How do I use the netKVM

The netKVM is part of our Rescue System and allows you to access your server locally.

First, a virtual interface is loaded on your server, in which the server is started in a further step. The messages that your server outputs when starting can be monitored and influenced via a VNC connection.

This way, for example, it is possible to observe the error output on a self-compiled kernel or to boot another kernel. For Windows, the system can be loaded to the last restore point by pressing the F8 key during the boot process, or the system can be started in safe mode.

The start of the netKVM is divided into several steps as already mentioned. First, the virtualization environment needs to be loaded on your server. This is done analogously to our Rescue system by activating the button netKVM within the subresource Rescue system in our central customer management .

As soon as the loading of the virtualization environment has been completed, you can log into the virtualization environment by calling the displayed address in your browser with the user netKVM and the displayed password.

Via this homepage you can start your server by selecting the appropriate architecture. The above options can be adopted and offer only additional options which functions of the netKVM should provide or which password the netKVM expects. Please note in this connection that only one connection to your server is possible via the netKVM. Setting the password only makes sense if you leave the netKVM but leave it enabled to work on it later.

Special features of our netKVM

Due to the virtualization environment, Linux SATA hard drives are emulated as IDE hard drives. Within netKVM environment it is necessary to use / dev / hd * instead of / dev / sd *.

 

 

openSUSE

New and experienced Linux users get the most usable Linux distribution and stabilized operating system with openSUSE’s regular release. Receive updates and  harden your OS with openSUSE’s latest major distribution. Pick your desktop , configure your system and enjoy the platform of choice for Linux developers , administrators  and  software vendors.

Source from  https://www.opensuse.org/#Leap

Debian

Debian is a free operating system (OS) for your computer. An operating system is the set of basic programs and utilities that make your computer run.

Debian provides more than a pure OS: it comes with over 51000 packages, precompiled software bundled up in a nice format for easy installation on your machine.

At the core of an operating system is the kernel. The kernel is the most fundamental program on the computer and does all the basic housekeeping and lets you start other programs.

Debian systems currently use the Linux kernel or the FreeBSD kernel. Linux is a piece of software started by Linus Torvalds and supported by thousands of programmers worldwide. FreeBSD is an operating system including a kernel and other software.

However, work is in progress to provide Debian for other kernels, primarily for the Hurd. The Hurd is a collection of servers that run on top of a microkernel (such as Mach) to implement different features. The Hurd is free software produced by the GNU project.

A large part of the basic tools that fill out the operating system come from the GNU project; hence the names: GNU/Linux, GNU/kFreeBSD, and GNU/Hurd. These tools are also free.

Source from  https://www.debian.org/intro/about

Ubuntu

Scale out with Ubuntu Server

Ubuntu Server brings economic and technical scalability to your datacentre, public or private. Whether you want to deploy an OpenStack cloud, a Hadoop cluster or a 50,000-node render farm, Ubuntu Server delivers the best value scale-out performance available.

What’s new in 16.04 LTS

  • Supported by Canonical until 2021
  • Runs on all major architectures – x86, x86-64, ARM v7, ARM64, POWER8 and IBM s390x (LinuxONE)
  • Supports ZFS, the next-generation volume management/ file system ideal for servers and containers
  • LXD Linux container hypervisor enhancements including QoS and resource controls (CPU, memory, block I/O, storage quota)
  • Install snaps for simple application installation and release management
  • First production release of DPDK – line speed kernel networking
  • Linux 4.4 kernel and systemd service manager
  • Certification as a guest on AWS, Microsoft Azure, Joyent, IBM, Google Cloud Platform and Rackspace
  • Updates to Tomcat (v8), Postgresql (v9.5), Docker v(1.10), Puppet (v3.8.5), Qemu (v2.5), Libvirt (v1.3.1), LXC (v2.0), and MySQL (v5.6) and more

 

Performance and versatility

Agile, secure, deploy-anywhere technology for fast-moving companies

It doesn’t matter whether you want to deploy a NoSQL database, web farm or cloud. Ubuntu has the performance and versatility you need. Certified by leading hardware OEMs and with comprehensive deployment tools, so you can get the most from your infrastructure.

