Latest Server related questions

Score: 0
no NetworkManager - no network services (dns, dhcp etc.)?
ro flag

Does disabling NetworkManager on RedHat systems break network services? In other words, is it NetworkManager that is in charge to start/stop the network services, or systemd? I don't want to have the services disrupted.

Score: 0
How to unblock email using Postfix & Amavis
cn flag

I have taken over a system using Postfix & Amavis. A email that a user is trying to receive is being blocked:

amavis[19881]: (19881-07) Blocked BANNED (.exe,.exe-ms,[trash]/0000.dat) {DiscardedInbound,Quarantined}

The email only contains a Word document, no exe.

How can I un-quarantine this email in the terminal (Ubuntu Server 20.04)?

Or can I whitelist that specific domain? Looking online do  ...

Score: 0
Automated way of testing network read/writes?
in flag

I have the following set up:

I have clients using software that "Is written using standard Windows API's for reads and writes" that are reading and writing files to a Windows server. The clients are all Windows 10 machines and they are all using a vault software called PDM from Solidworks.

The server is a Windows 2016 server running the PDM server software.

The basic workflow is the user works on a fil ...

Score: 0
frr avatar
tshark -T fields : any way to print interpreted values of numeric fields?
cn flag
frr

T-shark is a powerful command-line sibling of Wireshark, the packet capture tool.

At the basic verbosity level, you get one text row per packet, with just some basic information. Example:

tshark -n -i eth1

This yields:

1 0.000000000 ec:46:70:00:fc:ad → 01:1b:19:00:00:00 PTPv2 124 Announce Message
2 0.364764469 00:60:e9:2e:bd:f8 → 01:80:c2:00:00:0e PTPv2 68 Path_Delay_Req Message
3 0.364796580 00 ...
Score: 0
Joe Vedda avatar
Files in Bucket no longer appear
gl flag

I'm new to GC and while following the directions to install an SSL on a project it appears the bucket for the project was wiped. No more files are showing up.

One, can anyone explain what I may have done wrong so I can avoid it in the future, and two, is there any server backups/undelete services that I can use to retrieve the files?

Thanks in advance.

Score: 0
Sven Kirsten avatar
no_root_squash over NFSv4 does not have any effect
kh flag

I used this option no_root_squash with NFSv3 and it works as expected.

Then I just switched to NFSv4 while using the same option no_root_squash

On the NFS Client the files and folders that owned by root user are now owned by user "nobody". So the no_root_squash options seems to have no effect when using NFSv4.

Is that true ?

Score: 0
VM Instance write permisson (Container Optimized OS)
pe flag

Actually I set up a VM instance and installed a container base OS but now when I run the container with docker-compose up (just an alias) I receive an error from traefik, do you know what the problem is? I always receive an error that storage is not writable. But I can't change it?

Score: 0
jamieburchell avatar
Why would a receiving mail server check the DNS A record of the from domain against a blacklist?
cn flag

Most (all?) of the DigitalOcean network is currently listed on UCEPROTECT Level 3 (again).

I know that UCEPROTECT Level 3 is widely regarded as shady and I personally recommend to our clients that this should not be used. Less, anybody should stump up money for a problem created entirely by them.

Regardless, I have a droplet which relays email through MailGun and does not send any email from the dro ...

Score: 0
proxing everything with Haproxy
cn flag

is it possible to not define backend in Haproxy configuration to make a proxy for every TCP connection? So if I will try to connect from host A(sftp,ssh,smtp) through HAproxy it will always reach destination.

Score: 0
ssh-agent lifetime refresh on use
vn flag

I have an ssh key in ssh-agent set with a lifetime of 10 minutes. I want this 10 minutes to be the time since it was last used to successfully authenticate into a host. There's nothing immediately popping out in the man pages, so I'm wondering if it's been attempted via scripts or similar elsewhere.

The driver for this is that I have a key protected with a password. When I'm at my desk SSHing her ...

Score: 0
user1751825 avatar
AWS AutoScaling - Combining Dynamic and Predictive Scaling
ru flag

I'm working on setting up scaling policies for an ASG application.

I'm wondering if it is possible (or advisable) to combine Predictive and Dynamic scaling policies for a single ASG.

The peaks for the application load will be relatively cyclical, which should work well for Predictive Scaling. However there could be situations where the load is unusually high during particular events.

What I would like  ...

Score: 1
pssh with ssh ProxyJump with multiplexing session re-use
us flag
THX

I have a list of nodes, that are accessible only through a bastion server. On these nodes, I would like to execute commands in parallel. So, I had been trying to use ssh -J flag or, respectively, the ssh_config ProxyJump option in combination with parallel ssh pssh.

To speed up re-connections, I am using ssh multiplexing

 ControlMaster auto
 ControlPersist 60m
 ControlPath /tmp/ssh-%i@%l_%r@%h:%p
Score: 0
fail2ban not banning "matched" IPs from vsftp log
in flag

Using fail2ban to secure the vsftp login:

jail.local

[vsftpd]
enabled = true
bantime  = 600
findtime  = 5000
maxretry = 1
port = ftp,ftp-data
action = iptables-multiport
logpath = /var/log/vsftpd/vsftpd.log

Regex is matching, as you can see here:

fail2ban-regex /var/log/vsftpd/vsftpd.log /etc/fail2ban/filter.d/vsftpd.conf --print-all-matched

Running tests
=============

Use   failregex filter file : vs ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.