Heartbeat website for blood donation
Through a wide variety of mobile applications, we’ve developed a unique visual system.
- Client Princess Nourah Bint Abdul Rahman University
- Date 15 June 2019
- Services Web Application
- Budget $500+
working as Data center Supervisor engineer in biggest Egyptian ISP Over 14 years of experience and journey with Cisco Networking and Security, REDHAT enterprise servers, Microsoft Server, Virtualization, Cloud As support engineer and IT core services instructor. Certifications: RHCSA | AWS | CCNA R&S | CCDA | CCNP R&S | CCDP | JNCDA | JNCIA |JNCIA-DEVOPS | ITIL | MCTS AZURE Certified | MS365| Oracle Cloude engineer | PCNSE | NSE1,2,3| Aviatrix Certified Engineer Contact me : +2 01064960035
With seven years of linux experience, I am a Red Hat instructor and provide outstanding training and consulting.
Having worked as an Azure and AWS instructor for 7 years, I provide top-notch training and consulting services.
let's be connected 🙂 work to create and maintain computer networks that meet the needs of organizations.
Microsoft Solutions , help an organization implement a new business solution or tweak the existing solution.
a flexible and yet highly available network that allows agile application deployment within a site, across sites, and across global data centers
Through a wide variety of mobile applications, we’ve developed a unique visual system.
There are always some stocks, which illusively scale lofty heights in a given time period. However, the good show doesn’t last for these overblown toxic stocks as their current price is not justified by their fundamental strength.
A strategy is a general plan to achieve one or more long-term. labore et dolore magna aliqua.
UI/UX Design, Art Direction, A design is a plan or specification for art. which illusively scale lofty heights.
User experience (UX) design is the process design teams use to create products that provide.
A project specialized in managing blood donations and knowing the nearest places and whether there is availability
One of the purposes of the project is to encourage donors through a rewards system
Through a wide variety of Ansible automation.
Ansible automation system Baased on Redhat OS
Through a wide variety of mobile applications, we’ve developed a unique visual system and strategy that can be applied across the spectrum of available applications.
Most recent Debt/Equity Ratio greater than the median industry average: High debt/equity ratio implies high leverage. High leverage indicates a huge level of repayment that the company has to make in connection with the debt amount.
Thanks Mohamed El Hosseny for providing a comprehensive and insightful learning experience.
Thanks Mohamed El Hosseny for providing a comprehensive and insightful learning experience.
Thanks Mohamed El Hosseny for providing a comprehensive and insightful learning experience.
You plan to deploy the following Azure web apps:
What is the minimum number of app service plans that should be created?
Select only one answer.
I chose (bard)
Correct answer
✅(chatGpt, bing)
You plan to deploy an Azure web app that will have the following settings:
Which setting should you modify?
Select only one answer.
I chose (chatGpt, bard, bing)
Probably correct answer
You plan to deploy an Azure web app that will have the following settings:
Which setting should you modify?
Select only one answer.
(chatGpt, bard, bing)
Probably correct answer
I chose
You have Azure web app named WebApp1.
You need to integrate GitHub as a source code repository for WebApp1.
What should you use?
Select only one answer.
I chose (chatGpt, bard)
Probably correct answer
You plan to create an Azure container instance named container1 that will use a Docker image named Image1.
You need to ensure that container1 has persistent storage.
Which Azure resources should you deploy for the persistent storage?
Select only one answer.
I chose
(chatGpt, bard, bing)
Probably correct answer
You have an Azure container registry that stores an image named Image1 and a Windows Server 2022 Azure virtual machine named VM1.
You need to ensure that you can run Image1 in VM1.
What should you install in VM1?
Select only one answer.
I chose (chatGpt, bard, bing)
Probably correct answer
You have Azure subscription that includes virtual network named VNet1 in West US region.
You plan to deploy following container instances:
Which container instances can be deployed to VNet1?
Select only one answer.
I chose (bard)
(chatGpt)
(bing)
Probably correct answer
answer linkYou have an Azure Storage account named storage1.
You create the following encryption scopes for storage1:
Which storage services can be used with Scope2?
Select only one answer.
