Latest Server related questions

Score: 2
xyz257 avatar
How do I visit ipv4 addresses (not domain) from an ipv6-only network?
jp flag

I got an ipv6-only server and I want to visit ipv4 addresses like 8.8.8.8 with it. I know that I can visit ipv4-only website through DNS64 and NAT64. However, if the destination is just an ipv4 address like 8.8.8.8 it won't be converted to ipv6 addresses. In this case, how should I configure to visit destinations like 8.8.8.8? Thanks!

Score: 1
Root Loop avatar
Raising forest function level and domain function level
ru flag

So I am in the process of upgrading all domain controllers from 2008R2 to 2019, I know one of the requirement need to meet if I want to raise the forest and domain functional level to 2019 is to upgrade all the domain controllers to server2019.

My question is does it include the read-only domain controllers? We have few read-only domain controllers at the remote sites.

Score: 1
skb007 avatar
iperf3 showing packetloss between 2 directly connected servers
in flag

I have 2 Dell PowerEdge-R620 servers with following configuration Processor: 2 X Intel(R) Xeon(R) CPU E5-2637 v2 @ 3.50GHz RAM: 64GB Storage: 10 SAS drives (10K RPM) with RAID 10. NIC: QUAD Ports 2 X 10GB (INTEL X540-AT2)and 2 X 1GB (INTEL I-350) OS: RHEL 8.3

Both servers are directly connected to each other using cat7 cable via 10G interface. We want to test the network performance for UDP packe ...

Score: 0
Tilman Schmidt avatar
Scanning all Windows event log folders for an event in a given time interval
bd flag

When investigating a problem on a Windows client, I regularly find myself looking for relevant event log entries in a pretty well defined timeframe, but with no idea which of the myriad of folders in Windows Event Viewer on the involved client I should look at. Inspecting every one of these folders in turn typically shows that the majority of them is completely empty or at least does not contain any eve ...

Score: 0
Is there a (forensic) way to list past events/actions of a certain *.exe malware program (PUP-Proxygate, possibly a Trojan)?
jp flag

There is a folder with suspicious *.exe files on a Win 10 PC, and there are (external) protocols of potentially unlawful actions coming from that PC at a certain time in the past. The first suspicious action was network traffic to a sinkhole IP address typical for the Hupigon trojan, a second one (some days later) was posting an attempted scam on an Internet commerce platform.

The PC in question has ...

Score: 6
Niall Gallagher avatar
AWS instance giving me less NVMe space than advertised
br flag

I recently provisioned 10 m5d.large instances (with Terrafor. The advertised space is "1 x 75 NVMe SSD", however when I ssh on to the instance I see.

[root@web0 ~]# df -h
Filesystem      Size  Used Avail Use% Mounted on
devtmpfs        3.8G     0  3.8G   0% /dev
tmpfs           3.8G     0  3.8G   0% /dev/shm
tmpfs           3.8G  376K  3.8G   1% /run
tmpfs           3.8G     0  3.8G   0% /sys/fs/cg ...
Score: 0
Klav avatar
PM2 - Process or Namespace not found when deploying with GitLab CI
ge flag

When deploying from CI, as the user who started PM2, pm2 restart appname always results in [PM2][ERROR] Process or Namespace appname not found

whoami/who on deployment shows the correct user.

Tried switching users, as well as PM2's location: /usr/local/bin/pm2 restart appname results in the same process not found.

CI command:

script:
- pm2 restart appname

or:

deploy: 'ssh -o StrictHostKeyChecking ...
Score: 0
BANJOSA avatar
Piping SSH to wireshark on windows
ve flag

In my day-to-day operations, I frequently need to execute tcpdump's on remote servers, and it's a pain to save the output to a file and then have to move the file to my laptop to analyze it on wireshark.

I was exploring the command below, and it works fine in linux

ssh <remote_host> sudo tcpdump -vv -i eth0 -U -w - | wireshark -k -i -

But, unfortunately, my work laptop that is provided by my compan ...

Score: 0
Supervisor Service Not Running
sh flag

Good Afternoon All,

I am going through some of our OptiPlex 7050 machines and a common theme on some is:

Selected Sensor Details Sensor Name: Supervisor Service Not Running

Description The supervisor service exists on the system but is not running. This service is responsible for monitoring the SysTrack agent and assisting in other child-level SysTrack administration.

Where can I check and turn this featu ...

Score: 1
red0ct avatar
Does TCP RST packet along with other flags set valid?
cn flag

When I researched some methods of DDoS protection I faced with some firewall rule which limit packets with RST bit set to 60 per second. Indeed it makes some sense. But it also doesn't check the other flags.
For me it seems that packets with RST flag set and also some other flags set are invalid, so we can drop/reject it.

The questions is: can in practice we see valid TCP RST packets along with oth ...

Score: 0
Constantin avatar
How do I tell AWS to gracefully reclaim an EC2 spot instance?
cn flag

I have an autoscaling group which is scaled up/down based on proprietary logic. We use the boto3 client to perform such scaling activities when required.

By default our EC2 instances have a maximum execution lifecycle of 60 seconds. When spot instances are requested to be terminated it is very important that these are immediately detached from their load balancer.

When AWS reclaims their Spot inst ...

Score: 0
IIS 8 ERR_CONNECTION_RESET
gb flag

We're having issues accessing our server remotely. Currently the server is setup using a 192.168.x.x IP and our firewall is redirecting all traffic from our public IP to the server. Port 80, 443, and 8080, 53 are open.

I'm trying to get to: ip.add.re.ss:8080 off the network which is a basic index.html page at the moment. Locally on the server I can load the web page just fine with ip.add.re.ss:80 ...

Score: 0
Charly Roch avatar
Can someone outside of the lan uses my nginx proxy?
in flag

I know this question can sounds weird but I noticed strange behaviour on our network.

Here's the context:

I have a vm running multiple docker containers. To simplify their use and because I need https we set up a nginx reverse proxy in a container jwilder/nginx-proxy (following this method https://www.singularaspect.com/use-nginx-proxy-and-letsencrypt-companion-to-host-multiple-websites/)

I am se ...

Score: 0
Stretch0 avatar
CI Pipeline that doesn't require OAuth?
om flag

I am wanting to build a CI/CD pipeline Github app. What CI tool can I use to leverage to build this?

I want my application to handle the Github OAuth so as far as the user is concerned, they only connect to their Github but behind the scenes, I run Pipelines through Jenkins, CircleCI, AWS Codepipelines or something similar.

These all require the user authorise these Apps via their own OAuth but I'm ...

Score: 0
Vatoch Mr avatar
Give permission to Larvel web app in Centos 7 to add/delete/edit files
us flag
  • I build a new web interface by Larvel 8 for nagios core in Centos 7, everything is OK I can open the interface in browser, except one thing it s add/delete/edit files in nagios repositry cuz I want to automate this process, but it's obviously permission problem.

  • So I try all solutions I founded but none of them works, Can you please help me on this?

this is the details about nagios repository:

 ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.