Our regular release cycle means that we support most of the latest applications. A lean initial installation and integrated deployment and application modeling technologies make Ubuntu Server a great solution for simple deployment and management at scale.

 

A release schedule you can depend on

Stay up-to-date with regular updates and upgrades

Long-term support (LTS) releases of Ubuntu Server are supported by Canonical for five years. Every six months, interim releases bring new features, while hardware enablement updates add support for the latest machines to all supported LTS releases.

 

Ubuntu Advantage: world class support

The Ubuntu Advantage service programme provides fast problem resolution, direct access to Ubuntu experts and efficient administration with the Ubuntu systems management package, Landscape.

Landscape allows you to manage thousands of Ubuntu machines as easily as one, making the administration of Ubuntu desktops, servers and cloud instances more cost-effective.

 

Deploys anywhere

Choose from the most popular public clouds

Use Ubuntu Server in the public cloud and get all the benefits of Ubuntu Server, specially tailored for public cloud infrastructures and without any licence restrictions.

Ubuntu is the most widely used developer platform for open‐source cloud building, the reference operating system for OpenStack, and the most popular cloud guest operating system on private and public clouds globally.

 

Built for big data and cloud

Speed and simplicity, on bare metal or in the cloud

With its new rapid deployment tools, Ubuntu significantly speeds up the installation of server instances on bare metal. And our service orchestration tool, Juju, makes deploying big data services surprisingly simple — on bare metal or in the cloud. That’s why vendors like 10gen, Cloudera, Couchbase, DataStax, Hortonworks, LexisNexis and Map-R partner with us.

 

A thriving community

Exchange expertise and ideas with thousands of other IT professionals

Want to talk to other Ubuntu users straightaway? Share ideas and get advice and help from our large, active community of IT professionals. As a community, we set high standards for friendliness and tolerance, we welcome your questions and contributions!

 

The fast track to virtualisation and containers

Ready to boost efficiencies and reduce costs? Virtualise your servers with Ubuntu Server, KVM and LXD. When you use a secure, lean version of Ubuntu as a guest operating system for your application, you can create virtual machines and machine containers in seconds. KVM, LXD, Xen, VMware, Vagrant, VirtualBox, and Docker are all first class experiences with Ubuntu Server. Ubuntu Server now supports KVM on ARM and IBM POWER8 architectures.

Canonical believes in choice — that’s why we support an open ecosystem of operating system intercompatibility. By providing choice, users of Ubuntu for both servers and clouds are empowered to succeed with any workload. We encourage others to do the same and offer support for all (currently supported) versions of Ubuntu Server running on other virtualisation platforms, including KVM on other commercially available Linux distributions, VMware vSphere, and Microsoft Hyper‑V.

ubuntu all guests welcome

Source from https://www.ubuntu.com/server

DDoS Protection

DDoS protected dedicated servers

DDoS is an abbreviation for the English expression Distributed Denial-of-Service, and for servers it is much more dangerous than a simple Denial-of Service attack. DDoS attacks often put web servers or entire networks out of commission. In a DDoS attack a web site or even an entire network is attacked all at once by multiple computers. This typically results in a server outage. As a rule DDoS attacks attempt to overload the access link, the firewall resources and/or the web and database servers. The following example will be used to demonstrate what a DDoS attack can do in a real-life situation.

A customer rents a dedicated server that has not been equipped with DDoS protection. He intends to open an online shop and sets it up on a dedicated web server. His business generates excitement and immediately attracts large numbers of customers, and the owner generates considerable sales.

This works fine until, completely unexpectedly, his server connection begins to show signs of disruptions and finally the entire network becomes paralyzed, causing the entire web server to go offline. The owner promptly contacts the hosting provider, because the entrepreneur is unable to generate any more sales. His hoster informs him that his server has been subjected to a DDoS attack, and that his server isn’t equipped with protection against such an attack.

To sum up: Due to the oversized DDoS attack and the lack of a dedicated server with DDoS protection, his shop was inaccessible for several hours, which meant the entrepreneur wasn’t able to generate any sales and lost a lot of deals.

