When the ftStorage array was originally conceived the thinking was that when it was necessary to configure something on the array administrators would use either the command line interface from an OpenVOS login session or the OpenVOS console PC to access the GUI interface.
The SDLMUX software combines two network adapters into one IP interface, providing a fail over capability if the link on the active adapter goes down or the adapter fails. Once set up it requires virtually no administration but there are some things you should be aware of.
“The application has been running fine for years, last week the network was upgraded and we moved from 100 mbps to gigabit. Now the last half of the data in some messages is garbage. The network people swear it is not the network – but that is the only thing that changed.”
You can accomplish many programming tasks in VOS and OpenVOS without knowing the details of how the operating system manages the user address space. But it is fun to know the details, and sometimes to accomplish a task you need to adjust the default configuration. This post is an introduction to the VOS user address space.
After your VOS or OpenVOS module has been up for a while (a few months or more), you may notice that some of the metering values displayed by various analyze_system requests have gone negative, or some of the percentages are way off.
The other day while working an issue at a customer site I noticed and happened to mention that there were two sets of application processes running, one set running under some generic name like Production.
Your application is reporting problems reaching the back end database server at 172.16.1.116 or maybe you are about to set up a new application and you want to make sure it can reach the back end database server.
SFTP is the FTP subsystem that is part of SSH, it allows you to do encrypted file transfers. In the past week I have had 2 issues about SFTP not properly transferring files. In one case OpenVOS was the source of the file and in the other case OpenVOS was receiving the file.
Back in May of 2009 I wrote about securing telnetd so that only the RSN process has the ability to use it (Telnet can’t live with it, can’t live without it).
Many times the only way, or at least the fastest way, to resolve network communications problems is by collecting a trace of the communication and sending it to an expert for analysis.