I chose (chatGpt, bard)
Probably correct answer
You have an Azure Storage account named storage1 that is configured to use the Hot access tier.
Storage1 has a container named container1 and the lifecycle management rule with following settings:
When will File1 be moved to archive storage?
Select only one answer.
(chatGpt, bard, bing)
Probably correct answer
I chose
You have an Azure subscription that contains the following storage accounts:
Which storage account or storage accounts can you use Lifecycle management?
Select only one answer.
I chose (chatGpt, bard)
Probably correct answer
You have an Azure storage account that contains a blob container named container1.
You need to configure access to container1.
Which authorization types can you use?
Select only one answer.
I chose (chatGpt, bard)
Probably correct answer
You have an Azure subscription that contains a storage account named storage1 and the following virtual machines:
The subnets have the following service endpoints:
Which virtual machines can access storage1.
Select only one answer.
(bing)
I chose (chatGpt)
(bard)
Probably correct answer
You have an Azure subscription that includes the following resources:
Which resource can use ASG1?
Select only one answer.
I chose (chatGpt, bing)
Probably correct answer
(bard)
You have an Azure subscription that contains the following fully peered virtual networks:
What is the minimum number of Azure Bastion hosts that you must deploy?
Select only one answer.
(bing)
Probably correct answer
(bard)
(chatGpt)
answer linkYou have an Azure virtual network named VNET1 that is connected to a network security group (NSG) named NSG1. NSG1 has the following inbound security rules:
What should you change for NSG1?
Select only one answer.
I chose (chatGpt, bard)
Probably correct answer
You have a Recovery Services vault named Vault1 that has soft delete enabled. Vault1 stores backups for the following Azure resources:
Which backups are protected by soft delete?
Select only one answer.
I chose (chatGpt, bing)
Probably correct answer
(bard)
You have a Windows Server Azure virtual machine named VM1.
You need to back up two folders in VM1 by using Azure Backup. The solution should minimize administrative effort.
What should you deploy first?
Select only one answer.
I chose
(bard, bing)
Probably correct answer
(chatGpt)
You have an Azure virtual machine named Computer5 and a Recovery Services vault named Vault5. Computer5 contains the following data disks:
Which data disks can you back up to Vault5?
Select only one answer.
I chose (chatGpt, bing)
Probably correct answer
(bard)
You recently create an Azure virtual machine standard backup policy.
You need to configure a retention period for virtual machine instant recovery snapshots.
What is the maximum number of days that can be set for the retention period?
Select only one answer.
I chose (bing)
Probably correct answer
(chatGpt)
(bard)
You have an Azure subscription.
You plan to run a data warehouse in an Azure virtual machine named VM1. You need to ensure that VM1 is optimized for running a data warehouse.
Which VM type should you use for VM1?
Select only one answer.
I chose (chatGpt, bard, bing)
Probably correct answer
You have an Azure subscription that contains the following resources:
To which virtual network or virtual networks can you connect VM1?
Select only one answer.
I chose (chatGpt, bard)
Probably correct answer
You have an Azure virtual machine named VM1.
VM1 contains the following:
What is preserved after the resize?
Select only one answer.
I chose (chatGpt, bard)
Probably correct answer
You have an Azure subscription and an availability set named AS1 that has 5 update domains.
You deploy 27 virtual machines to AS1.
After a planned update, what is the minimum number of virtual machines that are available?
Select only one answer.
I chose (bard, bing)
Probably correct answer
(chatGpt)
You have a Microsoft Entra tenant named contoso.com that contains a user named Ben Smith.
You configure a Password protection for contoso.com that includes the following Custom banned passwords settings:
Select only one answer.
(bard)
I chose
(chatGpt, bing)
Probably correct answer
You have a Microsoft Entra tenant.
You create a user named Admin1. You need to ensure that Admin1 can perform following tasks:
What Microsoft Entra role should you add to Admin1?
Select only one answer.
(bard)
I chose (chatGpt)
(bing)
Probably correct answer
You have an Azure subscription that contains a user named User1, a resource group named RG1, and a virtual machine named VM1.
You enable a system-assigned managed identity for VM1.
To which identities can you assign the Reports Reader role?
Select only one answer.
