Latest Server related questions

Score: 0
Sid  avatar
Commands for AWS FSx shadow copy
bd flag

We have enabled shadow copy in AWS Fsx I want schedule triggers with IST timezone there is no commands are mentioned in documents please help with the commands to schedule shadow copy with IST timezone https://docs.aws.amazon.com/fsx/latest/WindowsGuide/manage-shadow-cpy.html#shadow-schedules

Score: 0
Google Firestore "Collections failed to load"
br flag

Google Firestore console is not showing existing collections and not allowing me to create new collection. Its showing an error "Collections failed to load" on the console. I tried logging-out and logging-in but nothing changed. I am the owner of the project and I was able to use Firestore till last week.

Score: 0
AWS ssn "PutParameter" not authorized
us flag

I am trying to set a JWT secret in AWS's "parameter store" but appear to be unauthorized to do so. I am using a lab account so there would be no way for me to get authorization, but I have been assured that extra authorization isn't needed.

When I enter this command:

matthewbailin@matthewbailin FSND-Deploy-Flask-App-to-Kubernetes-Using-EKS % aws ssm put-parameter --name JWT_SECRET --overwrite --value  ...
Score: 0
Jugo Lugara avatar
Change retention time on prometheus
cn flag

So I am running Prometheus on an Ubuntu server and started running it a while ago by just running

sudo ./prometheus

However, I wanted to append

--storage.tsdb.retention.time=1y

to the end of this command. How can I change the storage retention time of a running Prometheus process without stopping Prometheus from collecting metrics. It is very import that I change the retention time WITHOUT losing th ...

Score: 0
cocoakrispies98 avatar
How to find the symmetric key algorithm being used for a TLS connection in Wireshark?
ru flag

I'm doing a TLS Wireshark lab and I can't find any information in Wireshark, the lab, or online how to find this answer:

What symmetric key cryptography algorithm is being used by the client and server to encrypt application data (in this case, HTTP messages)?

How do I find the symmetric key algorithm being used for this TLS connection in Wireshark?

Here are some screenshots:

wireshark-screenshot1

wireshark-screenshot2

Score: 0
Daniel Růžička avatar
nginx: [emerg] unknown "name" variable, nginx: [emerg] unknown "ssl_preread_server_name" variable
ru flag

i'm trying to set up my own Stealth VPN server using NGINX 1.18 in Debian 11. I follow this guide but many of the directives are not working. The problem is when i issue nginx -t test command the output is:

 - nginx: [emerg] unknown "ssl_preread_server_name" variable

I changed this varaible from $ssl_preread_server_name to $server_name if the problem is only with this particular variable and to see if ...

Score: -2
Philip Scot avatar
Deploying Kubernetes from scratch
nf flag

Could someone share some good tutorials how to deploy kubernetes cluster on my own server?

I do not want to use Amazon, Digital Ocean or Linode.

I have my proxmox server.

So the ideal scenario will be 1 master and 3 slave nodes; 4-th if its necessary.

I've watch some tutorials but still I would like to find out more and from people who can point me in right direction.

My nodes currently have instal ...

Score: 0
Clemens Putz avatar
Generated .crt file from text
bd flag

I bought a SSL certificate and got these Text files.

-----BEGIN CERTIFICATE----- MIIHhjCCBm6gAwIBAgIQBBHZG2IHaYx3EGHHgy1+GzANBgkqhkiG9w0BAQsFADBZ
.
.
.
STrB0u+/i8hZL9KBhMXFxhdUdcaze3xSlX6xDL+TQymtIY7KuLJa/XU9++bYBBb7 ++7PCC9+Mxz/cA==
-----END CERTIFICATE-----

-----BEGIN PRIVATE KEY----- MIIJQwIBADANBgkqhkiG9w0BAQEFAASCCS0wggkpAgEAAoICAQDYBIFobN
.
iSSIxSIje5XiU4BPCd9Os4hbyWYFBbDwj+g= -----END CERTIFICA ...

Score: 0
Domain computer connected to non-domain computer share giving a lot of login failed event 4625
cn flag

I have an application running on a domain joined Windows Server 2019 server called AppSrv that writes images out to a non-domain DMZ Windows Server 2019 server called WebSrv. A drive is shared from WebSrv as drive Z: on AppSrv. The application then just saves the images out to Z:\Some\Folder\Structure\Image.jpg. The files are being saved correctly but if I look in the event log of WebSrv, I can see th ...

Score: 0
silajim avatar
Dante auth based on network
in flag

I want to configure a dante (danted) server to allow no auth on localhost (for ssh tunnel) and to ask for username/password on every other connection. This is what I have as a config file but it's accepting no authenticated connections from the internet. Any ideas?

# /etc/danted.conf

#logoutput: syslog
debug: 0
logoutput: /log/danted.log
user.privileged: root
user.unprivileged: socks

# The listen ...
Score: 0
Cannot ssh into newly created VM (with key used in creation)
cn flag

So my cloud provider has you cut/paste or drag/drop the id_rsa.pub key when creating the instance. The provisioning process sticks that key in the appropriate place as part of the process.

This works fine for my cow-orkers who are all on Linux/Windows. I am on a Mac (Monterey 12.3). It fails from either my mac native or a linux VM running on my Mac. Symptoms (names/IPs changed to protect the guil ...

Score: 0
Alex Philip avatar
Can Loopback IP be Public
in flag

I have a Usecase where an Access Device need to reach a Core Device over the Internet. Access Device is configured with the Public IP of the Core device as of now so that it can reach the Core over the Internet.

Click here for current setup

However, we want to add another Public Interface via another ISP for Redundancy on the Core Device. The application that resides on the Core Device can only bi ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.