-box to test storage NFS protocols, and I don't work as 'linux admin', hence I
don't care much, but you may: This is because the "NFS client" is part of the kernel, therefore
updates to the "NFS client" could mean replacing a "kernel"...Interesting stuff. Technically, it is easy
to replace a kernel after a distribution is installed, but Linux customers risk losing "distributor
support" for their installation if they install a kernel that was not built by the distributor.
Recommended NFS mount options:
When running applications such as databases that depend on end-to-end data integrity, use “hard”
as the mount option. Database vendors like Oracle have verified that using "intr" instead of "nointr"
can expose your database to the risk of corruption when a database instance is signaled (for
example, during a “shutdown abort” sequence). However, with "intr" being deprecated in RHEL6.x,
"nointr" is now the default value and does not require any explicit way to mention in the mount
options.
This is because each mount will use "one port" to communicate with "mountd" and "another port"
to communicate with "NFS on the storage". The mountd port connection is closed after a couple of
minutes and the NFS connection remains active as long as there's activity on the mount point. If
there is no activity then the connection is closed and may be used by another mount point. If the
environment has a large number of mounts it is better to use an automounter to avoid mount
storms. An automounter will allow the client to have more mounts available but not have all of them
triggered at the same time.
Time-out:
NFSv3: timeo=600
NFSv4: timeo=6000
NFS mount options:
The Linux NFS client now recognizes two different file system types.
1) NFS
2) NFSv4
Mounting NFSv3 mount entry in the /etc/fstab:
172.17.44.102:/vol /mnt/folder nfs
vers=3,rw,bg,hard,rsize=65536,wsize=65536,proto=tcp,suid,timeo=600
[root@nfsclient ~]# mount -t nfs ${NAS_VOL} ${MOUNTPO} -o
rw,bg,hard,nointr,rsize=32768,wsize=32768,tcp,actimeo=0,vers=3,timeo=600
[root@linux ~]# mount |grep nfs
nfsserver:/exports on /mount/point type nfs
(rw,relatime,vers=3,rsize=32768,wsize=32768,namlen=255,acregmin=0,acregmax=0,ac
dirmin=0,acdirmax=0,hard,proto=tcp,timeo=600,retrans=2,sec=sys,mountaddr=XX.XX.
XX.XX,mountvers=3,mountport=4046,mountproto=tcp,local_lock=none,addr=XX.XX.XX.
XX)
Wihtout /et/fstab:
mount –t nfs4 –o filer:/vol/vol0 /mnt/nfs
Mounting NFSv4 using /etc/fstab:
XX.XX.XX.XX:/vol /mnt/folder nfs4
rw,bg,hard,rsize=65536,wsize=65536,proto=tcp,suid,timeo=6000
NFS version 4 does not support UDP:
so "proto=tcp" is the only protocol that can be used with NFS version 4 when your
clients communicate with NetApp storage. Other mount options that do not work with
nfs4 file systems include noacl, nocto, and nolock.
Best Practice:
[root@linux ~]# mount –o rw,bg,vers=3,tcp,timeo=600,rsize=65536,wsize=65536,hard,intr
Note: "intr" is deprecated in RHEL6.x. It is hard coded to "nointr".
The timeo=600 option allows the TCP protocol a long time to attempt recovery before the RPC client
interferes.
For mounting from FTP or HTTP server:
[root@linux ~]# mount –o
ro,fg,vers=3,tcp,timeo=600,retrans=2,rsize=65536,wsize=65536,hard,nointr,nocto,actimeo=600
For troubleshooting Network drops:
There are various files and tools in Linux:
1) /proc/net/dev
2) /proc/net/snmp
3) netstat, dropwatch etc for excessive frame drops or other odd conditions that signal suboptimal
performance.
To check for retransmissions:
"nfsstat –c" along with "netstat -s" can be used at the shell prompt. At the top of the output, it lists
the total number of RPCs the client has sent and the number of times the client had to retransmit an
RPC. Become familiar with network snooping too ls such as "tcpdump" and "ethereal".
tcpdump example:
[root@linux ~]# tcpdump host XX.XX.XX.XX -s 256 -w xyz.trc
-s=snaplen in bytes.
-w=writing log path
To find out if the application is competing for "CPU" resources with the NFS client, RPC client, or
network layer on your client system, the "top" tool can be used. The "rpciod" process at the top of