How does DDoS protection work with the root servers from shipcomet.com?

Learn how we can help you effectively eliminate the problem.

Thanks to the DDoS protection, an attack on root servers from us is quickly detected and the associated data traffic analysed. The data traffic is then purged by a cluster comprised of filter systems, and subsequently forwarded to your server. Once an attack is detected by the anti-DDoS programme, you immediately receive an email with all the important information. First the email informs you that an attack took place and was detected, and then you are notified which IP address was attacked.

Subsequently the traffic is filtered. Once the attack is over you receive a message from us via email. This email contains more comprehensive information, such as an excerpt from the identified data traffic.

DDoS protection

How can I protect myself against a DDoS attack?

The DDoS protection (with which every dedicated server is equipped, FREE of charge) prevents external DDoS attacks. Presently the DDoS protection is only capable of intercepting attacks up to a limited size. That is why, despite the anti-DDoS system, it is still possible for the attacked IP address to become blocked during a DDoS attack. However, in order to bring the security of the servers up to the maximum, our Team is working hard on raising the DDoS protection in stages.

CentOS

What is CentOS Linux?
CentOS Linux is a community-supported distribution derived from sources freely provided to the public by Red Hat for Red Hat Enterprise Linux (RHEL). As such, CentOS Linux aims to be functionally compatible with RHEL. The CentOS Project mainly changes packages to remove upstream vendor branding and artwork. CentOS Linux is no-cost and free to redistribute. Each CentOS version is maintained for up to 10 years (by means of security updates — the duration of the support interval by Red Hat has varied over time with respect to Sources released). A new CentOS version is released approximately every 2 years and each CentOS version is periodically updated (roughly every 6 months) to support newer hardware. This results in a secure, low-maintenance, reliable, predictable and reproducible Linux environment.

Source from   https://wiki.centos.org/

 

CentOS Linux

The CentOS Linux distribution is a stable, predictable, manageable and reproducible platform derived from the sources of Red Hat Enterprise Linux (RHEL). We are now looking to expand on that by creating the resources needed by other communities to come together and be able to build on the CentOS Linux platform. And today we start the process by delivering a clear governance model, increased transparency and access. In the coming weeks we aim to publish our own roadmap that includes variants of the core CentOS Linux.

Since March 2004, CentOS Linux has been a community-supported distribution derived from sources freely provided to the public by Red Hat. As such, CentOS Linux aims to be functionally compatible with RHEL. We mainly change packages to remove upstream vendor branding and artwork. CentOS Linux is no-cost and free to redistribute.

CentOS Linux is developed by a small but growing team of core developers. In turn the core developers are supported by an active user community including system administrators, network administrators, managers, core Linux contributors, and Linux enthusiasts from around the world.

Over the coming year, the CentOS Project will expand its mission to establish CentOS Linux as a leading community platform for emerging open source technologies coming from other projects such as OpenStack. These technologies will be at the center of multiple variations of CentOS, as individual downloads or accessed from a custom installer. Read more about the variants and Special Interest Groups that produce them.

Source  from  https://www.centos.org/about/

RAID 1

In computer storage, the standard RAID levels comprise a basic set of RAID (redundant array of independent disks) configurations that employ the techniques of striping, mirroring, or parity to create large reliable data stores from multiple general-purpose computer hard disk drives (HDDs). The most common types are RAID 0 (striping), RAID 1 and its variants (mirroring), RAID 5 (distributed parity), and RAID 6 (dual parity). RAID levels and their associated data formats are standardized by the Storage Networking Industry Association (SNIA) in the Common RAID Disk Drive Format (DDF) standard.

RAID 1 consists of an exact copy (or mirror) of a set of data on two or more disks; a classic RAID 1 mirrored pair contains two disks. This configuration offers no parity, striping, or spanning of disk space across multiple disks, since the data is mirrored on all disks belonging to the array, and the array can only be as big as the smallest member disk. This layout is useful when read performance or reliability is more important than write performance or the resulting data storage capacity.

The array will continue to operate so long as at least one member drive is operational.

