Resources, Articles, Tricks, and Solutions in connection to Server Management Service

Backup and Restore Nagios Log Server

This article will guide you on the steps to perform #backup and #restore a #Nagios #Log #Server cluster. Taking Backup and Restore of Nagios Log Server helps not to lose any data as it is held in other instances.

Backup and recovery describes the process of creating and storing copies of #data that can be used to protect organizations against data loss. #Recovery from a backup typically involves restoring the data to the original location, or to an alternate location where it can be used in place of the lost or damaged data.

To do a backup and system restore:

1. Click Start.

2. Go to Control Panel.

3. Go to System and Security.

4. Click Backup and Restore.

5. At the Back up or restore your files screen, click Restore my files. 

6. Browse to locate the backup file. 

Read More



Steps to Deploy Virtual Machines in RHEV Environment

This article will guide you on how to #deploy #virtual #machines in the #RHEV environment and also on #Linux and #Windows virtual machines.

A Virtual Machine (#VM) is a compute resource that uses software instead of a physical computer to run programs and deploy apps. One or more virtual "guest" #machines run on a physical "host" machine.

The main purpose of VMs is to operate multiple operating systems at the same time, from the same piece of hardware. Without virtualization, operating multiple systems — like Windows and Linux — would require two separate physical units.

The two basic types of virtual machines are process and system VMs:

1. A process virtual machine allows you to run a single process as an application on a host machine. 

2. A system virtual machine is a fully virtualized #VM designed to be a substitute for a physical machine.

Your virtual machine internet connection goes through your computer and through your router. So they can track your router's #IP address, and possibly track you down at least to your city, if not to individual street or house.

Read More



Install InfluxDB on CentOS 7

This article will guide you on steps to Install #InfluxDB on #CentOS 7. You can Turn any InfluxData #instance into a production-ready cluster that can run anywhere. Easily create and share a comprehensive monitoring solution.

InfluxDB is similar to a #SQL #database, but different in many ways. Relational databases can handle time series data, but are not optimized for common time series workloads. InfluxDB is designed to #store large volumes of time series data and quickly perform real-time analysis on that data.

The local InfluxDB configuration file is located here: Linux: /etc/influxdb/influxdb. conf. macOS: /usr/local/etc/influxdb.

To Install InfluxDB:

Option 1 : Download the InfluxDB archive via the browser.

Option 2 : Adding the #repositories to your package manager.

i – Start your InfluxDB service.

ii – Configure your InfluxDB instance.

iii – Test your InfluxDB instance.

iv – #Download InfluxDB 2.0 archive from the website.

Read More



Using FreeBSD Single-User Mode to recover from File System Corruption

This article will guide you on how to recover from #File #System #Corruption Using FreeBSD's Single-User Mode.

While #filesystem corruption is never a good thing, it doesn't necessarily mean that all of your important data was lost. The success of your #recovery #operations comes down to a number of factors, such as how quickly the filesystem noticed the corruption, how widespread the issue was, and what files were affected.

Corrupted files are computer files that suddenly become inoperable or unusable. There are several reasons why a file may become corrupted. In some cases, it is possible to recover and fix the corrupted file, while at other times it may be necessary to delete the file and replace it with an earlier saved version.

To fix corrupted files in #Windows 10:

1. Use the #SFC tool.

2. Use #DISM tool.

3. Run SFC scan from Safe Mode.

4. Perform SFC scan before Windows 10 starts.

5. Replace the files manually.

6. Use System #Restore.

7. Reset your Windows 10.

Read More



Standard and Production Checkpoints in Hyper-V

This article will guide on how to choose between #Standard or #production #checkpoints in Hyper-V. We also look into the various aspects of standard and production checkpoints.

Hyper-V checkpoints allow IT #administrators to easily save the existing state of a virtual machine before any changes are made so that if a problem crops up due to the changes, the VM can revert to its previous state. A #snapshot of the virtual machine #memory state is not taken when using a production checkpoint.

To Change checkpoints to production or standard checkpoints:

1. In Hyper-V Manager, right-click the virtual machine and click Settings. 

2. Under the Management section, select Checkpoints. 

3. Select either production checkpoints or standard checkpoints.

Read More



OpenLDAP on Ubuntu Steps to install it

This article will guide you on the steps to #install and configure #OpenLDAP on #Ubuntu.