the listing is an indicator that NFS operations are dominating the CPU on your system. In addition, if
the system CPU percentage increases significantly when the application accesses NFS data, this also
can indicate a CPU shortage. In many cases, adding more CPUs or faster CPUs helps.
“strace” utility is another way of gathering kernel-level information on any behaviour of system calls
that the client communicates with the NetApp storage.
[root@linux ~]# strace mount
What is the maximum theoretical transfer speed:
On a clean 10 Gigabit Ethernet network, a single Linux client can send up to 1.2GB/sec. Aggregating
two 10Gbe ports would provide 2.4GB/sec of bandwidth. The bandwidth is determined by the block
size times the number of IOPs and is measured in MB/sec.
In the RHEL6.x kernel you can also use the “dropwatch” utility to monitor and record any dropped
packets.
Error Messages in the Kernel Log:
There are two messages that you may encounter frequently in the kernel log (this is located in
/var/log/messages on Linux systems). The first is “server not responding.” This message occurs after
the client retransmits several times without any response from a server.
The second, perhaps more frustrating, message is “can’t get request slot.” This message indicates
that the RPC client is queuing messages and cannot send them. This is usually due to network
problems such as a bad cable, incorrectly set duplex or flow control options, or an overloaded
switch.
Client hardware details, such as SMP or UP, which NIC, and how much memory; you can use the:
[root@linux ~]# lspci –v
And, also cat /proc/cpuinfo or cat /proc/meminfo on RHEL clients to collect most of this info.
The clock on your Linux clients must remain synchronized with your storage to avoid problems such
as authentication failures or incomplete software builds. Usually you set up a network time service
such as NTP and configure your storage and clients to update thei r time using this service.
To enable NTP on your clients, verify that the ntpd startup script runs when your client boots (look in
/etc/rc.d or /etc/init.d—the exact location varies, depending on your distribution; for Red Hat
systems, you can use chkconfig –level 35 ntpd on). You must add the network time server’s IP
address to /etc/ntp/step-tickers and /etc/ntp.conf.
Security
Most versions of the Linux NFS client over the years supported only two types of authentication:
AUTH_NULL and AUTH_UNIX. With Linux distributions based on 2.6 kernels support Kerberos can be
enabled.
Firewall ports requirement for Client access to NFS Server:
NFSv4= 2049 and possibly to 111
NFSv3= 2049, 111, rpc.mountd and rpc.statd ports
Note that the NFSv4 callback port on the Linux NFS client is accessed by creating a file
/etc/modprobe.d/options-local.conf containing the line options nfs
callback_tcpport=<portnumber> and then rebooting in RHEL6.x. However, with NFSv4.1 the callback
path uses port 2049 with the help of sessions introduced in this minor version of NFSv4. Therefore
from firewall's perspective, it is recommended to use NFSv4.1 over NFSv4 as becomes more easy to
configure and manage firewalls through a single NFS port.
Oracle with NFSv4
With NFSv4.x, the chance of failures with locks is very rare because it is a stateful protocol and all
state information is stored on both the client and the server when they are active and recovered
mutually in the event of an outage. In NFSv4.x, nfsd is the only daemon required to start the nfs
service. Ancillary protocols like portmapd, mountd, lockd, and statd are no longer present. With the
elimination of these adjunct protocols, the locking mechanism is streamlined and an Oracle database
faces fewer challenges when recovering locks on start-up.
Reporting and Monitoring Tools:
1) SAR utility can provide information on CPU, iowait, and idle time.
[root@linux ~]# sar 1 3
2) MPIO can provide more granular information for each core on the Linux platform.
[root@linux ~]# mpstat -P ALL
3) Good old top utility.
[root@linux ~]# top
4) DSTAT and IPTRAF provide detailed information on network traffic.
[root@linux ~]# dstat
ashwinwriter@gmail.com
Oct, 2020