I chose (chatGpt, bing)
Probably correct answer
(bard)
You have an Azure web app named Contoso2023.
You add a deployment slot to Contoso2023 named Slot1. You need to be able to perform a deployment slot swap with preview.
What should you modify?
Select only one answer.
I chose (bing)
You have an Azure subscription that includes a virtual network named VNet1.
You plan to create a web app named WebApp1 and deploy it to VNet1. You need to prepare the environment for the planned web app. The solution must minimize costs.
Which app service plan size should you use?
Select only one answer.
I chose (bing)
You have an Azure subscription that includes the following web apps:
From which web apps can you use WebJobs?
Select only one answer.
I chose (bing)
You have an Azure container registry named Registry1.
You create a container image named image1 on a Windows Server container host named Host1. You need to store image1 in Registry1.
Which URL should you use to push image1 from Host1?
Select only one answer.
I chose (bing)
You have an Azure subscription that contains a virtual network named VNET1. VNET1 uses the following address spaces:
VNET1 contains the following subnets:
What should you do first?
Select only one answer.
I chose (bing)
You have an Azure subscription that contains a virtual machine named VM1 and a storage account named storage1.
You need to ensure that VM1 can access storage1 by using the Azure backbone.
What should you configure?
Select only one answer.
I chose (bing)
You have an Azure subscription that includes following resources:
To which two Azure resources can you associate NSG1?
Select all answers that apply.
I chose (bing)
I chose (bing)
You have an Azure subscription that contains the following virtual machines:
Which virtual machine or virtual machines can use file-level restore?
Select only one answer.
I chose (bing)
You have an Azure subscription that includes a virtual machine named VM1.
You need to protect VM1 by using Azure Backup.
Which Azure resource should you create first?
Select only one answer.
I chose (bing)
You have an Azure subscription.
You plan to use fault domains.
From which Azure resource can you configure the fault domains?
Select only one answer.
I chose (bing)
(bing)
You have an Azure subscription named Sub1.
You plan to deploy a virtual machine scale set named VMSS1 in East US region. VMSS1 will have 8 instances.
What is the maximum number of availability zones that VMSS1 can use?
Select only one answer.
I chose (bing)
Your company has multiple departments and one Azure subscription. The user accounts for all employees are in the same Microsoft Entra tenant.
You need to delegate permissions for the users in a single department only.
What should you use to organize the user accounts?
Select only one answer.
I chose (bing)
using playground to create images
Linux file system used to resemble an unorganized town where individuals constructed their houses wherever they pleased. However, in 1994, the Filesystem Hierarchy Standard (FHS) was introduced to bring order to the Linux file system.
Back in 1996 I learned how to install software on my spanking new Linux before really understanding the topography of the filesystem. This turned out to be a problem, not so much for programs, because they would just magically work even though I hadn’t a clue of where the actual executable files landed. The problem was the documentation.
You see, back then, Linux was not the intuitive, user-friendly system it is today. You had to read a lot. You had to know things about the frequency rate of your CRT monitor and the ins and outs of your noisy dial-up modem, among hundreds of other things. I soon realized I would need to spend some time getting a handle on how the directories were organized and what all their exotic names like /etc (not for miscellaneous files), /usr (not for user files), and /bin (not a trash can) meant.
This tutorial will help you get up to speed faster than I did.
It makes sense to explore the Linux filesystem from a terminal window, not because the author is a grumpy old man and resents new kids and their pretty graphical tools — although there is some truth to that — but because a terminal, despite being text-only, has better tools to show the map of Linux’s directory tree.
In fact, that is the name of the first tool you’ll install to help you on the way: tree. If you are using Ubuntu or Debian, you can do:sudo apt install tree
On Red Hat or Fedora, do:sudo dnf install tree
For SUSE/openSUSE use zypper
:sudo zypper install tree
For Arch-like distros (Manjaro, Antergos, etc.) use:sudo pacman -S tree
… and so on.
Once installed, stay in your terminal window and run tree like this:tree /
The /
in the instruction above refers to the root directory. The root directory is the one from which all other directories branch off from. When you run tree
and tell it to start with /, you will see the whole directory tree, all directories and all the subdirectories in the whole system, with all their files, fly by.