OpenLDAP is a open source implementation of #LDAP in Linux.

If it's your #server, you will know just by looking at the running services. When you are there, run #netstat and probably you will see LDAP listening only on localhost . Remotely, if the server is listening on #localhost , you cannot know just by running nmap , the port will not answer for the public #interface.

To Install and Configure OpenLDAP on #CentOS / #RHEL #Linux:

1. Install OpenLDAP Packages. On CentOS and RedHat, use yum install as shown below, to install the openldap related packages. 

2. LDAP #Config Files. config. 

3. Create olcRootDN Account as Admin. 

4. Create olcRootPW Root Password. 

5. Create olcSuffix #Domain Name. 

6. Verify The #Configuration Files. 

7. Start the LDAP Server. 

8. Verify the LDAP Search.

Read More



Instant File Initialization in SQL server

This article will guide you on how to enable Instant File Initialization (#IFI) in #SQL Server. 

Disk space reservation without initialization is called Instant File Initialization. 

To enable #database instant file initialization:

1. First, go to Start Menu and run secpol.msc to bring up Local #Security #Policy.

2. Expand the Local Policies Folder.

3. Click on User Rights Assignment.

4. Go to the Perform Volume Maintenance Tasks option and double click it.

5. Add your SQL Server Service account, and click OK.

6. Restart your SQL Server services (MUST DO).


Read More



Plesk Multi Server How to install it

This article will guide you on how to install #Plesk #Multi #Server which will enable us to work with a single Plesk user interface to run hosting services on multiple #servers. A multi-server environment can support more #connections and services, helps to keep the system running, and can also cost significantly less each month than continually adding resources to a single server.

Plesk Multi Server is most useful for the following types of business:

1. Web design and development studios that also host the clients web sites;

2. Small and medium-sized shared hosting providers;

3. Larger hosting providers for #reselling to customers, who are small and medium-sized shared #hosting #providers.

Read More



Apache Performance Tuning via MPM Directives

This guide will help you to configure #MPM directives in the #Apache server. You can simply configure MPM #directives by logging into the server and create an optimization file and add the necessary directive change. 

Starting with Apache 2.0, Apache extended its features with a selection of Multi-Processing Modules (#MPMs), which are responsible for binding to #network ports on the machine, accepting and handling the requests. These modules determine the basis of how Apache addresses multi-processing.

To know which MPM Apache is using:

1. Enable Apache mod_info.

2. Query the mod_info url, typically curl localhost/server-info.

3. The "Server Settings" section will show "MPM Name: #Worker"

4. Run httpd -V again. It will still show prefork, not worker.

Read More



How to Install OpenNMS on CentOS 8

This article will guide via a step-by-step procedure to #install OpenNMS in #CentOS. 

OpenNMS is a free, Open Source network monitoring system that can be used to #monitor tens of thousands of unlimited devices with a single #instance.

It will discover and monitor the services or nodes automatically in your #network, or you can assign a particular service to monitor by OpenNMS.

To configure #OpenNMS:

1. Install OpenNMS Horizon. Add yum repository and import GPG key. 

2. Initialize and set up #PostgreSQL. Initialization of the PostgreSQL database will start.

3. Initialize and start OpenNMS Horizon. 

4. First Login and change default password.

Read More



How to Install Python on Windows

This article will guide you on steps to install #Python and #PIP on #Windows. If you would like to download and install Python on your #computer you can do for free at python.org.

To install Python on Windows:

1. Select Version of Python to #Install. 

2. Download Python Executable #Installer. 

3. Run Executable Installer. 

4. Verify Python Was Installed On Windows. 

5. Verify Pip Was Installed. 

6. Add Python #Path to #Environment Variables which is Optional.

Read More



ElasticSearch LDAP Authentication on the Active Directory

This article will guide you on how to authenticate #ElasticSearch users using the Active Directory from #Microsoft #Windows and the #LDAP protocol.

#Active #Directory (#AD) supports both Kerberos and LDAP – Microsoft AD is by far the most common directory services system in use today.

To Set up Active Directory Authentication using LDAP:

1. Enter the LDAP "Server" and "Port" attributes on the Server Overview tab of the LDAP Users page. 

2. Enter the proper base for the Active Directory in the "Base DN" attribute. 

3. Set the Search Scope. 

4. Enter the Username Attribute. 

5. Enter the Search Filter. 

6. Verify that the #settings are correct by clicking the Verify button.

Read More



Steps to Back Up And Restore Nagios System

This article will guide you on how to perform #Backup and #Restore of the #Nagios System are important aspects of the #administration and #maintenance of the #system. 

