Currently Viewing: How to Guide

One of the problems with managing a fleet of Linux servers is that security updates and patches seem to be released in an almost continuous stream.

A VPN, or Virtual Private Network, is a commonly used method to create a secure network connection between computers. In most usage scenarios a client computer will connect to a server. Once connected, all or some of the network traffic from the client computer may be encrypted, and is sent to the server.

For those who haven’t been following this series and have started at part 3, in the first part of this series we looked at what database replication is and why it could be useful, as well as starting the configuration of our MySQL master server. In part 2, we prepared our master server for replication and backed up the databases we wished to replicate. Today we’ll be configuring the slave server to replicate the databases from the master.

In our previous article, we looked at what master-slave replication and master-master replication are and how they can be used to scale your database usage as your website popularity grows. We then began configuring a MySQL server to act as a master in a replication group.

One of the challenges when running a popular website or service is that eventually the software will outgrow the abilities of a single server to manage everything.

When managing Linux servers, the Secure SHell (SSH) is the most commonly used tool for connecting to remote servers to do this.

Welcome to the second part of our look through the various file management commands for the Linux command line. In the previous article, we looked over changing our working directory, listing the contents of a directory and copying files or directories to somewhere else. In this part we’ll look over a few other commands.

Working with files and directories can mean lots of time spent using the Linux command line. In this article we’ll have a look over a number of the commonly used commands for working with files and directories.