Latest Server related questions

Score: 0
vaskitup avatar
Network load balancer keeps routing requests to unhealthy target
er flag

I have two instances running as targets and one network load balancer communicating with these two over a TCP protocol.

Now, for some reason if the health check of one of the instances returns a 500, aws marks this target as unhealthy but keeps routing the request to it, even if it knows that it’s down and takes a few minutes to start routing the requests to the healthy one

Is this because of how  ...

Score: 0
how to monitor number of "add" commands on memcached
cn flag

so memcached provides a lot of stats to track usage (hits and misses).

sample output -

stats
STAT pid 1
STAT uptime 982226
STAT time 1630949306
STAT version 1.6.6
STAT libevent 2.0.21-stable
STAT pointer_size 64
STAT rusage_user 18.366158
STAT rusage_system 19.678998
STAT max_connections 65000
STAT curr_connections 7
STAT total_connections 3953
STAT connection_structures 17
STAT response_obj_bytes 248 ...
Score: 0
Nginx Reverse proxy excluding files
eg flag

I've a landing page done using wordpress and is hosted on example.com. I've an app running on app.example.com on external url. When user try to access wordpress files, it should be served from example.com and if that url or folder is not available the url must be masked and must go to remote url as example.com/$1. I've tried using nginx reverse-proxy but it is not working.

location / {
    try_file ...
Score: 0
P i avatar
How to locate a server geographically from URL
ke flag
P i

In order to minimize latency for HTTP GET/POST requests, I want to setup a linux box near the server.

Suppose for example the server is https://cdn1.telesco.pe

I've tried with traceroute and whois. i.e. running traceroute in theory returns the ip of each hop, and I should be able to whois on the latter hops.

But in practice traceroute returns line after line of hidden IPs before quitting:

> tracerou ...
Score: 0
firewalld: open by default, closed for a range, but open for a sub-range
az flag

As the title says: our CentOS system should in principle be accessible by everyone, but we have to block a range with a lot of unwanted activities (say 45.0.0.0/8), and then we want to allow a sub-range (say 45.91.0.0/16) because that range belongs to a client.

I could give you the settings I already tried in firewalld, but the mistakes I made are likely to distract you too much... I'll list ther ...

Score: 0
Chinmaey Shende avatar
tc traffic shaping with HTB and CQB causes packet transmission gap inconsistencies
hk flag

Problem: When the tc HTB or CQB is used to do traffic shaping, first two packet that are sent after some time gap are sent back to back as recorded in the pcap log. I have a intermediate computer with ubuntu 18.4 with network forwarding enabled. I run the tc with HTB to shape the traffic to have constant bitrate output on egress port. Client requests the chunks with variable sizes from the sever. Server ...

Score: 0
Rohini avatar
How to share directory with Fargate container
gr flag

I have a fargate container running which needs access to files present on an EC2 instance. Both are in the same network and security groups do not restrict traffic.

I tried using sshfs as well as mount using cifs.utils package. However because it is a container I get errors during the mount

Unable to apply new capability set.

or

fuse: device not found, try 'modprobe fuse' first

I checked the wor ...

Score: 0
Django / Gunicorn with Nginx reverse proxy - Wrong redirect to base path
in flag

I have a Django app successfully running with Gunicorn/Uvicorn, under a subpath of my domain (example.com/myapp).

The Nginx vhost looks like this:

server {

    server_name example.com;

    location /myapp/ {
        proxy_pass http://myapp_gunicorn/;
        proxy_set_header Host $host;
        proxy_set_header X-Real-IP $remote_addr;
        proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_f ...
Score: 0
Sridhar Ratnakumar avatar
Using full-disk encryption on a dedicated server running NixOS
lr flag

I run NixOS Linux on a Hetzner dedicated server which was installed from the Rescue system using this script, which sets up the disks using RAID1 and LVM.

I'd like add full-disk encryption to this install script. The NixOS manual recommends LUKS ... but this will have the user manually enter the encryption passphrase during boot time in front of the actual console (neither physically nor virtually acc ...

Score: 0
Julian Bechtold avatar
Migrating Drives from Windows to Unix server
uz flag

I am planning to migrate from a Windows operating System to a Unix based System.

My thought fell to ubuntu server at first but I have not put much thought into which distro to use yet.

Right now, there are 5 * 14.5 TB hdds packed full with important company Data initialized with GPT. Will it be possible to "plug and play" those drives or is it better to back them up, reinitialize /format them in my  ...

Score: 0
johnnyApplePRNG avatar
What does AWS Lifecycle Manager do when my spot instance is terminated?
hu flag

My goal is to use lifecycle manager to keep an updated snapshot of a spot instance I am running.

It creates a snapshot from an ebs volume every 6 hours.

Just curious what the lifecycle manager does when my instance goes offline. Does it keep taking a snapshot of the ebs volume that's not attached to anything? Or does it stop working?

Score: 1
Apache Rewrite Permalinks on non-WordPress site
vu flag

I've inherited a legacy PHP site running on Apache with a custom CMS. The URL structure is currently: https://example.com/topic.php?id=100&Title=Blog+Post+Topic

Is there an easy(-ish) way to automatically map that URL to a more friendly URL using an Apache rewrite so that the URL is like: https://example.com/blog-post-topic/

It reminds me of how WordPress permalinks map its /?p=100 style URLs  ...

Score: -4
TheNicolasDeveloper avatar
How do I fix Apache AH00132 Error?
cn flag

I have the following error. How can I fix this?

AH00132: file permissions deny server access: /var/www/html/index.html

Score: 0
supi007 avatar
How to configure Fedora 34 with three NICs and three subnets to route traffic?
cc flag

I have a Fedora 34 linux and it has a physical ethernet interface (NIC3), a physical wifi interface (NIC2) and an USB/Ethernet interface (NIC1) (USB LTE Dongle). I would like to use the NIC3 to route all traffic to NIC1. And I would like to keep the NIC2 as management interface that reach the Linux machine. That is all. block scheme of the plan - click here to see the image

    Destination     Gateway     ...
Score: 0
configure ssh to avoid password prompt when I cannot access remote .ssh directory
ru flag

I need to programmatically upload and download files via an sftp connection to a remote server. My username has permission to access a certain remote directory through a password, but not the .ssh directory. Actually I cannot ssh into the remote server at all. I get the response:

This service allows sftp connections only.
Connection to www.example.com closed.

But for the purpose of this question, lets ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.