Backups are an important aspect of administration and maintenance of your system. They can easily facilitate the #migration of a Nagios XI #installation between a virtual server and physical server, and the design of a fail-over or #disaster #recovery instance of Nagios XI.

There are three main types of backup: full, incremental, and differential:

1. #Full backup. As the name suggests, this refers to the process of copying everything that is considered important and that must not be lost.

2. #Incremental backup. 

3. #Differential backup.

Read More



How to create bacpac file from SQL server

This article will guide you on how to export an existing #database into a #BACPAC file is through #SSMS. A bacpac is a dacpac + data, while a dacpac only contains the schema of the database.

To create a Bacpac file:

a. To #export a database using the Azure portal, open the page for your database and click Export on the toolbar.

b. Specify the BACPAC filename, select an existing Azure storage account and container for the export, and then provide the appropriate credentials for access to the source database.

c. Click OK.

To import from a BACPAC file into a new single database using the Azure portal:

1. Open the appropriate server page.

2. On the toolbar, select Import database. 

3. Select the storage account and the container for the BACPAC file and then select the BACPAC file from which to import.

Read More



Traefik Reverse Proxy for Docker Containers on Ubuntu

This article will guide you on how to set up #traefik reverse #proxy for #docker on #ubuntu 20.04. Traefik is a dynamic load balancer designed for ease of configuration, especially in dynamic environments. It supports automatic discovery of services, #metrics, tracing, and has Let's Encrypt support out of the box. 

To to Install and Use Traefik as a Reverse Proxy with Docker on Linux:

1. Install Docker and Docker Compose.

2. Create Docker #Network.

3. Install and Configure Traefik Proxy.

4. Create a Docker Compose File.

5. Build Traefik Docker Container.

6. Access Traefik Web Interface.

Read More



Setting up OCSP stapling on Apache

This article will guide you on how to configure OCSP stapling on the Apache server.

To Check if #OCSP #stapling is enabled:

Go to https://www.digicert.com/help and in the Server Address box, type in your server address (i.e. www.ibmimedia.com). If OCSP stapling is enabled, under #SSL Certificate has not been revoked, to the right of OCSP Staple, it says Good.

To Configure your Apache server to use OCSP Stapling:

1. Edit your site's #VirtualHost SSL configuration. 

2. Add the following line INSIDE the <VirtualHost></VirtualHost> block: SSLUseStapling on. 

3. Check the configuration for errors with the Apache Control service. Apachectl -t.

4. Reload the Apache service. service apache2 reload.

Read More



NFS Data ISO and Export Storage Domain to oVirt RHEV

This article will guide you on steps to add Export Storage #Domain & #NFS #Data to an oVirt/RHEV environment. NFS is the most common protocol for sharing #files between #Unix #systems over a #network. NFS servers export directories from their local hard disks to NFS clients, which mount them so that they can be accessed like any other #directory.

To modify etc #exports:

1. Open the /etc/exports file in a text editor on an NFS client that has root access to the storage system.

2. Make your changes.

3. Save the file.

Read More



Restart Node js Apps Automatically with Nodemon

This article will guide you on how to restart node.js apps automatically with #nodemon.  If it's just running (not a #daemon) then just use Ctrl-C . Where PID is replaced by the number in the output of ps . nodemon will watch the files in the directory that nodemon was started, and if they change, it will automatically restart your node application.

To start Nodemon with #NPM:

1. #Install nodemon. Since nodemon is a command line tool, it has to be installed as a global node package. 

2. #Boot up the Node server. First, make sure that #MongoDB is already running in the background. 

3. Add nodemon to package.json as an #NPM script. 

4. Start the Node server via NPM.

Read More



Setting up client access over private IP address to MySQL on Compute Engine

This article will guide you on setting up client access over private IP address to #MySQL on #Compute #Engine helps advanced usage of parameters and specific performance needs.

To allow IP to connect to MySQL:

1. Edit MySQL Config File. 1.1 Access mysqld.cnf File. 

2. Set up Firewall to Allow Remote MySQL Connection. While editing the configuration file, you probably observed that the default MySQL port is 3306. 

