Latest Server related questions

Score: 0
Usama avatar
How to resize one partition with another free one uder different device name without unmounting the first one?
jp flag

I want to extend one partition on sda with another on different dev sdb

the below image shows the distribution of the partitions

What I'm looking for is to let sda5 resized by sdb1? How can I do that without mounting sda5?

Score: 0
How to ensure output from "tee" is shown when used in a script run under systemd
vn flag

I have a script that I'm running under systemd which has some debug logs that I'd like to send to both stdout (which should end up in the system journal, viewable with journalctl) as well as to a log file on my filesystem.

Typically I'd reach for tee to accomplish this (write to stdout and files), and it works fine when I run the script on its own (I see all my logs on my console as well as in my  ...

Score: 0
Mr.Holub avatar
Docker node gets down after promoted from worker to manager
br flag

Docker swarm consists of 3 nodes:

ID                            HOSTNAME          STATUS    AVAILABILITY   MANAGER STATUS   ENGINE VERSION
ec9gxe01ofk38xb3o6hg8xccv     docker-worker01   Ready     Active                          20.10.9
e9eoqfjqgfoj5i7bp83dqoyn6     docker-worker02   Ready     Active                          20.10.9
nbvdgqwbw03m7huj0cscw7whc *   server03          Ready     Active   ...
Score: 0
miguelmorin avatar
How to avoid emails sent to Google's deep web crawler
jp flag

My website has an area restricted to users who sign up with a valid email. I have got requests with bogus emails, and I want to avoid sending emails to non-existent addresses lest they increase the bounce rate and hurt my sending reputation.

The emails are:

kwqchvznypecdv@hnwbkfod.my
kwqchvzny.pecdv@hnwbk.fod
kWQcHVzn%40ypEcDvh.NwB

The last one has %40, the HTML entity for @. The emails are truncat ...

Score: 0
Hide nginx from nmap scan
sb flag

When I run a nmap -sV scan agains my server, the port 443 is exposed as nginx.

PORT      STATE  SERVICE       VERSION
443/tcp   open   ssl/http      nginx

I want to hide this information. I tried clearing the Server header with more_clear_headers 'Server'. Even though the 'Server' header is gone, now nmap reports this port as nginx (reverse proxy)

PORT      STATE  SERVICE       VERSION
443/tcp   op ...
Score: 0
Supermicro - XFS (snumbd6d): log I/O error -5
br flag

So, We have a supermicro server with the next hardware configuration:

CentOS 7 Softraid (because this supermicro configuration didn't support hardware raid..) / Partition is RAID 10 and the rest one is RAID 1

CPU: 2x AMD EPYC 7402 RAM: 512Gb DDR4 (16x 32Gb) 10x 2TB Intel SSD DC P4510 NVMe.

This server is a shared hosting one with CloudLinux, cPanel, etc.

Every 2 days, we receive the following error in the ...

Score: 0
Disabling weak cypher suites in apache
in flag

I want to disable the following weak cypher suites in my apache server:

List of ciphers

This thread explains how to do it: Disable TLS cipher suites

However, my ssllabs report shows that many weak cyphers are still supported. I tried to disabled them by example using :!weak:!medium:![weak_algo_name] without success.

This is my current relevant ssl.conf:

SSLProtocol all -SSLv3 -SSLv2 -TLSv1 -TLSv1.1

 ...
Score: 0
Benjamin Peikes avatar
What Performance Counter is closest to watching the "In Use" memory stat shown in Task Manager?
kr flag

I'm trying to collect usage on how much memory is being used on our Windows servers using AWS CloudWatch Agent. In order to do this, I have to specify which performance counters to collect. I cannot find a Performance Counter that appears to be the same as "In Use" under the Memory section in Task Manager. What am I missing here?

Score: -1
Why fresh installed Windows 10 VM generates 4624/4625 whereas Audit account logon events is set to "No auditing" in Audit Policy
ua flag

All is in the title. By the way, each policies are set to "No auditing" in Audit Policy by default but we still get events in the Event Viewer. I don't understand how.

Score: 0
donmelchior avatar
How to distinguish WinRM legitimate requests from suspicious ones?
ai flag

I have a WinRM setup in a domain environment using Kerberos authentication. I recently performed a routine network capture with WireShark and I was surprised to see some WinRM POST requests (on port 5985) originating from a server where no end-user has initiated such request. On both the source and target server WinRM is activated:

xxx 2021-xx-xx xx:xx:xx,xxxxxx  <source ip> <dest ip>   ...
Score: 0
How can I get my shell to not tell me every time a job starts or stops?
br flag
bk.

I often run programs in parallel via the shell.

generate_some_info (){
    if [ $i -eq 4 ]; then echo "Here is some useful info." ; fi
    if [ $i -eq 7 ]; then ls --errorx; fi
}

for i in {1..10}; do
   generate_some_info&
done

Program output I'm trying to track is hard to see because the server notifies me every time a job starts or stops.

[2] 2052
[3] 2053
[2]  - done       generate_some_i ...
Score: 0
Emma92 avatar
Sectigo is not trusted in Squid
in flag

I have Squid (version 6) with SSL bump. Most sites are trusted but some of them are not.

I get the error message: The following error was encountered while trying to retrieve the URL:

Failed to establish a secure connection to [unknown]

The system returned:

[No Error] (TLS code: SQUID_TLS_ERR_CONNECT+TLS_IO_ERR=1)

Failed to establish a secure connection: [No Error]

This proxy and the remote host f ...
Score: 1
Bender the Greatest avatar
Run script in Windows Azure VM after launch during packer build to configure WinRM and the firewall
sm flag

Background: Apparently Packer has major issues configuring WinRM on Azure VMs created from the Microsoft Windows Server publisher. This is only one of the several issues and threads I've found on this and it dates back several years. Because of this I'm unable to connect to an instance with Packer in order to provision and prepare our own Windows images for use within our company. I've tried alterin ...

Score: 0
Inglebard avatar
is it safe to run GlusterFS node inside Docker?
in flag

I have multiple Synology NAS and I would like to have a HA storage. I already use Synology app called "Synology High Availability" which works well, but require specific hardware.

I would like to test something else, unfortunately packages installations are restricted.

Because some NAS can use Docker and, as describe in the doc, GlusterFS require at least (2 CPU’s, 4GB of RAM each, 1 Gigabit netwo ...

Score: 0
Linux/Android devices connected by WiFi require iptables to add NEW state in FORWARD chain for external interface to connect to internet
br flag

Iptables rule for external interface (ens33 has a public IP):

iptables -A FORWARD -i ens33 -m state --state ESTABLISHED,RELATED -j ACCEPT

allows access to internet for all computers connected to wired LAN and Windows laptops connected by a wireless Access Point. But Android smartphones and Linux laptops connected by the same WiFi AP have a problem "connected, but no internet" - they have access to all ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.