Latest Server related questions

Score: 0
Jok56 avatar
dhcpd.conf Conditional Lease
cn flag

Is there any way in which I can apply a condition or a policy to an IP address mapping in the dhcpd.conf file?

I am hoping I can only lease an IP based on the source IP from a relay agent - is this or something similar possible?

Many thanks

Score: 0
Emilia avatar
Configured repositories failed on CentOS 7
br flag

I am using CyberPanel (OpenLiteSpeed ) on CentOS 7, when I am trying to update through Terminal Command then an error message comes and is as:
[root@server ~]# yum update -y Loaded plugins: fastestmirror Loading mirror speeds from cached hostfile epel/x86_64/metalink | 7.6 kB 00:00:00

  • base: repo1.dal.innoscale.net
  • epel: d2lzkl7pfhq30w.cloudfront.net
  • extras: mirror.cs.vt.edu
  • updates: mirror.atlanticm ...
Score: 0
DevOpsSauce avatar
Logrotate not writing to new .log file
jp flag

I have 4 custom systemd services that write to custom logs in /var/log/. I set up a logrotate config file, but it is not writing to the newest log. It is still writing to the old .log.1 file. The new ones are created, just no data.

Here is my logrotate config:

/var/log/dealer*.log {
        daily
        missingok
        rotate 7
        delaycompress
        notifempty
        su root root
        postr ...
Score: 0
Allow permitted ip to access url using HAProxy
vn flag

I'm using pfsense with HAProxy package. Using simple rule i would like to only allow access to a website if the IP is in the allow list.

enter image description here

For some reason im always getting a 404 response and cannot access the webpage. My public IP was obtained from here for testing: https://whatismyipaddress.com/

Any ideas what could be wrong with my access rules?

Here's the generated config:

frontend Shared-merg ...
Score: 0
sccccc avatar
Squid Proxy with ten of thousands of cache peer
bn flag

I tried having 20 lines of cache_peer and its working correctly, however when i added ten of thousands of cache_peer, and i cant really connect to it. Any idea why ?

My goal is to have hundred or thousands of authenticated users connect to my ProxyServer and my ProxyServer would then forward to another proxy provider (oxylab, smartproxy, etc). Not sure if Squid is the correct choice for this case ...

Score: 0
King David avatar
linux + how to extend sdd1 partition based on that sdd disk have enough space
gb flag

We have rhel server 7.2 version ( VM machine ) with sdd disk

sdd disk have parted partition sdd1 , and our goal is to increase the sdd1 partition to 10g from current 1K size

From

lsblk

sdd                  8:48   0   20G  0 disk
└─sdd1               8:49   0    1K  0 part

so we expect to achieve sdd1 to became 10g

We did the following examples but without good results

parted /dev/sdd
GNU Parted 3 ...
Score: -1
Tarida George avatar
What "wd" is supposed to mean from the utility tool passwd?
vn flag

https://man7.org/linux/man-pages/man1/passwd.1.html

What "wd" is supposed to mean in the name of the utility tool passwd?

pass is for password - what about wd ?

Score: 1
DottorBooom avatar
Authorization failed when I try to log into gmail using fetchmail
ng flag

After solving a small problem with starting fetchmail I am faced with another obstacle. This time related to accessing a gmail account through "fetchmail"

I know it's a lot of stuff but I hope someone wants to read this problem that hinders me. Thanks a lot in advance and have a nice day.

I now turn to the description of the problem:

  1. First I run the command for the fetchmail test:

    fetchmail -d0 -vk ...
Score: 1
Sam Hokin avatar
Can one migrate from Fedora (28) to CentoOS 8 Stream using new repos and DNF?
br flag

I've got a server running Fedora 28 that is primarily an RDBS host running PostgreSQL 10.7-1:

[Fedora 28]$ dnf list postgresql-server
Last metadata expiration check: 0:20:19 ago on Mon 12 Jul 2021 09:39:03 AM MDT.
Installed Packages
postgresql-server.x86_64                                                                                    10.7-1.fc28                                                  ...
Score: 0
davidbak avatar
Monitoring (summarizing) network usage of a single application (process) (Linux)
jp flag

I have a single application that seems to be a network pig (based on a casual glance at its logs - it seems awfully chatty). I'd like to find out what its bandwidth usage is - preferably in the form of a summary timeline, e.g., incoming/outgoing total bytes every minute (alternatively, in a form I can summarize that way myself with other tools).

If it is something that can be done with standard  ...

Score: 0
Ntakwetet avatar
`vbetool dpms off` not working from crontab
in flag

I have an old laptop I'm using to host a home Debian server. I'd like to switch the screen off at boot, so I put

@reboot vbetool dpms off

in the root crontab (sudo crontab -e). It looks like it runs as expected (see troubleshooting below) but the screen doesn't switch off. Also, when I run vbetool dpms off from SSH it works as expected.

Do anyone have any suggestion?


Troubleshooting results follo ...

Score: 4
What happens to logs generated by logger if there is no logging daemon installed or active
in flag
Dom

If you have a Linux distribution either without a logging daemon installed, or with the logging daemon disabled, what happens to the logs generated by the logger command?

I have Ubuntu 20.04.2 with the rsyslog service. When I turn this service off, I can still use the logger command, nothing gets written to the syslog, but the command still accepts my input and has a zero exit code.

When there is no log ...

Score: 0
user3411911 avatar
Wireguard + Split Tunnel + Two Peers -- Handshake failure with second peer because of private key
de flag

I've setup two wireguard peer servers and can connect sucessfully to each one independetly.

But when I try to connect to two peers at same time and split tunnels, It does fails to hand shake with second server. I think thats because two peers private keys are different, and In multi peer client I can only enter one server's private key.

I don't know how can these two peers work together with one private k ...

Score: 2
SaroBeatbox avatar
Raid 10 - 6 Disk - Dell MD3200
ar flag

I have 6 disk of 600GB.

I'm using a Dell Storage MD3200 , where i have created a disk group ( RAID 10 ) with 6 disks.

My disk slots parity are like this:

SLOT 1 : 0
SLOT 4 : 1
SLOT 7 : EMPTY
SLOT 10 : EMPTY
SLOT 2 : 1
SLOT 5 : 0
SLOT 8 : EMPTY
SLOT 11 : EMPTY
SLOT 3 : 0
SLOT 6 : 1
SLOT 9 : EMPTY
SLOT 12 : EMPTY

How many slots could go down before my disk group goes down?

Thanks, sorry for my b ...

Score: 1
martijn avatar
Hosting of inconsistent workloads in Azure
cn flag

In our company we have a lot of algorithms which need to process large datasets. The time to run these algorithms differs from a few minutes to hours. They also need to be run ad-hoc from multiple times in a week to once a month. We would like to trigger these algorithms with an event such as a file upload in Azure blob storage or and API call.

To solve this I started looking into queued processi ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.