3. Connect to Remote MySQL #Server. Your remote server is now ready to accept connections.

Read More



How to modify MSSQL Database Autogrowth Configuration

This article will guide you on how #MSSQL Database Autogrowth Configuration works. Therefore do not rely on the default #SQL Server Data and Log file Autogrowth value and must always set it to more realistic values depending upon the usage of the database.

To see data file growth in SQL #Server:

1. Connect to a SQL instance and right-click on a database for which we want to get details of Auto Growth and Shrink Events. 

2. It opens the disk usage report of the specified #database. 

3. In this #disk usage report, we get the details of the data file and log file space usage.

To Change default database location via SQL Server Management Studio:

i. Right Click on Server and Select "Properties".

ii. In the "Server Properties" dialog box, navigate to "Database Settings" tab and data/log files location under "Database default locations" group. 

iii. Click on "OK" to apply changes.

Read More



Redis as a Cache for MySQL with PHP on Ubuntu

This article will guide you on steps to use #Redis to cache #MySQL data with #PHP on #Ubuntu 20.04.  Redis, which stands for Remote Dictionary Server, is a fast, open-source, in-memory key-value data store for use as a database, cache, message broker, and queue. 

To Connect to Redis through the SQL Gateway:

1. In MySQL Workbench, click to add a new MySQL connection.

2. Name the connection (CData SQL Gateway for Redis).

3. Set the Hostname, Port, and Username parameters to connect to the #SQL Gateway.

4. Click Store in Vault to set and store the password.

Read More



IPSEC protocol for load balancing

This article will guide you on steps to perform load balancing with #IPSEC protocol. The load balance of IPSEC #protocol allows us to fully access the available bandwidth between IPSEC #VPN sites.

VPN load balancing is a mechanism that is used in order to equitably distribute network traffic among the devices in a virtual cluster.

To configure IPSec.

1. Select. #Network. IPSec Tunnels.

2. Select the. Proxy IDs. tab.

3. Select the. IPv4. 

4. Click. Add. and enter the IP.

5. Enter the. Local. IP address or subnet for the VPN #gateway.

6. Enter the. Remote. address for the VPN gateway.

7. Select the. Protocol. from the drop-down.

8. Click. OK. 

Read More



How To Install MariaDB on Ubuntu Focal Fossa

This article will guide you on steps to install #MariaDB from the #Ubuntu #repositories and from the official MariaDB repositories. You can install MariaDB in two different ways.

To install MariaDB on Ubuntu, follow these steps:

1. Update #packages index. sudo apt update.

2. Once the packages list is updated, install MariaDB by issuing the following command: sudo apt install mariadb-server.

3. The MariaDB service will start automatically.

The default data directory for the MariaDB database server is /var/lib/mysql. The configuration file of MariaDB database server is /etc/mysql/mariadb. conf. d/50-server.

Read More



Courier IMAP SSL How to secure your IMAP servers with SSL

This article will guide you on how to fix #IMAP #SSL #error which occurs as a result of incorrect file generation or wrong SSL #port #settings cause problems with the proper functioning of SSL on #courier IMAP SSL servers.

To add SSL support you have to install #OpenSSL or #GnuTLS before installing Courier-IMAP. #Download OpenSSL from http://www.openssl.org/, or GnuTLS from http://www.gnutls.org.

Read More



Pure-ftpd 530 login authentication failed error on Directadmin

This article will guide you how to resolve Pure-ftpd 530 login #authentication failed #error on #DirectAdmin which occurs as a result of incorrect ownership of pureftp.passwd file or password #database corruption.

While trying to connect to your FTP server hosted by #IIS, you may run into “530 User cannot log in, home directory inaccessible” error. This error occurs whether you are using anonymous access or basic authentication. A sample connection log from an FTP #client: 530 User cannot log in, home directory inaccessible.

To Install Pure-FTPd on Ubuntu 20.04 :

1. Create Atlantic.Net Cloud Server. First, log in to your Atlantic.Net Cloud Server. 

2. #Install Pure FTPd. 

3. Create #FTP User. 

4. Create a Self-signed SSL/TLS certificate. 

5. Configure Pure FTPd to use SSL/TLS. 

6. Connect FTP Server from Client.

Read More



How to Set Up Multiple SSLs on One IP With Nginx

This article will guide you on how to set up multiple #SSL #certificates on one #IP with #Nginx. 