If you have been using your system for some time, this may take a while, because, even if you haven’t generated many files yourself, a Linux system and its apps are always logging, cacheing, and storing temporal files. The number of entries in the file system can grow quite quickly.
Don’t feel overwhelmed, though. Instead, try this:tree -L 1 /
And you should see what is shown in Figure 1.
The instruction above can be translated as “show me only the 1st Level of the directory tree starting at / (root)“. The -L
option tells tree
how many levels down you want to see.
Most Linux distributions will show you the same or a very similar layout to what you can see in the image above. This means that even if you feel confused now, master this, and you will have a handle on most, if not all, Linux installations in the whole wide world.
To get you started on the road to mastery, let’s look at what each directory is used for. While we go through each, you can peek at their contents using ls.
From top to bottom, the directories you are seeing are as follows.
/bin is the directory that contains binaries, that is, some of the applications and programs you can run. You will find the ls program mentioned above in this directory, as well as other basic tools for making and removing files and directories, moving them around, and so on. There are more bin directories in other parts of the file system tree, but we’ll be talking about those in a minute.
The /boot directory contains files required for starting your system. Do I have to say this? Okay, I’ll say it: DO NOT TOUCH!. If you mess up one of the files in here, you may not be able to run your Linux and it is a pain to repair. On the other hand, don’t worry too much about destroying your system by accident: you have to have superuser privileges to do that.
/dev contains device files. Many of these are generated at boot time or even on the fly. For example, if you plug in a new webcam or a USB pendrive into your machine, a new device entry will automagically pop up here.
/etc is the directory where names start to get confusing. /etc gets its name from the earliest Unixes and it was literally “et cetera” because it was the dumping ground for system files administrators were not sure where else to put.
Nowadays, it would be more appropriate to say that etc stands for “Everything to configure,” as it contains most, if not all system-wide configuration files. For example, the files that contain the name of your system, the users and their passwords, the names of machines on your network and when and where the partitions on your hard disks should be mounted are all in here. Again, if you are new to Linux, it may be best if you don’t touch too much in here until you have a better understanding of how things work.
/home is where you will find your users’ personal directories. In my case, under /home there are two directories: /home/paul, which contains all my stuff; and /home/guest, in case anybody needs to borrow my computer.
/lib is where libraries live. Libraries are files containing code that your applications can use. They contain snippets of code that applications use to draw windows on your desktop, control peripherals, or send files to your hard disk.
There are more lib directories scattered around the file system, but this one, the one hanging directly off of / is special in that, among other things, it contains the all-important kernel modules. The kernel modules are drivers that make things like your video card, sound card, WiFi, printer, and so on, work.
The /media directory is where external storage will be automatically mounted when you plug it in and try to access it. As opposed to most of the other items on this list, /media does not hail back to 1970s, mainly because inserting and detecting storage (pendrives, USB hard disks, SD cards, external SSDs, etc) on the fly, while a computer is running, is a relatively new thing.
The /mnt directory, however, is a bit of remnant from days gone by. This is where you would manually mount storage devices or partitions. It is not used very often nowadays.
The /opt directory is often where software you compile (that is, you build yourself from source code and do not install from your distribution repositories) sometimes lands. Applications will end up in the /opt/bin directory and libraries in the /opt/lib directory.
A slight digression: another place where applications and libraries end up in is /usr/local, When software gets installed here, there will also be /usr/local/bin and /usr/local/lib directories. What determines which software goes where is how the developers have configured the files that control the compilation and installation process.
/proc, like /dev is a virtual directory. It contains information about your computer, such as information about your CPU and the kernel your Linux system is running. As with /dev, the files and directories are generated when your computer starts, or on the fly, as your system is running and things change.
/root is the home directory of the superuser (also known as the “Administrator”) of the system. It is separate from the rest of the users’ home directories BECAUSE YOU ARE NOT MEANT TO TOUCH IT. Keep your own stuff in your own directories, people.
/run is another new directory. System processes use it to store temporary data for their own nefarious reasons. This is another one of those DO NOT TOUCH folders.