More Related Content

More from Ashwin Pawar

How to connect to NetApp FILER micro-USB console port
How to connect to NetApp FILER micro-USB console portHow to connect to NetApp FILER micro-USB console port
How to connect to NetApp FILER micro-USB console portAshwin Pawar
 
NDMP backup models
NDMP backup modelsNDMP backup models
NDMP backup modelsAshwin Pawar
 
How to use Active IQ tool to access filer information
How to use Active IQ tool to access filer informationHow to use Active IQ tool to access filer information
How to use Active IQ tool to access filer informationAshwin Pawar
 
San vs Nas fun series
San vs Nas fun seriesSan vs Nas fun series
San vs Nas fun seriesAshwin Pawar
 
Steps to identify ONTAP latency related issues
Steps to identify ONTAP latency related issuesSteps to identify ONTAP latency related issues
Steps to identify ONTAP latency related issuesAshwin Pawar
 
SnapDiff process flow chart
SnapDiff process flow chartSnapDiff process flow chart
SnapDiff process flow chartAshwin Pawar
 
SnapDiff performance issue
SnapDiff performance issueSnapDiff performance issue
SnapDiff performance issueAshwin Pawar
 
Volume level restore fails with error transient snapshot copy is not supported
Volume level restore fails with error transient snapshot copy is not supportedVolume level restore fails with error transient snapshot copy is not supported
Volume level restore fails with error transient snapshot copy is not supportedAshwin Pawar
 
Disk reports predicted failure event
Disk reports predicted failure eventDisk reports predicted failure event
Disk reports predicted failure eventAshwin Pawar
 
OCUM shows ONTAP cluster health degraded
OCUM shows ONTAP cluster health degradedOCUM shows ONTAP cluster health degraded
OCUM shows ONTAP cluster health degradedAshwin Pawar
 
NDMPCOPY lun from 7-mode NetApp to cDOT
NDMPCOPY lun from 7-mode NetApp to cDOTNDMPCOPY lun from 7-mode NetApp to cDOT
NDMPCOPY lun from 7-mode NetApp to cDOTAshwin Pawar
 
Latency in storage
Latency in storageLatency in storage
Latency in storageAshwin Pawar
 
NetApp storage layering
NetApp storage layeringNetApp storage layering
NetApp storage layeringAshwin Pawar
 
What is storage from client's perspective
What is storage from client's perspectiveWhat is storage from client's perspective
What is storage from client's perspectiveAshwin Pawar
 
Difference between cluster image package show-repository and system image get
Difference between cluster image package show-repository and system image getDifference between cluster image package show-repository and system image get
Difference between cluster image package show-repository and system image getAshwin Pawar
 
Cannot access NetApp 7-mode admin shares etc$
Cannot access NetApp 7-mode admin shares etc$Cannot access NetApp 7-mode admin shares etc$
Cannot access NetApp 7-mode admin shares etc$Ashwin Pawar
 
How to generate,collect and upload ocum logs
How to generate,collect and upload ocum logsHow to generate,collect and upload ocum logs
How to generate,collect and upload ocum logsAshwin Pawar
 

More from Ashwin Pawar (20)

How to connect to NetApp FILER micro-USB console port
How to connect to NetApp FILER micro-USB console portHow to connect to NetApp FILER micro-USB console port
How to connect to NetApp FILER micro-USB console port
 
NDMP backup models
NDMP backup modelsNDMP backup models
NDMP backup models
 
How to use Active IQ tool to access filer information
How to use Active IQ tool to access filer informationHow to use Active IQ tool to access filer information
How to use Active IQ tool to access filer information
 