To set up Multiple SSL Certificates on a Single IP Using Nginx:

1. Domain names should be registered in order to serve the certificates by SNI.

2. Root Privileges to the server.

3. Nginx should already be installed and running on your #VPS. To #install Nginx: # sudo apt-get install nginx.

4. Make sure that #SNI is enabled in the #server.

Read More



Create and Manage User Accounts on oVirt and RHEV

This article will guide you on the steps to Create and #Manage #User #Accounts on #oVirt and RHEV using #PowerShell commands. 

ADMINISTERING USER TASKS FROM THE COMMAND LINE:

1. You can use the ovirt-aaa-jdbc-tool tool to manage user accounts on the internal domain. 

2. Changes made using the tool take effect immediately and do not require you to restart the ovirt-engine service. 

3. For a full list of user options, run ovirt-aaa-jdbc-tool user --help. 

Read More



Steps to install Yarn on Windows

This article will guide you on steps to install #Yarn in Windows via #MSI Installation, Chocolatey Installation, and Scoop Installation. msi file that when run will walk you through installing Yarn on Windows. If you use the installer you will first need to install Node. js.

Yarn global install locations:

1. On #Windows %LOCALAPPDATA%\Yarn\config\global for example: C:\Users\username\AppData\Local\Yarn\config\global.

2. On #OSX and non-root Linux  ~/.config/yarn/global.

3. On #Linux if logged in as root /usr/local/share/.config/yarn/global.

yarn install is used to install all dependencies for a project. This is most commonly used when you have just checked out code for a project, or when another developer on the #project has added a new dependency that you need to pick up.

Read More



Steps to install MySQL in Docker Container

This article will guide you on the steps to install and configure #MySQL in #Docker #container. MySQL is a well-known open-source relational #database management system and one of the most popular web server solutions. It stores and structures data in a meaningful manner, ensuring easy accessibility. Setting up a database in Docker is simply building a container based on a MySQL #image. 

To Set Up & Configure a MySQL Docker Container:

1. Running a MySQL Docker Container.

2. Installing a MySQL Docker Container.

i. Pull the MySQL Docker Image.

ii. Deploy the MySQL Container.

iii. Connect to the MySQL Docker Container.

3. Configure MySQL Container. Manage #Data Storage.

4. Start, Stop, and Restart MySQL Container.

5. Delete MySQL Container.

Read More



Docker Network How to create it

This article will guide you on how to create a #docker #network and attach a #container to it. If you want to add a container to a network after the container is already running, use the docker network connect subcommand. You can connect multiple containers to the same network. Once connected, the containers can communicate using only another container's #IP address or name.

There are three common Docker network types:

1. bridge networks, used within a single host.

2. overlay networks, for multi-host communication.

3. macvlan networks which are used to connect Docker containers directly to #host network interfaces.

Read More



Remote Transport Pruning Failure How to troubleshoot

This article will guide you on steps to solve remote transport #pruning #failure in #cPanel which can occur when a directory has too much size, network #error, or due to the lowness of backup drive.

The remote transport process may time out if it tries to prune a very large directory. The following options can help you to solve this issue:

The transport may produce an error if it is unable to prune the directory due to its size. You can manually delete the directory from the remote backup location to troubleshoot this error.

Read More



Apache Maven on Ubuntu Steps to install it

This article will guide you on how to #install #Apache #Maven on Ubuntu. Basically, Apache Maven is a popular build management tool for #Java projects. 

To test The Maven Installation in #Ubuntu:

Run the command mvn -version to check if the maven is installed properly. 

You will see the below description on the command prompt. Maven is installed successfully.

Some Maven #Commands:

1. mvn clean. This command cleans the maven project by deleting the target directory. 

2. mvn compiler:compile. This command compiles the java source classes of the maven project. 

3. mvn compiler:testCompile. 

4. mvn package. 

5. mvn install. 

6. mvn deploy. 

7. mvn validate. 

8. mvn dependency:tree.

Read More



Install Cockpit Web Console on Ubuntu

This article will guide you on the steps to #install the #Cockpit web console on #Ubuntu. Basically, Cockpit web console provides a #graphical overview of the core components and overall status of a #Linux #machine.

To access cockpit in Linux:

1. Open the Interface by Opening a web #browser and enter the server's IP address with port 9090 in the address bar. If the web browser is on the Cockpit server, open localhost:9090 or hostname:9090.