/sbin is similar to /bin, but it contains applications that only the superuser (hence the initial s) will need. You can use these applications with the sudo
command that temporarily concedes you superuser powers on many distributions. /sbin typically contains tools that can install stuff, delete stuff and format stuff. As you can imagine, some of these instructions are lethal if you use them improperly, so handle with care.
The /usr directory was where users’ home directories were originally kept back in the early days of UNIX. However, now /home is where users kept their stuff as we saw above. These days, /usr contains a mish-mash of directories which in turn contain applications, libraries, documentation, wallpapers, icons and a long list of other stuff that need to be shared by applications and services.
You will also find bin, sbin and lib directories in /usr. What is the difference with their root-hanging cousins? Not much nowadays. Originally, the /bin directory (hanging off of root) would contain very basic commands, like ls
, mv
and rm
; the kind of commands that would come pre-installed in all UNIX/Linux installations, the bare minimum to run and maintain a system. /usr/bin on the other hand would contain stuff the users would install and run to use the system as a work station, things like word processors, web browsers, and other apps.
But many modern Linux distributions just put everything into /usr/bin and have /bin point to /usr/bin just in case erasing it completely would break something. So, while Debian, Ubuntu and Mint still keep /bin and /usr/bin (and /sbin and /usr/sbin) separate; others, like Arch and its derivatives just have one “real” directory for binaries, /usr/bin, and the rest or *bins are “fake” directories that point to /usr/bin.
The /srv directory contains data for servers. If you are running a web server from your Linux box, your HTML files for your sites would go into /srv/http (or /srv/www). If you were running an FTP server, your files would go into /srv/ftp.
/sys is another virtual directory like /proc and /dev and also contains information from devices connected to your computer.
In some cases you can also manipulate those devices. I can, for example, change the brightness of the screen of my laptop by modifying the value stored in the /sys/devices/pci0000:00/0000:00:02.0/drm/card1/card1-eDP-1/intel_backlight/brightness file (on your machine you will probably have a different file). But to do that you have to become superuser. The reason for that is, as with so many other virtual directories, messing with the contents and files in /sys can be dangerous and you can trash your system. DO NOT TOUCH until you are sure you know what you are doing.
/tmp contains temporary files, usually placed there by applications that you are running. The files and directories often (not always) contain data that an application doesn’t need right now, but may need later on.
You can also use /tmp to store your own temporary files — /tmp is one of the few directories hanging off / that you can actually interact with without becoming superuser.
/var was originally given its name because its contents was deemed variable, in that it changed frequently. Today it is a bit of a misnomer because there are many other directories that also contain data that changes frequently, especially the virtual directories we saw above.
Be that as it may, /var contains things like logs in the /var/log subdirectories. Logs are files that register events that happen on the system. If something fails in the kernel, it will be logged in a file in /var/log; if someone tries to break into your computer from outside, your firewall will also log the attempt here. It also contains spools for tasks. These “tasks” can be the jobs you send to a shared printer when you have to wait because another user is printing a long document, or mail that is waiting to be delivered to users on the system.
Your system may have some more directories we haven’t mentioned above. In the screenshot, for example, there is a /snap directory. That’s because the shot was captured on an Ubuntu system. Ubuntu has recently incorporated snap packages as a way of distributing software. The /snap directory contains all the files and the software installed from snaps.
Introduction
Ansible is a very powerful open-source IT automation tool. It is known as a configuration management tool. Ansible is written in Python language, so it requires Python to be available on the machine. We can use Ansible to automate software installation, software configuration, configuration management, etc.
To get a quick high-level understanding of Ansible, please review the article below.
To use Ansible for your automation purpose you would need a machine where Ansible needs to be installed and this is called ansible-host or ansible-controller. And you would need other machines (remote or target machines) where Ansible will perform the tasks.
There are multiple ways to install Ansible in RHEL. Below are the two most used methods.
Ansible installation using RHEL package manager.
Ansible installation using the pip module of Python.
In this article, we will see how to install Ansible using the RHEL package manager in a step-by-step manner.
As of April 2023, the latest version of Ansible is 2.13.x (ansible core). We will be installing the same.
We will be using dnf to install Ansible. (dnf is the package management utility for RHEL, Fedora, and Centos).
