Latest Server related questions

Score: 1
spinkus avatar
AWS IAM Roles: What is a trusted entity exactly?
de flag

I have a role attached to a LaunchConfiguration for an EC2 instance, that gives the EC2 instance privs to do certain things like do Cloudwatch logs (the context isn't important to the question). In Cloudformation the Role looks like:

    Type: 'AWS::IAM::Role'
    Properties:
      AssumeRolePolicyDocument:
        Version: '2012-10-17'
        Statement:
        - Effect: Allow
          Principal ...
Score: 1
Jhon Baptist avatar
Does VPN allow multiple devices connected to the same router to have more then 1 IP?
ly flag

Lets say i have 2 devices conected to the same internet provider trough a router. Can those 2 devices have 2 diferent internet/wan ip at the same time ? If so, can you indicate a vpn that does that ?

Score: 0
Torge Husfeldt avatar
Add own host to replicaSet hosted with cloud provider with limited access?
de flag

So I have this mongoDB (3.0.x) replicaSet hosted with a cloud provider called "NodeChef".

To my knowledge, and scouring the documentation, I have no access at all to the underlying host(s).

I want to add a host which I fully manage on my own to said replica set. I already contacted NodeChef support and asked for the "full set of credentials" needed for this operation. They answered that I should alr ...

Score: 0
blackirishman avatar
Unable to login into User Account through Anydesk on Ubuntu 20
cn flag

I have an Ubuntu 20 system runnning Anydesk. The system is in headless mode with a dummy video sink defined. What I have noticed running Anydesk is that I can create an Anydesk connection to the computer, but as soon as I enter my user's password, the Ubuntu screen doesn't unlock. The login doesn't fail either. So I obviously have a bug. That being said, I did configure my Ubuntu instance to auto login  ...

Score: 0
Florian avatar
access to on premise S2S Azure connection through P2S
in flag

I have the following network configuration.

On premise network : 192.168.13.31

Azure VN : 100.1.0.0/16

Azure vpn gateway : 51.136.4.136

I have S2S IKEV2 connection between on premise and azure. I'm able to ping from azure server to on premise server.

I have P2S openvpn connection to Azure. Address pool is 172.28.200.0/24. I'm able to ping from VPN Client to VN in azure but i can't ping the on premi ...

Score: 1
greg_wss avatar
How to make Jenkins agents port available with an Ingress controller on Kubernetes?
cn flag

I'm trying to setup Jenkins in a Digital Ocean Kubernetes cluster. I'm using a NGINX ingress controller as I want to access my server from a subdomain (jenkins.example.com). Everything is working fine so far, I have my UI on said domain secured with a custom certificate. I started encountering problems when trying to connect my agents (or slaves I read elsewhere?) to the server.

What I've tried

I tried ...

Score: 0
pierostz avatar
Shibboleth idp installation with Jetty 9 and Apache2 reverse proxy 404 error
bl flag

I am implementing a solution where I have to install Shiboleth idp on Jetty 9 behind an apache2 reverse proxy.

I am following this tutorial.

My problem is when I am trying to access https://idp.example.com/idp/shibboleth or https://idp.example.com/idp/status I get a 404 error.

However when I am using curl connected to the console and I access these two URL's http://localhost:8080/idp/shibboleth and ht ...

Score: 0
Aris Koutsoukis avatar
Bridge/Bond interface not showing in ip a show
tc flag

I have created some notwork script under /etc/sysconfig/network-scripts in order to set up my networking when my system comes up (RHEL8.3). In this set up i have my physical interfaces and I also have my bridge and bond interfaces. My second bridge interface for example

[root@svr_1 network-scripts]# cat ifcfg-bond1
DEVICE=bond1
ONBOOT=yes
BONDING_OPTS="mode=1 miimon=100 updelay=60000 primary=ens4f0"
BRIDG ...
Score: 0
Tomer Amir avatar
domain ownership verification in OIDC
cn flag

I am building an application where we want to allow our users to sign in using their own IDPs, and we're using okta.

We don't want our users to have to:

  • Create all their organization users manually
  • Be dependent on SCIM (or any other synchronization)
  • Maintain many users that most of them will probably not use our system

Since our user ids are email addresses and all of our customers are enterprises, we ...

Score: 0
How does Google Cloud Platform handle database backups with --async flag?
za flag

I'm currently working on adding an extra step to our companies CI/CD pipeline so we make backups of the database before making a deployment that could potentially run migrations on our database.

To make the backup I authenticate with Google Cloud Platform using the command: gcloud auth activate-service-account --key-file /path/to/keyfile.json

After authenticating I use the command: gcloud sql backups ...

Score: 0
What does the user limit in Win Srv 2019 Essentials apply to, concurrent connections or existing accounts?
ss flag

I have one Windows Server 2019 Essentials which logs errors and automatically shuts down because of license problems. It logs the following:

Bei der Überprüfung der Benutzeranzahl wurde eine Bedingung in der Umgebung festgestellt, die nicht mit der Lizenzierungsrichtlinie konform ist. Der Server erfüllt nicht die Microsoft-Software-Lizenzbedingungen. Diese erlauben maximal 25 lokale Benutzerkonten. D ...

Score: 0
What's the Runtime_Transport_Store Certificate Store used for?
ru flag

I've a certificate under the Runtime_Transport_Store_X Certificate store that has expired and I cannot see what it's being used against.

There's no documentation under Microsoft regarding this, therefore, I'm just wondering if it is safe to ignore?

Score: 0
Whois_me avatar
Linux: Is it possible to use the ssh key pair instead or in addition to the root privileges?
id flag

I'm facing the problem of securing an embedded platform. All ssh hardening have been setup, including 2 factor authentication and login with ssh key pairs.

Now, the root and user passwords are ridiculous easy to crack, all you need is physical access to the device, leaving all measures and precautions redundant. My idea is to harden the root access with the same techniques as ssh.(hardening the s ...

Score: 0
Jean-Bernard Lagorce avatar
Kafka logs get reset when all brokers restart at the same time
cn flag

I have a kafka cluster running on an integration Kubernetes cluster with 3 Kafka brokers and 3 Zookeepers, each component running in a statefulset. The helm chart I use to deploy the cluster is a custom one as I needed external access to the cluster through a BigIp F5 and did not find a helm chart doing this.

The Kafka image is confluentinc/cp-kafka:5.4.0 and the zookeeper one is confluentinc/cp-zooke ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.