2. Log into the Cockpit interface with the same user name and password that you would normally use to log into the #system.

Read More



Data Loss through Partial loss of keys in Azure Cache for Redis

This article will guide you on the different methods to fix data loss in #Azure #Cache for #Redis which can happen due to a number of reasons like Redis instance failure, incorrect #database selection, and so on. 

Redis server saves all its data to HDD from time to time, thus providing some level of persistence. It saves data in one of the following cases: automatically from time to time. when you manually call BGSAVE command.

Redis does not use #tables, and stores data in #memory, and is not limited by the hard #disk I / O speed when reading and writing #data, so the speed is extremely fast.

Read More



Virtual Machines (VMs) in oVirt 4 0 Environment

This article will guide you on the steps to create a Virtual Machines (#VMs) in oVirt 4.0 Environment.

The #oVirt engine acts as the control center for oVirt environments. The engine enables admins to define #hosts and #networks, as well as to add storage, create VMs and manage user permissions. Included in the oVirt engine is a graphical user interface (GUI), which manages oVirt #infrastructure resources.

To Create a Virtual Server:

i. Access the Virtual Server class tab in the Class #Manager.

ii. Click the Add Virtual Server link.

iii. Specify the name of the virtual server, its connections, and the URL Hosts. ...

iv. Click OK and then Apply to save and apply your changes.

To to Create Virtual Machines (VMs) in oVirt 4.0 Environment:

1. Create new Data Center.

2. Configure Cluster for Data Center.

3. Add Host or oVirt Node to above created data center & cluster.

4. Creating Storage #Domains.

5. Upload #ISO files to ISO Storage Domain.

6. Create Virtual Machine.

Read More



oVirt Guest Agent on CentOS 8 and RHEL 8 Steps to install

This article will guide you on how to install oVirt Guest Agent on CentOS and RHEL. oVirt / #RedHat V#irtualization guest agent provides information, notifications, and actions between the #oVirt web interface and the guest.

To install oVirt guest agent:

1. Log in to the Red Hat Enterprise Linux virtual machine.

2. Enable the Red Hat Virtualization Agent #repository.

3. Install the guest #agent and #dependencies: # yum install ovirt-guest-agent-common.

4. Start and enable the ovirt-guest-agent service.

5. Start and enable the qemu-guest-agent service.

Read More



NFS Server on RHEL CentOS 8 Steps to install and configure

This article will guide you on the steps to Install and Configure #NFS Server on #RHEL or #CentOS.

The terms client and server are used to describe the roles that a computer plays when sharing file systems. The NFS service enables any given computer to access any other computer's file systems and, at the same time, to provide access to its own file systems.

To install NFS server:

1. Install NFS #Kernel Server. 

2. Create the #Export #Directory. 

3. Assign server access to client(s) through NFS export file. 

4. Export the shared directory. 

5. Open #firewall for the client (s).

Read More



VirtualHost cannot occur within virtualhost section in WAMP

This article will guide on steps to fix #VirtualHost cannot occur within virtualhost section in #WAMP which occurs while we try to add VirtualHost #directive and reconfigure #vhost.

Directory directive works only for filesystem objects (e.g. /var/www/mypage, C:\www\mypage), while Location directive works only for URLs (the part after your site #domain name, e.g. www.mypage.com/mylocation).

To Configure name-based virtual #hosts:

1. Install Apache webserver. Make sure you have installed #Apache webserver. 

2. Create web directory for each host. 

3. Create demo web pages for each host. 

4. Create configuration file for each host. 

5. Enable virtual host configuration files. 

6. Test Virtual hosts.

Read More



How to monitor Azure Cache for Redis

This article will guide you on how to monitor Azure Cache for Redis. Azure Cache for #Redis uses #Azure Monitor to provide several options for monitoring #cache instances. These include view metrics, pin #metrics charts to the Startboard, customize the date and time range of monitoring charts, and so on.

To Use Azure Redis Cache:

1. Log into Azure port, go to #Databases >> Redis Cache.

2. Create a news Redis Cache.

3. Get the Access Keys to connect with the newly created Redis Cache.

4. Install the #StackExchange. 

5. You can add Redis Cache connection string into the appsettings.

Read More



Steps To Install Spark On Ubuntu

This article will guide you on how to install #Apache spark on a single #Ubuntu system. Apache Spark is a distributed open-source, general-purpose framework used in cluster computing environments for analyzing big data. You will be able to perform basic tests before you start configuring a #Spark cluster and performing advanced actions.

