Latest Server related questions

Score: 0
Is there a solution that does with Phusion Passenger does, but for multiple Docker websites?
cn flag

Let's assume I have a server running multiple Dockerized websites - I realise that I can configure a reverse proxy (such as Nginx or Apache) to examine the headers of incoming HTTP requests, and send them through to different local ports, if I run each Dockerized website on a different local port number - thereby hosting several [smaller] websites on one host.

However, the configuration of this a ...

Score: 0
saro avatar
How do you let a call through in varnish when a cookie "lang" is not set?
my flag

How do you let a call through in varnish when a cookie "lang" is not set? I want to let a call go through and not return the cache when the cookie "lang" is set and send the request to apache, how do I do this?

Score: 1
oxben avatar
RHEL 7.9: rpm --eval "%dist" is now .el7_9 instead of just .el7
lr flag

Here, we've recently upgraded some of our systems from RHEL 7.8 to RHEL 7.9, and I'm facing an issue related to the "dist" returned by the rpm tool.

In some scripts, we share between RHEL7 and RHEL8 systems, we use the command: rpm --eval "%dist" to determine the local RHEL flavor: ".el7" or ".el8"

Starting with RHEL 7.9, the command now return: ".el7_9" instead of just ".el7".

This new behavior break ...

Score: 0
M.Clark avatar
Why is Microsoft Windows Update (KB5003220) breaking authentication to my File Share
cn flag

We have a file share on our SAN using CIFS/SMB protocol. Immediately upon applying this particular Windows Update (KB5003220), authentication to the file share breaks. Does anyone know what causes this?

Further testing has shown that the file share is still accessible using host name after the update, but not using the IP address - which is how most of our users had the network drive mapped. Why  ...

Score: 1
Mastakilla avatar
Determine the full oslevel (incl build date) of a local AIX repository without patching / installing
br flag

In our environment, only one of our AIX servers is permitted to access the internet through the firewall. On this one server, I use suma to download all fixes for all base levels, technology levels and service packs that we have in our environment; this is done daily. Once a month, I copy all fixes together in one folder per base level and I use inutoc to create a couple repositories that are frozen  ...

Score: 0
Is there a way in DOS to list only the files in specific subdirectories and not include the root directory?
gr flag

I have a series of folders (parent directories) on a network drive. Each of the parent directories contain multiple subdirectories. One of the subdirectories is common to all parent directories. This subdirectory is called "InProcess". I want to list all files that only reside in the "InProcess" subdirectories of the parents.

Can this be done with a batch file?

Score: 0
mosquetero avatar
Bridge not forwarding the neighbor advertisement
it flag

I have a bridge created using libvirt and two VMs. I can ping both VMs using ipv4. However, when pinging using ipv6 addresses, it does not work. I can see the neighbor solicitation leaving VM1 and reaching VM2. Then, I can see VM2 replying with a neighbor advertisement. However, the bridge "eats" that packet because I no longer see it in the VM1 link.

tcpdump on the link of VM1:

16:25:57.230617 IP6 20 ...
Score: 1
VM cannot access network on new Hyper-V Host
uy flag

I re-built an existing Hyper-V host server on Windows Server 2016 to move to a larger SSD RAID for storage (required OS re-install). The host itself is on the domain and accessible via RDP all looks well. I then copied a test VM to the host and it starts up, but has no network connectivity. I tried deleting and re-creating the virtual switch, but still no luck. The virtual switch is on NIC3, external ne ...

Score: 1
Jonathan Steinberg avatar
Correct Terminology for Windows Login Formats
tv flag

What's the correct terminology for referring to the different forms of user identfiers that I come across in a Windows network? To be specific, I have to use these 3 for different systems at my place of employment, Given my name is Fred Flintone and I work at FooCorp, I have to use these various forms depending on the system:

flinstonef

foocorpdomain\flintstonef

[email protected]

What is the corr ...

Score: 0
Google cloud loadbalancer Http-to-https with multiple backends
in flag

My goal is to have a redirect http-to-https for a loadbalancer for 3 instance groups on Google Cloud Platform.

I have one load-balancer http-to-https which redirects to another load-balancer for my 3 applications (3 backend services, 3 instance groups). I followed documentation, it works great for only 1 of those banckend-services, the ones which is default.The other 2 backends are not redirected to h ...

Score: 1
sshd does not pick up authorized keys file when attaching a new /home partition on GCP
ke flag

I need to create a RHEL machine on GCP with separate partitions for /home, /tmp, and /var. If I were installing on a physical machine I would simply partition my disk when I install the OS but I can't seem to figure this out on a GCP virtual machine. I:

  • instantiated a new RHEL VM on GCP by selecting an existing one and the "create similar" feature
  • created a new disk on GCP with gcloud compute di ...
Score: 1
Why are docker images - architecture specific?
us flag

I would like to better understand - why are Docker images - architecture specific? Why do I need different images for an ARM-processor-architectur, than for ARM64 AArch32 etc?

Docker images obviously contain processor specific instructions, which makes them architecture dependent.
Which part of the docker images contains processor specific instructions and why?

Why doesnt Docker-Runtime provide  ...

Score: 0
Set custom vendor extensions on Cisco Wireless Lan Controller
ar flag

Is it possible to set a custom vendor extension on a Cisco WLC? (currently 8.5.161.0)

In particular, I'm interested in setting Microsoft's Network Cost IE on our wireless network:

https://docs.microsoft.com/en-us/windows-hardware/drivers/mobilebroadband/network-cost-information-element

See https://superuser.com/questions/1652404/windows-10-does-not-detect-wi-fi-as-metered-connection for an OpenWRT exampl ...

Score: 0
Unable to create a Cloud Composer environment
cn flag

When I try to create a Composer environment, I get an error saying http error status code 400, bad request.

Any help would be appreciated.

Score: 0
Александр Беляков avatar
How do I know if Kerberos authorization is successful?

How do I know if Kerberos authorization is successful?

I am trying to implement the following logic:

if the authorization of kerberos is successful, then set the environment variable "krbs" = true.

Next, I plan to use this variable for conditional redirects using the directive.

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.