San vs Nas fun series
San vs Nas fun seriesSan vs Nas fun series
San vs Nas fun series
 
Steps to identify ONTAP latency related issues
Steps to identify ONTAP latency related issuesSteps to identify ONTAP latency related issues
Steps to identify ONTAP latency related issues
 
SnapDiff
SnapDiffSnapDiff
SnapDiff
 
SnapDiff process flow chart
SnapDiff process flow chartSnapDiff process flow chart
SnapDiff process flow chart
 
SnapDiff performance issue
SnapDiff performance issueSnapDiff performance issue
SnapDiff performance issue
 
Volume level restore fails with error transient snapshot copy is not supported
Volume level restore fails with error transient snapshot copy is not supportedVolume level restore fails with error transient snapshot copy is not supported
Volume level restore fails with error transient snapshot copy is not supported
 
Disk reports predicted failure event
Disk reports predicted failure eventDisk reports predicted failure event
Disk reports predicted failure event
 
OCUM shows ONTAP cluster health degraded
OCUM shows ONTAP cluster health degradedOCUM shows ONTAP cluster health degraded
OCUM shows ONTAP cluster health degraded
 
NDMPCOPY lun from 7-mode NetApp to cDOT
NDMPCOPY lun from 7-mode NetApp to cDOTNDMPCOPY lun from 7-mode NetApp to cDOT
NDMPCOPY lun from 7-mode NetApp to cDOT
 
Latency in storage
Latency in storageLatency in storage
Latency in storage
 
NVRAM vs NVMEM
NVRAM vs NVMEMNVRAM vs NVMEM
NVRAM vs NVMEM
 
NAS vs SAN
NAS vs SANNAS vs SAN
NAS vs SAN
 
NetApp storage layering
NetApp storage layeringNetApp storage layering
NetApp storage layering
 
What is storage from client's perspective
What is storage from client's perspectiveWhat is storage from client's perspective
What is storage from client's perspective
 
Difference between cluster image package show-repository and system image get
Difference between cluster image package show-repository and system image getDifference between cluster image package show-repository and system image get
Difference between cluster image package show-repository and system image get
 
Cannot access NetApp 7-mode admin shares etc$
Cannot access NetApp 7-mode admin shares etc$Cannot access NetApp 7-mode admin shares etc$
Cannot access NetApp 7-mode admin shares etc$
 
How to generate,collect and upload ocum logs
How to generate,collect and upload ocum logsHow to generate,collect and upload ocum logs
How to generate,collect and upload ocum logs
 

Recently uploaded

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Something very basic and yet interesting aspect of LINUX