Spark is not a #database so it cannot "store data". It processes #data and stores it temporarily in memory, but that's not presistent storage. It can access data that's in: #SQL Databases (Anything that can be connected using JDBC #driver).

Read More



Rewrite URLs with mod_rewrite for Apache on Ubuntu 16 04

This article will guide you on how to rewrite URLs with mod_rewrite in #Apache. Basically, mod_rewrite helps in creating human-readable URLs.

The URL #Rewrite #Module is an extension software for #IIS (Internet Information Services). URLs should be created so that they are easy to remember for the users and easy to find for the search engines. The URL Rewrite Module enables web administrators to develop and implement rules that assist them in this task.

htaccess rewrite rule includes setting a combination of rewrite condition ( #RewriteCond ) tests along with a corresponding rule ( #RewriteRule ) if the prior conditions pass. In most cases, these rules should be placed at any point after the RewriteEngine line.

Read More



SSLRandomSeed cannot occur within VirtualHost section

This article will guide you on how to fix SSLRandomSeed cannot occur within VirtualHost section which triggers when the #SSLRandomSeed directive is specified inside the #VirtualHost section. 

Read More



Manage a Linux Server with systemd

Like the init #daemon, #systemd is a daemon that manages other daemons, which, including systemd itself, are background #processes. systemd is the first daemon to start during booting and the last daemon to terminate during shutdown.

This article will guide you on how to manage #Linux server using systemd. Additionally, we saw the different commands used to Manage Linux serves with systemd. While systemd is compatible with SysV and Linux Standard Base (LSB) init scripts, systemd is meant to be a drop-in replacement for these older ways of getting a Linux system running.

To start (activate) a service , you will run the command 'systemctl start my_service. service', this will start the service immediately in the current session. 

To enable a service at boot , you will run 'systemctl enable my_service. service'.

Read More



Handle Errors in Serverless Applications with AWS

This article will guide you how to handle #errors in Serverless Applications with AWS Step Functions. Combining AWS Step Functions with AWS Lambda makes it simple to orchestrate #AWS #Lambda functions for serverless applications.

To help you deal with errors in Lambda applications, Lambda integrates with services like #Amazon CloudWatch and AWS X-Ray. You can use a combination of logs, metrics, alarms, and tracing to quickly detect and identify issues in your function code, API, or other resources that support your application.

Lambda functions can fail in three cases:

i. An unhandled exception is raised — whether if we received an invalid input, an external API failed, or just a programming bug occurred.

ii. Timeout — Lambda running longer than the configured timeout duration is violently closed with a ‘Task timed out after … seconds’ message. The default value is 6 seconds, and the maximal value is 5 minutes.

iii. Out of memory — In this case, the lambda usually terminates with ‘Process exited before completing request’. The ‘Memory Size’ is equal to ‘Max Memory Used’.

Read More



How To use Systemd to Sandbox Processes On Ubuntu 20 04

This article will guide you how to #Sandbox #Processes on Ubuntu 20.04 with Systemd for Lighttpd using different methods. Here we made the #lighttpd program more secure by using the #systemd sandboxing options. You can use these techniques with any process that systemd manages allowing you to continue to improve the #security of your system.

#Sandboxing is designed to prevent #threats from getting on the #network and is frequently used to inspect untested or untrusted code.

Read More



Monitor Azure virtual machines with RDP

This article will guide you on how to monitor virtual #machines #RDP using Azure.
You can View performance directly from an Azure VM:
1. In the #Azure portal, select Virtual Machines.
2. From the list, choose a #VM and in the #Monitoring section choose Insights.
3. Select the #Performance tab.

Read More



Zabbix Single Sign-On SSO Authentication in Active Directory

This article will guide you on how to set #Zabbix : Single Sign-On (#SSO) Authentication in #Active Directory which helps users authenticate the Zabbix frontpage without entering credentials.
Users and resources are added to the directory service for central management and ADDS works with authentication protocols like #NTLM and #Kerberos. Thus, users that belong to ADDS can authenticate from their #machines and get access to others #systems that integrate with ADDS. This is a form of Single Sign-on.

