Latest Server related questions

Score: 0
vrms avatar
ansible - how to get over "conflicting action statements" error?
de flag

I have an Ansible playbook for creating and resizing logical Volumes

# playbook lvol.yml
- hosts: step
  tasks:
  - name: 'create /dev/sdb1 -> 20GB (of 35GB)'
    community.general.parted:
    device: /dev/sdb
    number: 1
    state: present
#    fs_type: ext4


  - name: "resize vgsys by /dev/sdb1"
    community.general.lvg:
    vg: vgsys
    pvs: /dev/sdb1

  - name: "extend lv 'name' to 10GB  ...
Score: 0
PRTG shows error regarding WSUS, i can't seem to find the reason
kr flag

We are using PRTG to monitor our network, and recently the WSUS probe on one of our servers started displaying an error saying

"File C:\Program Files\Update Services\Api\Microsoft.Update.Services.Administration.dll could not be found. The WSUS admin console is not correctly installed on hte probe device"

However, when I look for the file mentioned in the error, it's there, in the exact file path where  ...

Score: 0
Email sending in laravel8, fails when using application specific password for gmail
az flag

I have used application-specific password for my Gmail account to send emails since other way does not work in my server environment though it works in local. my configuration is as follows

MAIL_MAILER=smtp
MAIL_HOST=smtp.gmail.com
MAIL_PORT=465
MAIL_USERNAME=testss@gmail.com
MAIL_PASSWORD=app=pwd-from-gmail
MAIL_ENCRYPTION=ssl
MAIL_FROM_ADDRESS=testss@gmail.com
MAIL_FROM_NAME="testy"

but i get foll ...

Score: 0
NoobAdmin avatar
On CentOS 6, how to let user-created files inherit permissions from their parent directory?
bh flag

So our servers are set-up like this:
Folder structure

/asic is our grand project's folder, /200T is a subproject of that grand project, and folders right under /200T such as /lbh are each worker's personal directories who are working on the subproject. /asic, /200T, /lbh were all created by root and then had their properties reconfigured by root via chmod -R and chown -R. /asic and /200T are owned by

Score: 0
Qubarf avatar
Apache cookie based site access
fr flag

I store a single cookie in a file and want to retrict access to users who have that specific cookie set (with a specified name) and redirect others (from any page in the site) to my site's root. Since, my site uses a node backend to authenticate users (i.e., to verify a password) I also want to exempt it's proxypass page ("/authenticate") and any "sub-pages" proceeding it.

A problem I've had with ...

Score: 2
iptables flushed on firewalld reload
br flag

I’m running on Rocky Linux (RHEL8 based) and am kind of struggling with firewalld and iptables. Well, not really iptables anyway… Let me explain.

I setup a K8S cluster on VMWare ESXi with six virtual machines, all the same. I need to have firewalld running, given this environment. I’m using Weave CNI, which is using iptables in order to create its networking rules.

Here are my initial findings: ...

Score: 0
s0up avatar
A valid Root CA Certificate could not be located, the certificate will likely display browser warnings
cn flag

i'm trying to get Telegram Webhook working with my local machine but it doesn't make requests. I think it's bc of certificate issue

Here's what geocerts.com/ssl-checker says:

screenshot

Here's my Apache config:

<IfModule ssl_module>
<VirtualHost *:%httpsport%>

    DocumentRoot    "%hostdir%"
    ServerName      "%host%"
    ServerAlias     "%host%" %aliases%
    ScriptAlias     /cgi-bin/ "%ho ...
Score: 1
Why would an Email be missing recipient email address's in headers?
us flag

We have 2 companies working out of the same Remote Desktop environment.

  • Company A uses Office 365 for all emails and Office apps.
  • Company B uses a 3rd party hosted Exchange for sending emails but utilizes the same Office 365 Apps on the terminal server as Company A.

We are seeing an issue where occasionally emails sent by users of Company B to users of Company A will contain only the recipients display ...

Score: 0
HARI avatar
Is there a way to show a 15+ character computer name in AD tools?
mx flag

I'm currently using a longer than 15 character naming convention and this doesn't display well in Active Directory. I was able to create computer object with more than 15 character in AD, but when I rename a computer which is already in the AD, it only shows the first 15 characters of the computer name. Is there a way to show the full name of computer without trimming it to 15 character in AD name field ...

Score: 0
Ubuntu VM Terminal not working
cn flag

I created Ubuntu 18.04 VM instance and I installed xrdp and xce4 for remote desktop after one session of remote desktop. I start vm again and this time the terminal can't open.

Score: 0
ch3t avatar
nginx returning 405 method not allowed for node apis with localized angular folders
uz flag

I did changes in ngnix file to make it work for localized angular dist folder with multiple languages. client side application working properly with url routing etc but node apis for authentication are returning "405 method not allowed" error. any help would be appreciated. Solutions I have tried,

error_page 405 =200 $uri; -- it gives 200 in status code with empty response tried setting up orgin  ...

Score: 0
reddi hari avatar
How to use more than one port as mirrored port in any Ethernet switch
gb flag

I want to feed packets from a mirrored (SPAN) port of Ethernet switch to two monitoring devices at the same time, hence both the monitoring devices gets exact same set of packets.

I can think of using a simple Hub to which the two monitoring devices and the mirror-port of the Switch are connected, but this becomes expensive.
I may need packets from same set of source ports to be copied to multiple dest ...

Score: 2
Keith Tysinger avatar
Removing additional password field from ssh login on Ubuntu 20
cn flag

SSH Screenshot

I just bought a Yubikey a few days back. I have tried to use the key to login to SSL without a password. I have it working, but it displays an error and shows interactive auth prompts.

The only real prompts are the customer and Yubikey one. How can I remove lines 2-4?

Score: 0
Jesus Vidal avatar
AWS client VPN endpoint - some client ip's do not allow access to resources
cn flag

I am using AWS client VPN endpoint with 2 VPC's:

  • VPN VPC (10.100.0.0/16)
  • App VPC (10.200.0.0/16)
  • VPC peering between the 2 VPC and Route table rules to communicate both.

My resources in the 'App VPC' are hosted in subnets that have route rules to the peering connection to the 'VPN VPC'.

The Security Group used by the resources in 'App VPC' allows traffic from 10.100.0.0/16

The problem is when I connec ...

Score: 0
Graziano Giacobazzi avatar
Directory not read
gr flag

I have a problem with a user's folder. ls -la shows the permissions as ???? instead of drwx.

I tried with

sudo chmod ug+rw -R /path/folder

to reassign the value but it doesn't change. How can i make the folder writable by the group? The user is able to read and write, but the group fails.

screenshot: wrong inode screenshot

output text:

gra@xxx:~$ ls -la /home/EnGi/D/
ls: impossibile accedere a '/home/EnGi/D/BKDiscoD ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.