Latest Server related questions

Score: 2
Periodically audit file permissions for mistaken leaks
in flag

I'm looking for a way to periodically check a file system tree for permissions that have been set incorrectly.

The context is:

  • this is in an academic compute environment, with students, researchers and overworked sysadmins
  • the focus is not on malicious actors, but rather mistakes made by any of the above
  • existing users/group hierarchy
  • prevention does not have to be immediate, we're thinking of so ...
Score: 0
PrabanjanRaja avatar
access denied error when trying to connect to a remote machine via wbemtest tool
fr flag

I am trying to connect to a local client system running on hyper v, the client is connected to a domain, which is also running as a virtual machine via hyper-v
I tried to connect to the client machine via wbemtest but I keep getting "Access denied" error.
I tried turning off the the firewall, adding the users to dcom and performance monitor user groups.
But the end result is the same
can anyone he ...

Score: 0
sstbrg avatar
Setting up an architecture for analyses flows of time stream data from multiple sources
sl flag

What would be the best practice in terms of AWS for the following:

  • Many IOT medical devices gather data at around 256kBps
  • The data is a time series data (a matrix of [Channels X Samples], there can be millions of samples and dozens of channels)
  • Data is saved into files in S3 and each session is logged in a database with some metadata. So far we are using RDS for this.
  • Each dataset is around 5GB
  • We ...
Score: 1
Fleuri avatar
GCP disk snapshots: Would losing the full snapshot render the incremental snapshots useless?
in flag

On GCP, when you do periodic snapshots of disks, the first snapshot is a full snapshot of the disk and the following snapshots consists of only the deltas of the previous snapshots. If a snapshot is deleted and it has other snapshots dependent on it, the changes required for snapshot to be usable for restoring are moved to the following snapshot. This process is detailed here.

What would happen if ...

Score: 0
Forwarding port 80 traffic to multiple Web servers behind the firewall
cn flag
RDK

I want to set up two web servers behind my firewall, both accessible from Internet browser clients using the normal port 80 and the URL. For example server1 www.abc.com and server2 www.def.com.

I'm not an expert, but I think I understand how to use IPTABLEs to do a port forward. But what I don't know (or haven't found) is how to selectively do a forward based on the requested web server URL.

Assum ...

Score: 1
How can I tell when Docker Desktop has started in a PowerShell script?
je flag

I want to write a PowerShell script that will create a number of running docker containers on boot of the machine. The problem I'm running into is that despite the com.docker.service service running, the backend for Docker Desktop (I presume WSL2) is still getting ready.

I can manually recreate this behaviour by running docker version or similar when the system is starting. It will show:

error during conn ...
Score: 0
StarDust avatar
Access the localhost of a Wireguard peer from the local host from another peer?
in flag

I have two peers in Wireguard -- A and B. A has a service running on 127.0.0.1:2001. I want to connect A and B, so that B can access that service on 127.0.0.1:2001 as well. Alternatively, I want to forward 127.0.0.1 to a peer -- however, adding 127.0.0.1/32 to AllowedIPs does not work (at least on MacOS).

Score: 0
FormigaNinja avatar
Encrypt nginx log files
gb flag

Is it possible to encrypt nginx log files? If so, would the logrotate saving time the best time to do so?

The background for this is that the client is concerning about security issues that can happen having some user (login id) saved on access logs when a third party service send something through webhook apis.

I was not able to find this specific answer, and I'm wondering if it is not a popular (o ...

Score: 0
JimmyBanks avatar
How to downgrade mysql-client from 8.0.27 to 8.0.26 on Ubuntu
za flag

MySQL 8.0.27 has a bug when used to connect to Azure, where it uses all CPU resources and never connects.

Therefore I would like to downgrade to 8.0.26

What I have tried so far:

#uninstall any mysql references
get remove --purge -s 'mysql*'
sudo apt-get autoremove
sudo apt-get autoclean

#install mysql-client 8.0.26
wget -c https://dev.mysql.com/get/mysql-community-client_8.0.26-1ubuntu20.04_amd64.deb
su ...
Score: 0
How to use hostnames in smtp_bind_address in Postfix configuration?
cn flag

It seems that Postfix does not allow hostnames in the smtp_bind_address config parameter. But it does allow hostnames in inet_interfaces.

For SPF I want to make sure which address SMTP-clients bind to and I wanted to do this with an IP-independent configuration (like I always do).

Is there a way to enable hostnames for smtp_bind_address or any other way around this? The point is to leave the IP out o ...

Score: 0
Server Manager Download Basic Authentication and Management Services Error
us flag

I have encounter this issue when using Server Manager to download this 2 features.

Value can't be null. Parameter Name L: Job

Anyone can help me regarding this thanks

Attachment

Score: 0
William Myers avatar
Ran an OS/PHP update deployment on Bitnami Joomla instance, but now it won't load, what are my options?
kr flag

The site uses the Bitnami Joomla Debian stack for Compute Engine. PHP for the original instance was 7.3 which is now end of life and extensions were giving me warnings. I attempted to use the OS upgrade options now available but following this the Joomla part of the site will not load/work... only the html splash/landing page.

My assumption is that the PHP update either didn't work and broke PHP  ...

Score: 0
Passthrough VPN Tunnel w/ iptables
ng flag

My email VPS is getting to its limit but it's dedicated IP is well nurtured and I just cant part with it. I'm trying to setup a test environment where I establish a VPN server on the VPS just to passthrough incoming and outgoing traffic back to a VM with the goal of using the external IP on the VPS for all internet communication while tunneling that traffic back to a VM. My troubles are with iptables.  ...

Score: 0
Master avatar
internet in linux netns is unreachable , nexthop is wrong
jp flag

I have successfully setup 2 octoprints in 1 armbian linux on 2 different ports 5000 and 5001 by using netns. I can connect to them as 10.10.10.233:5000 and 10.10.10.233:5001 without any troubles. First of them (5000) is on the main system and has succesfull connection to Internet, second (5001 port) cant connect to internet, it can connect only to host via veth.

All setup is:

sudo ip link add dev virt ...
Score: 0
Apache 2.4 MPM event module causing intermittent 502 errors and slow response times behind an AWS Application Load Balancer (ALB)
cn flag

tldr; How do you configure the Apache MPM event module as a functional reverse proxy when running behind a high throughput AWS Application Load Balancer?

Layout

AWS Application Load Balancer -> Apache 2.4.x -> AWS Internal TCP Load Balancer (NLB) -> Jetty App Servers

Using the configuration setting shown below the Apache MPM event module is not stable behind an AWS app load balancer. Response tim ...

Score: 0
Use AppCmd.exe to delete a restricted IP address
za flag

I used the following syntax to add an IP address (10.0.0.1) to the restrited IIS 7.5 section for the whole server :

appcmd.exe set config -section:system.webServer/security/ipSecurity /+[ipAddress='10.0.0.1',allowed='False'] /commit:apphost

Very nice so far. The restriction is shown in the blacklist in IIS 7.5.

Now I want to delete this one (10.0.0.1) - and only this one - to give it access to the webser ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.