# Run the below command to update the RHEL OS.
sudo dnf update -y
# Check whether Python is installed or not. RHEL 8 comes with python3. So, we don’t need to install Python.python3 -V
# If Python is not installed, then run the below command to install it.
sudo dnf install python3
# List the available repos that include ansible-core packages
sudo dnf list ansible-core
OR
sudo dnf info ansible-core
In the output of the above, we will see the repo name. We need to enable that repo.
# Enable the repo that includes the ansible-core package.
sudo subscription-manager repos –enable <repo name>
# Run the below commands to install Ansible
sudo dnf install ansible -y
# Finally, we can check the version of Ansible.
ansible –version
Apart from the above method of Ansible installation, we can install Ansible by following the official documentation of Ansible
https://docs.ansible.com/ansible/latest/installation_guide/intro_installation.html
Red Hat Enterprise Linux (RHEL) 9.3 is a major release of the enterprise Linux operating system from Red Hat, which was released on November 8, 2023 and comes with a number of new features and enhancements.
RHEL 9.3 is a third release in the Red Hat family since the acquisition of Red Hat by IBM in July 2019, and the third major version since the deprecation of the CentOS Project in favor of CentOS Stream which is now the upstream of RHEL.
RHEL 9.3 is the latest major version of RHEL and comes with Kernel 5.14 and a host of new software packages and tons of enhancements. It places an emphasis on security, stability, flexibility, and reliability.
Key Highlights of RHEL 9.3
At a glance, here are the major highlights of RHEL 9.3.
New Software Versions
RHEL 9.3 ships with new versions of software including Python 3.11. Node.JS 18, GCC 12, Perl 5.36, Ruby 3.1, PHP 8.2, and many more.
The Red Hat Developer Subscription is a no-cost offering of the Red Hat Developer program that is tailored for individual developers who want to reap the full benefits of Red Hat Enterprise Linux.
It gives developers access to all versions of Red Hat Enterprise Linux among other Red Hat products such as add-ons, software updates, and security errata.
Before anything else, make sure that you have an active Red Hat account. If you don’t have an account yet, navigate to the Red Hat Customer Portal and click on the ‘Register’ button and fill in your details to create a Red Hat account.
Once you have created a Red Hat account, you are all set to start downloading RHEL 9.3. To download Red Hat Enterprise Linux 9.3 at absolutely no cost, head over to the Red Hat Developer Portal and sign in using your account credentials.
Next, navigate to the RHEL 9.3 download page and click on the download button shown below.
Shortly after, the download of the RHEL 9.3 ISO image will begin. You should see a confirmation message informing you that the download of the RHEL 9 is underway.
The download size of the ISO image is about 8GB. As such, ensure that you have a high-speed internet connection for a faster download.
With the ISO image downloaded, grab a 16 GB USB drive and create a bootable USB drive using application such as UnetBootIn or dd command to make it bootable.
With your bootable medium at hand, plug it into the PC that you wish to install RHEL 9.3 on and reboot the system. Remember to configure the BIOS to have the bootable medium first in the boot priority so that the system boots into the medium first.
Also, ensure that you have a high-speed internet connection that will come in handy during the installation.
When the system reboots, you will get a black screen with the following options. To begin the installation, press ENTER on the first option ‘Install Red Hat Enterprise Linux 9.3’.
Shortly afterward, the following boot messages will be splashed on the screen. No action will be required so, just patiently wait as the installer gets ready to install RHEL.
After a few seconds, the graphical wizard for installing Red Hat Enterprise Linux 9.3. In the first step, select your preferred language and click ‘Continue’.
The next step presents you with an installation summary that is segmented into four sections:
We will only focus on three items that are mandatory before proceeding with the installation – Installation Destination, Root Account, and Regular Account creation.
To set up partitioning, click on ‘Installation Destination’ under SYSTEM. On the ‘Installation Destination’ page, ensure that you have selected the ‘Automatic’ option if you wish the wizard to automatically partition the hard drive. Otherwise, select ‘Custom’ to manually create the partitions.
In addition, ensure that you have selected the hard disk on your PC. Then click ‘Done’.
