Skip to main content

Posts

initramfs" file is deleted or corrupted on your RHEL or CentOS 7

Initrd/Initramfs image provides the capability to load a RAM disk by the boot loader. This RAM disk can then be mounted as the root filesystem and programs can be run from it. Afterwards, a new root file system can be mounted from a different device. The previous root filesystem which was mounted from initrd/initramfs is then moved to a directory and can be subsequently unmounted. Their are chances that either you might have accidentally deleted "initramfs" file from the /boot partition or it is corrupted due to some reason.  Then boot process will get interrupted and you will see below error: error: file '/initramfs-3.10.0-957.el7.x86_64.img' not found. Good news is you can still recover this "initramfs" by following below steps: Step 1 :  Mount RHEL or CentOS 7 ISO image on your physical server and boot from it. In case you are using HPE Prolient server you can mount this ISO image on iLO, if this is virtual environment then mount it accordingly and reboot...
Recent posts

nw commands

troubleshoot commands in Linux.   1. ifconfig ifconfig (interface configurator) command   is use to initialize an interface, assign IP  Address to interface and enable or disable  interface on demand. With this command  you can view IP Address and Hardware / MAC   address assign to interface and also MTU (Maximum transmission unit) size. # ifconfig   eth0       Link encap:EthernetHWaddr 00:0C:29:28:FD:4C inet addr:192.168.50.2   Bcast:192.168.50.255   Mask:255.255.255.0           inet6 addr: fe80::20c:29ff:fe28:fd4c/64 Scope:Link           UP BROADCAST RUNNING MULTICAST   MTU:1500   Metric:1           RX packets:6093 errors:0 dropped:0 overruns:0 frame:0  ...

remote commands telnet ssh

Linux/Unix SSH, Telnet Remote Commands Comparison Chart Basis  Telnet SSH Security Less secured Highly secured port  23 22 Data format Telnet sends the  data  in plain text. Encrypted format is used to send data and also uses a secure channel. Authentication No privileges are  provided for users authentication. Uses public  key encryption for authentication. Suitability of  network Private networks  are recommended. Suitable for  Public networks. Vulnerabilities Vulnerable to  security attacks. SSH has  overcome many  security  issues of telnet. Bandwidth  Usage Low H igh Rlogin: SSH traffic is encrypted while Rlogin traffic is not SSH authenticates the user while Rlogin does not SSH can be used for automation while Rlogin cannot Rlogin is no longer being...
# # #