Performance

Any read request can be serviced and handled by any drive in the array; thus, depending on the nature of I/O load, random read performance of a RAID 1 array may equal up to the sum of each member’s performance, while the write performance remains at the level of a single disk. However, if disks with different speeds are used in a RAID 1 array, overall write performance is equal to the speed of the slowest disk.

Synthetic benchmarks show varying levels of performance improvements when multiple HDDs or SSDs are used in a RAID 1 setup, compared with single-drive performance. However, some synthetic benchmarks also show a drop in performance for the same comparison.

While most RAID levels can provide good protection against and recovery from hardware defects or defective sectors/read errors (hard errors), they do not provide any protection against data loss due to catastrophic failures (fire, water) or soft errors such as user error, software malfunction, malware infection. For valuable data, RAID is only one building block of a larger data loss prevention and recovery scheme, it cannot replace a backup plan.

RAID 1

Source : https://en.wikipedia.org/wiki/Standard_RAID_levels

Intel i5-4590 Quad core

Performance
# of Cores 4
# of Threads 4
Processor Base Frequency 3.30 GHz
Max Turbo Frequency 3.70 GHz
Cache 6 MB SmartCache
Bus Speed 5 GT/s DMI2
TDP 84 W

Memory Specifications

Max Memory Size (dependent on memory type) 32 GB
Memory Types DDR3-1333/1600, DDR3L-1333/1600 @ 1.5V
Max # of Memory Channels 2
Max Memory Bandwidth 25.6 GB/s
ECC Memory Supported

No

Graphics Specifications

Processor Graphics Intel® HD Graphics 4600
Graphics Base Frequency 350.00 MHz
Graphics Max Dynamic Frequency 1.15 GHz
Graphics Video Max Memory 2 GB
Graphics Output eDP/DP/HDMI/VGA
Max Resolution (HDMI 1.4)‡ 4096×2304@24Hz
Max Resolution (DP)‡ 3840×2160@60Hz
Max Resolution (eDP – Integrated Flat Panel)‡ 3840×2160@60Hz
Max Resolution (VGA)‡ 1920×1200@60Hz
DirectX* Support 11.2/12
OpenGL* Support 4.3
Intel® Quick Sync Video

Yes
Intel® InTru™ 3D Technology Yes
Intel® Wireless Display

Yes
Intel® Flexible Display Interface (Intel® FDI) Yes
Intel® Clear Video HD Technology Yes
# of Displays Supported 3
Device ID 0x412
Advanced Technologies
Intel® Turbo Boost Technology 2.0
Intel® vPro Technology

Yes
Intel® Hyper-Threading Technology

No
Intel® Virtualization Technology (VT-x) Yes
Intel® Virtualization Technology for Directed I/O (VT-d)

Yes
Intel® VT-x with Extended Page Tables (EPT)

Yes
Intel® TSX-NI No
Intel® 64

Yes
Instruction Set 64-bit
Instruction Set Extensions SSE4.1/4.2, AVX 2.0
Intel® My WiFi Technology Yes
Idle States Yes
Enhanced Intel SpeedStep® Technology

Yes
Thermal Monitoring Technologies Yes
Intel® Identity Protection Technology Yes
Intel® Stable Image Platform Program (SIPP) Yes
Intel® Small Business Advantage Yes

Intel® Data Protection Technology

Intel® AES New Instructions

Yes
Secure Key Yes

Source from : http://ark.intel.com/products/80815/Intel-Core-i5-4590-Processor-6M-Cache-up-to-3_70-GHz

HPE ProLiant DL160 Generation9

The HPE ProLiant DL160 Gen9 is the next generation 2P 1U value server replacing DL360e Gen8. It delivers the right balance
of performance, storage, reliability, manageability and efficiency in a dense and compact chassis, to meet the needs of a diverse
set of customers- from SMBs and service providers with a wide range of workloads – from general purpose IT to the New Style of
IT, such as, Big Data and Cloud.