This takes you to the ‘Manual Partitioning’ window. By default, the LVM partitioning scheme is selected, which is just fine.
To start creating the partitions, click on the plus [ + ]
sign.
For demonstration purposes, we will create the following partitions./boot – 500MB /home – 20GB /root – 15GB swap – 8GB
First, we will specify the boot option.
From the partition table below, you can see that the boot partition has been created.
Repeat the same steps and create the /home, /root, and swap mount points.
Our complete partition table is shown below. To save the changes, click on ‘Done’.
Then click ‘Accept Changes’ on the pop-up that appears.
Next, we are going to configure user settings, starting off with the Root password. So, click on the ‘Root Password’ icon.
Unlock the Root account by providing a root password and confirming it. Then click ‘Done’.
Next, create a regular login user by clicking on ‘User creation’.
Provide the username and password details of the user and click ‘Done’.
We are now all set to proceed with the installation. So, click on ‘Begin Installation’.
The Wizard will download all the required packages from the RedHat ISO image and save them to the hard drive. This is a process that takes quite a bit of time, and this is an ideal moment to take a break as the installation progresses.
Once the installation is complete, you will be required to reboot your system so that you can log in to your fresh RHEL 9 installation.
So, click the ‘Reboot System’ button.
Once the system reboots, select the first entry on the GRUB menu that points to Red Hat Enterprise Linux 9.0.
Shortly afterward, provide your password on the login screen and press ENTER.
Once logged in, you can opt to take a tour of the freshly installed RHEL 9 or decline and go straight to the Desktop.
Finally, you will see the GNOME 42 desktop environment which has received a facelift and looks quite elegant.
Cisco ACI is an enterprise-class, software-defined networking (SDN) solution that provides complete control of the data center network. Using a policy-based approach, Cisco ACI delivers security, performance, and scalability for today’s demanding applications.
Cisco ACI is part of the broader Cisco SDN portfolio, which also includes Nexus switches and Application Centric Infrastructure (ACI) controllers. If you are looking for a way to improve your data center network, Cisco ACI may be the answer. In this article, you can find out more about Cisco ACI, including how it works, its benefits, and what it is used for.
Cisco ACI is a software-defined networking (SDN) technology offering from Cisco that allows for centralized application policy enforcement across a data center network. It is designed to simplify and automate the creation, management, and enforcement of network security policies.
ACI provides uniform policy definition and application across physical and virtual resources, as well as bare-metal server deployments. This can be done through an easy-to-use graphical user interface or programmatically through APIs. The latter option makes it possible to integrate ACI into your existing DevOps processes.
With Cisco ACI, you can apply consistent security policies across your data center regardless of the underlying infrastructure. The result is increased agility and reduced operational costs. In addition, ACI provides built-in micro-segmentation capabilities that can help you improve your data center security posture.
Cisco ACI is based on the concept of an application profile. An application profile defines the set of network and security policies that should be applied to a particular application or workload. Application profiles are created using the Cisco Application Policy Infrastructure Controller (APIC).
The APIC is a centralized management system that gives you visibility into and control over the network resources in your data center. It also provides policy enforcement and orchestration capabilities. The APIC communicates with the network devices in your data center through an out-of-band management network.
Cisco ACI uses a leaf-spine architecture. The leaf nodes are Top-of-Rack (ToR) switches that connect to server endpoints. The spine nodes are core switches that connect the leaf nodes to each other.
Cisco ACI supports both physical and virtualized leaf nodes. Physical leaves can be either Cisco Nexus 9000 Series Switches or Cisco ASA 1000V Cloud Firewalls. Virtualized leaves are provided by the Cisco Avi Vantage platform.
SDN stands for software-defined networking. It’s a network architecture that uses programmable interfaces to enable more flexible and dynamic network control.
In traditional networks, the control plane is physically separate from the data plane. This means that the traffic flow is dictated by the hardware, which can be inflexible and difficult to change. In an SDN, the control plane is implemented in software, giving it more flexibility.
This separation of duties can make it easier to manage complex networks, because you can change the configuration of the network without having to physically reconfigure the devices. It also makes it possible to dynamically adjust traffic flow according to changing needs.