  • 1. Something very basic and yet interesting aspect of 'LINUX' "Linux": Do we pay attention to the 'kernel' distributions or "distros", for example: In general, do we really care: • What distribution it belongs to? • What kernel is shipped with? • What is the Major version for the kernel? • What is the Minor version for the kernel? • What is the patch revision to the kernel? To find out which kernel your linux server run, you can use this command: # uname -r 2.6.32-358.el6.x86_64 INTERESTING : The fact of the matter is, the "version number" of a Linux distribution and the "release number" of a Linux kernel use different naming schemes. In other words, all it means is that, while planning a distribution, each distributor chooses a particular kernel release (for example, 2.6.32) and adds some modifications of its own before placing the kernel into a distribution. Current Red Hat distributions identify their kernel modifications by adding a number to the base kernel release; for example, RHEL 6.3 ships a 2.6.32-279 kernel. To reduce the amount of variation encountered in support contracts, distributors support a small set of kernels...hmmm I see, didn't know this myself. Is it ok to patch 'kernel' without considering the "distros"? For me it's just a sand-box to test storage NFS protocols, and I don't work as 'linux admin', hence I don't care much, but you may: This is because the "NFS client" is part of the kernel, therefore updates to the "NFS client" could mean replacing a "kernel"...Interesting stuff. Technically, it is easy to replace a kernel after a distribution is installed, but Linux customers risk losing "distributor support" for their installation if they install a kernel that was not built by the distributor.
  • 2. Recommended NFS mount options: When running applications such as databases that depend on end-to-end data integrity, use “hard” as the mount option. Database vendors like Oracle have verified that using "intr" instead of "nointr" can expose your database to the risk of corruption when a database instance is signaled (for example, during a “shutdown abort” sequence). However, with "intr" being deprecated in RHEL6.x, "nointr" is now the default value and does not require any explicit way to mention in the mount options. This is because each mount will use "one port" to communicate with "mountd" and "another port" to communicate with "NFS on the storage". The mountd port connection is closed after a couple of minutes and the NFS connection remains active as long as there's activity on the mount point. If there is no activity then the connection is closed and may be used by another mount point. If the environment has a large number of mounts it is better to use an automounter to avoid mount storms. An automounter will allow the client to have more mounts available but not have all of them triggered at the same time. Time-out: NFSv3: timeo=600 NFSv4: timeo=6000 NFS mount options: The Linux NFS client now recognizes two different file system types. 1) NFS 2) NFSv4 Mounting NFSv3 mount entry in the /etc/fstab: 172.17.44.102:/vol /mnt/folder nfs vers=3,rw,bg,hard,rsize=65536,wsize=65536,proto=tcp,suid,timeo=600 [root@nfsclient ~]# mount -t nfs ${NAS_VOL} ${MOUNTPO} -o rw,bg,hard,nointr,rsize=32768,wsize=32768,tcp,actimeo=0,vers=3,timeo=600 [root@linux ~]# mount |grep nfs nfsserver:/exports on /mount/point type nfs (rw,relatime,vers=3,rsize=32768,wsize=32768,namlen=255,acregmin=0,acregmax=0,ac
  • 3. dirmin=0,acdirmax=0,hard,proto=tcp,timeo=600,retrans=2,sec=sys,mountaddr=XX.XX. XX.XX,mountvers=3,mountport=4046,mountproto=tcp,local_lock=none,addr=XX.XX.XX. XX) Wihtout /et/fstab: mount –t nfs4 –o filer:/vol/vol0 /mnt/nfs Mounting NFSv4 using /etc/fstab: XX.XX.XX.XX:/vol /mnt/folder nfs4 rw,bg,hard,rsize=65536,wsize=65536,proto=tcp,suid,timeo=6000 NFS version 4 does not support UDP: so "proto=tcp" is the only protocol that can be used with NFS version 4 when your clients communicate with NetApp storage. Other mount options that do not work with nfs4 file systems include noacl, nocto, and nolock. Best Practice: [root@linux ~]# mount –o rw,bg,vers=3,tcp,timeo=600,rsize=65536,wsize=65536,hard,intr Note: "intr" is deprecated in RHEL6.x. It is hard coded to "nointr". The timeo=600 option allows the TCP protocol a long time to attempt recovery before the RPC client interferes. For mounting from FTP or HTTP server: [root@linux ~]# mount –o ro,fg,vers=3,tcp,timeo=600,retrans=2,rsize=65536,wsize=65536,hard,nointr,nocto,actimeo=600
