spk-logo-white-text-short2
0%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Infrastructure

PTC Integrity – Risk Management Demo (out of the box)

PTC Integrity – Risk Management Demo (out of the box)

Cras suscipit orci at augue volutpat, ut luctus sapien ultricies. Nam vitae dolor sit amet quam pharetra scelerisque. Donec efficitur lacus felis, at ullamcorper enim molestie id. Aliquam faucibus semper neque et scelerisque. In ultrices iaculis sem metus.

How to monitor Windows servers using Nagios and NSClient

How to monitor Windows servers using Nagios and NSClient

One of the best monitoring software packages available for system administrators is Nagios. It's free, open source, has a large community of developers and users for support and can be relied upon to provide outstanding monitoring for mission critical devices. As part...

Puppet Quickstart Guide (Part 1)

Puppet Quickstart Guide (Part 1)

Puppet is the most well-known configuration management tool in the DevOps world and used by systems administrators to centrally manage large numbers of servers and computer systems. There are several Puppet quickstart guides online. However, these guides are...

Puppet Quick Setup Guide (Part 2) – How to Configure Puppet Master

Puppet Quick Setup Guide (Part 2) – How to Configure Puppet Master

Recently I explained how to easily set up communication between a Puppet client and master. In this follow up post I’ll outline the steps involved in configuring the Puppet master to control the client machine. Starting out with Puppet does not have to be a...

Reverse Proxy Configurations

Reverse Proxy Configurations

Now it's time to look at some of the server side configurations. The first step is to configure reverse proxy for the HTTP services. These services live on hosts that sit in the DMZ. A proxy is very simple to configure and allows a lot of flexibility to grow over time...

How Docker Helps Your DevOps Infrastructure

How Docker Helps Your DevOps Infrastructure

These days, everything is moving to virtual. Virtual reality, virtual machines, and with Docker, virtual filesystems. Actually, Docker is not virtual, it's very real and is a very convenient way to package an entire filesystem and run it on any supported system. Why...

Creating IBM Rational 7.0.x Patch Install Areas

Creating IBM Rational 7.0.x Patch Install Areas

This week we take up the topic of creating IBM Rational patch install areas for pre-7.1 versions. As we have discussed in previous weeks, there are a number of tools in Rational 7.1 and beyond that introduce much automation into patch management. However, there are...

Using Rational Response Files to Install ClearCase and ClearQuest

Using Rational Response Files to Install ClearCase and ClearQuest

This week we continue on the topic of installing using IBM Installation Manager.  But with a bit of a difference.  Instead of bringing up the IM install GUI and using it to conduct the installation, we will take a step toward greater installation automation and create...

Using Unix and Windows Groups with ClearCase

Using Unix and Windows Groups with ClearCase

In this week’s blog entry, we want to have a look at how Unix and Windows groups work together in a mixed Unix/Windows environment. This topic can sometimes be a bit confusing, and here we hope to contribute to clarifying the subject. Many companies and development...

How To Add More Disk Space To Your Redhat Server Without Reformatting

How To Add More Disk Space To Your Redhat Server Without Reformatting

(Originally published in 2012, updated January 2022.) One of the common tasks for any system administrator is managing disk space on a server. A common question is how to increase disk space on a linux system. I won't go into a boring lecture on why managing disk...

Metrics, Metrics, Metrics in PTC Integrity: Part 4

Metrics, Metrics, Metrics in PTC Integrity: Part 4

In the three previous rounds of this Metrics, Metrics, Metrics series,  I discussed gathering metrics, and building Reports and Charts in PTC Integrity Lifecycle Manager. In this article, we will discuss how you can take various charts, reports and queries and...

Leveraging Group Policy to Setup Wireless Access

Leveraging Group Policy to Setup Wireless Access

In my last post, I introduced Clonezilla as an easy way to deploy Windows-based workstations into a corporate environment. But once a workstation enters the corporate network, what sort of policy applies to it? What sort of actions can a user take on their...