SDN controllers use protocols like OpenFlow to communicate with devices in the network. Using these protocols allows SDN to centrally control the flow of traffic, making it possible to implement policies that can optimize performance or reduce costs.
SDN is still a relatively new technology, and there are a number of different approaches to implementing it. But the basic idea is to use software to make networks more flexible and easier to manage.
In the most basic sense, ACI (Application Centric Infrastructure) is a data center network architecture that enables applications to be deployed and managed in a more flexible and efficient manner. ACI provides a single point of control for both physical and virtual networks, allowing for greater transparency and easier management of complex application environments.
ACI is designed to increase agility and efficiency in the data center by automating many of the tasks that have traditionally been manual or error-prone. For example, ACI can automatically provision new applications on the infrastructure, identify and correct errors in application configurations, and dynamically adapt network resources to changing application needs. By simplifying these tasks, ACI can help reduce deployment times and improve overall efficiency in the data center.
In addition to increasing agility and efficiency, ACI also provides improved security and compliance capabilities. ACI includes features such as built-in firewalls and intrusion detection/prevention systems, which can help protect data center assets from malicious attacks. ACI also provides granular visibility into application traffic, allowing administrators to quickly identify and respond to potential security threats.
Overall, ACI is a data center network architecture that enables applications to be deployed and managed in a more flexible and efficient manner. ACI can help improve agility, efficiency, security, and compliance in the data center.
Cisco ACI is an application-centric infrastructure that enables you to build your data center network around the needs of your applications. ACI uses a centralized policy model to automate and simplify network configuration, deployment, and management. This architecture decouples the network control plane from the data forwarding plane, allowing for greater flexibility, scalability, and manageability.
ACI consists of three key components: the Application Policy Infrastructure Controller (APIC), the leaf switches, and the spine switches. The APIC is a centralized controller that manages all aspects of the ACI fabric. The leaf switches are ToR switches that provide connectivity between servers and external networks. The spine switches are aggregate Layer 3 switches that provide high-bandwidth connectivity between leaf switches.
The APIC provides a single point of control and management for the entire ACI fabric. It uses an open, standards-based application programming interface (API) to expose the ACI policy model to external applications and orchestration tools. The APIC also provides an intuitive web-based user interface (UI) for manual configuration and monitoring of the ACI fabric.
The leaf switches are ToR switches that provide connectivity between servers and external networks. Leaf switches are fully programmable and support all Layer 2 and Layer 3 protocols. In addition, leaf switches also support quality of service (QoS), security features, and virtualization capabilities.
The spine switches are aggregate Layer 3 switches that provide high-bandwidth connectivity between leaf switches. Spine switches are also fully programmable and support all Layer 2 and Layer 3 protocols.
Cisco ACI is a software-defined networking (SDN) technology that enables virtualization of the network infrastructure. Cisco ACI offers a number of benefits, including improved agility, reduced complexity, and enhanced security.
Cisco ACI provides numerous benefits that can help organizations improve their agility, reduce complexity, and enhance security. When considering an SDN solution, Cisco ACI should be high on the list of choices.
Cisco ACI enables network administrators to centrally manage and orchestrate network resources through a graphical user interface (GUI). Cisco ACI can be used for a variety of purposes, including the following:
Cisco ACI integrates with other products using a variety of methods to provide customers with the ability to create a best-of-breed solution.
Cisco ACI provides customers with the ability to create a best-of-breed solution by integrating with other products using open APIs, jointly certified solutions, and service chaining. This advantage gives customers the flexibility to choose the products that best meet their needs while still taking advantage of Cisco ACI’s industry-leading features and performance.
With the release of Cisco ACI, the company is looking to solidify its position as a market leader in data center networking. While SDN has been around for a few years now, ACI represents a more holistic and comprehensive approach to SDN that takes into account all aspects of networking. So, ACI is an important tool for companies looking to move to the cloud or build out their data center infrastructure. If you’re curious about how Cisco ACI can benefit your business, reach out and we’ll be happy to discuss it with you.
I am available for freelance work. Connect with me via and call in to my account.
Phone: +201064960035 // +966558652462 Email: Mohamed.hosseny@outlook.com