  • 4. For troubleshooting Network drops: There are various files and tools in Linux: 1) /proc/net/dev 2) /proc/net/snmp 3) netstat, dropwatch etc for excessive frame drops or other odd conditions that signal suboptimal performance. To check for retransmissions: "nfsstat –c" along with "netstat -s" can be used at the shell prompt. At the top of the output, it lists the total number of RPCs the client has sent and the number of times the client had to retransmit an RPC. Become familiar with network snooping too ls such as "tcpdump" and "ethereal". tcpdump example: [root@linux ~]# tcpdump host XX.XX.XX.XX -s 256 -w xyz.trc -s=snaplen in bytes. -w=writing log path To find out if the application is competing for "CPU" resources with the NFS client, RPC client, or network layer on your client system, the "top" tool can be used. The "rpciod" process at the top of the listing is an indicator that NFS operations are dominating the CPU on your system. In addition, if the system CPU percentage increases significantly when the application accesses NFS data, this also can indicate a CPU shortage. In many cases, adding more CPUs or faster CPUs helps. “strace” utility is another way of gathering kernel-level information on any behaviour of system calls that the client communicates with the NetApp storage. [root@linux ~]# strace mount
  • 5. What is the maximum theoretical transfer speed: On a clean 10 Gigabit Ethernet network, a single Linux client can send up to 1.2GB/sec. Aggregating two 10Gbe ports would provide 2.4GB/sec of bandwidth. The bandwidth is determined by the block size times the number of IOPs and is measured in MB/sec. In the RHEL6.x kernel you can also use the “dropwatch” utility to monitor and record any dropped packets. Error Messages in the Kernel Log: There are two messages that you may encounter frequently in the kernel log (this is located in /var/log/messages on Linux systems). The first is “server not responding.” This message occurs after the client retransmits several times without any response from a server. The second, perhaps more frustrating, message is “can’t get request slot.” This message indicates that the RPC client is queuing messages and cannot send them. This is usually due to network problems such as a bad cable, incorrectly set duplex or flow control options, or an overloaded switch. Client hardware details, such as SMP or UP, which NIC, and how much memory; you can use the: [root@linux ~]# lspci –v And, also cat /proc/cpuinfo or cat /proc/meminfo on RHEL clients to collect most of this info. The clock on your Linux clients must remain synchronized with your storage to avoid problems such as authentication failures or incomplete software builds. Usually you set up a network time service such as NTP and configure your storage and clients to update thei r time using this service. To enable NTP on your clients, verify that the ntpd startup script runs when your client boots (look in /etc/rc.d or /etc/init.d—the exact location varies, depending on your distribution; for Red Hat systems, you can use chkconfig –level 35 ntpd on). You must add the network time server’s IP address to /etc/ntp/step-tickers and /etc/ntp.conf.
  • 6. Security Most versions of the Linux NFS client over the years supported only two types of authentication: AUTH_NULL and AUTH_UNIX. With Linux distributions based on 2.6 kernels support Kerberos can be enabled. Firewall ports requirement for Client access to NFS Server: NFSv4= 2049 and possibly to 111 NFSv3= 2049, 111, rpc.mountd and rpc.statd ports Note that the NFSv4 callback port on the Linux NFS client is accessed by creating a file /etc/modprobe.d/options-local.conf containing the line options nfs callback_tcpport=<portnumber> and then rebooting in RHEL6.x. However, with NFSv4.1 the callback path uses port 2049 with the help of sessions introduced in this minor version of NFSv4. Therefore from firewall's perspective, it is recommended to use NFSv4.1 over NFSv4 as becomes more easy to configure and manage firewalls through a single NFS port. Oracle with NFSv4 With NFSv4.x, the chance of failures with locks is very rare because it is a stateful protocol and all state information is stored on both the client and the server when they are active and recovered mutually in the event of an outage. In NFSv4.x, nfsd is the only daemon required to start the nfs service. Ancillary protocols like portmapd, mountd, lockd, and statd are no longer present. With the elimination of these adjunct protocols, the locking mechanism is streamlined and an Oracle database faces fewer challenges when recovering locks on start-up.
  • 7. Reporting and Monitoring Tools: 1) SAR utility can provide information on CPU, iowait, and idle time. [root@linux ~]# sar 1 3 2) MPIO can provide more granular information for each core on the Linux platform. [root@linux ~]# mpstat -P ALL 3) Good old top utility. [root@linux ~]# top 4) DSTAT and IPTRAF provide detailed information on network traffic. [root@linux ~]# dstat ashwinwriter@gmail.com Oct, 2020