 

hpe proliant dl160 gen9

Front View

1    Access Panel
3    Optical disk drive bay
5    Power On/Standby button and system power LED
7    NIC status LED
9    UID button/LED

2    Optional USB3.0 (optional with 8SFF only)
4    Serial label pull tab
6    Health LED
8    USB 2.0 connector
10  8SFF drive cage

hpe proliant

Rear view

1   PCIe3 slot 1 (primary, associated with processor 1)
3   PCIe3 slot 3 (secondary, associated with processor 2)
5   Power supply 1 Power Connector (Optional)
7   Power supply 2 bay
9   Power Supply 2 LED
11  Unit ID LED
13  USB3.0 connectors
2  PCIe3 slot 2 (primary, associated with processor 1)
4  Power supply 1 bay
6  Power supply 1 LED (Optional)
8  Power supply 2 power connector
10 Embedded 2x1GbE network adapter
12 Video Connector
14 Dedicated iLO connector (optional)

How to install LAMP on CentOS 7

[root@installwordpress ~]# yum -y install httpd
Loaded plugins: fastestmirror
Loading mirror speeds from cached hostfile
Resolving Dependencies

[root@installwordpress ~]# systemctl enable httpd
Created symlink from /etc/systemd/system/multi-user.target.wants/httpd.service to /usr/lib/systemd/system/httpd.service.
[root@installwordpress ~]# systemctl restart httpd
[root@installwordpress ~]# yum -y install http://dev.mysql.com/get/mysql-community-release-el7-5.noarch.rpm
Loaded plugins: fastestmirror
mysql-community-release-el7-5.noarch.rpm

[root@installwordpress ~]# yum -y install mysql-server
Loaded plugins: fastestmirror
Loading mirror speeds from cached hostfile
Resolving Dependencies
–> Running transaction check
—> Package mysql-community-server.x86_64 0:5.6.33-2.el7 will be installed

[root@installwordpress ~]# systemctl enable mysqld
[root@installwordpress ~]# systemctl start mysqld
[root@installwordpress ~]# mysql_secure_installation

NOTE: RUNNING ALL PARTS OF THIS SCRIPT IS RECOMMENDED FOR ALL MySQL
SERVERS IN PRODUCTION USE! PLEASE READ EACH STEP CAREFULLY!

In order to log into MySQL to secure it, we’ll need the current
password for the root user. If you’ve just installed MySQL, and
you haven’t set the root password yet, the password will be blank,
so you should just press enter here.

Enter current password for root (enter for none):
OK, successfully used password, moving on…

Setting the root password ensures that nobody can log into the MySQL
root user without the proper authorisation.

Set root password? [Y/n] y
New password:
Re-enter new password:
Password updated successfully!
Reloading privilege tables..
… Success!
By default, a MySQL installation has an anonymous user, allowing anyone
to log into MySQL without having to have a user account created for
them. This is intended only for testing, and to make the installation
go a bit smoother. You should remove them before moving into a
production environment.

Remove anonymous users? [Y/n] y
… Success!

Normally, root should only be allowed to connect from ‘localhost’. This
ensures that someone cannot guess at the root password from the network.

Disallow root login remotely? [Y/n] y
… Success!

By default, MySQL comes with a database named ‘test’ that anyone can
access. This is also intended only for testing, and should be removed
before moving into a production environment.

Remove test database and access to it? [Y/n] y
– Dropping test database…
ERROR 1008 (HY000) at line 1: Can’t drop database ‘test’; database doesn’t exist
… Failed! Not critical, keep moving…
– Removing privileges on test database…
… Success!

Reloading the privilege tables will ensure that all changes made so far
will take effect immediately.

Reload privilege tables now? [Y/n] y
… Success!
All done! If you’ve completed all of the above steps, your MySQL
installation should now be secure.

Thanks for using MySQL!
Cleaning up…
[root@installwordpress ~]# yum -y install php php-pear php-mysql
Loaded plugins: fastestmirror
Loading mirror speeds from cached hostfile
Resolving Dependencies
–> Running transaction check
—> Package php.x86_64 0:5.4.16-36.3.el7_2 will be installed

[root@installwordpress ~]# php -v
PHP 5.4.16 (cli) (built: Aug 11 2016 21:24:59)
Copyright (c) 1997-2013 The PHP Group
Zend Engine v2.4.0, Copyright (c) 1998-2013 Zend Technologies