Read More



How to Provision docker containers with Ansible

This article will guide you on how to provision docker #containers using Ansible. #Ansible seamlessly automates #Docker and the process of building and deploying containers.
Ansible Container will allow users to build, #deploy, and orchestrate containers at scale, all from Ansible playbooks.

Read More



Using Cron to Automate Tasks on CentOS 8

This article will guide you on the steps to set up #Cron job on #CentOS 8 to help automate #tasks. Cron is a #clock daemon, whose name originates from #Chronos, the Greek word for time. It enables users to automate the execution of #commands, scripts (a group of commands) or programs at specified time intervals.
The simplest way to validate that cron tried to run the #job is to simply check the appropriate log file; the log files however can be different from system to system. In order to determine which log file contains the cron #logs we can simply check the occurrence of the word cron in the log files within /var/log .

Read More



Steps to Install GoAccess on Ubuntu

This article will guide you on how to #Install GoAccess on Ubuntu which is a command-line tool and how to use it for analyzing server #logs.
With #GoAccess, you are able to #SSH into any web server you control and view or analyze relevant statistics quickly and securely. Apart from the command-line dashboard interface, it's also capable of displaying the #statistics in other formats such as HTML, JSON, and CSV, which you can use in other contexts or share with others.

Read More



How to set up Amazon S3 through WHM

This article will guide you on how to configure Amazon S3 via WHM by accessing the 'Backup Configuration'.
To configure your #backups:
i. Login to #WHM and access "Backup Configuration >> Additional Destinations".
ii. Select #Amazon #S3 and click “Create new destination”.

Read More



Nagios Authentication and Importing Users with AD and LDAP

This article will guide you on how to integrate #Nagios Log Server with Active Directory or #LDAP to allow user authentication and validation with the Nagios Log Server interface.
Currently by default LDAP traffic (without SSL/TLS) is unsigned and unencrypted making it vulnerable to man-in-the-middle attacks and eavesdropping. After the patch or the windows update would be applied, LDAPS must be enabled with Active Directory.
To Set up Active Directory Authentication using LDAP:
1. Enter the LDAP "Server" and "Port" attributes on the Server Overview tab of the LDAP Users page.
2. Enter the proper base for the Active Directory in the "Base DN" attribute.
3. Set the Search Scope.
4. Enter the Username Attribute.
5. Enter the Search Filter.
6. Verify that the settings are correct by clicking the Verify button.

Read More



Using Kill Commands In Linux

This article will guide you on how to use Kill #Commands In #Linux. Here, you will learn several ways to #terminate a running process. However, one should exercise caution to prevent incorrectly terminating a #process that should not be killed.
The #kill -9 command sends a SIGKILL signal indicating to a service to shut down immediately. An unresponsive program will ignore a kill command, but it will shut down whenever a kill -9 command is issued.

Read More



Monitoring VMware with Nagios XI

This article will guide you on the steps to Monitor VMware with #Nagios.
To Monitor the VMware host
i. Enter the Address, Username and Password of your #ESX / #ESXi host.
ii. Select Monitor the #VMware #Host.
iii. Click Next to go to Step 2.
iv. On step 2 you will configure all of the options for #monitoring.

Read More



Send Syslog with SSL TLS to Nagios Log Server

This article will guide you on how to Send #Syslog with #SSL / #TLS to Nagios Log Server by encryption which ensures that the #traffic between the #Linux machine and Nagios Log Server is not sent in plain text.

Read More



Process to install Docker on Windows

This article will guide you on the steps to install docker on Windows by setting up a Linux virtual #machine to run as a guest in Windows 10 Home.
Docker Desktop is an easy-to-install application for your #Mac or Windows environment that enables you to build and share containerized applications and microservices. Docker Desktop includes Docker #Engine, Docker CLI client, Docker Compose, Notary, #Kubernetes, and Credential Helper.
You can download #Docker #Desktop for Windows from Docker Hub. This relates to installing Docker Desktop on #Windows 10 Pro, Enterprise, and Education.

Read More



How to install Metricbeat on CentOS 7 to Gather Infrastructure Metrics

This article will guide you on the steps to install #Metricbeat and configure the Elastic Stack to collect and analyze system metrics. Metricbeat is configured using a #YAML configuration file. On Linux, this file is located at: /etc/metricbeat/metricbeat. yml. On #Docker, you will find it at: /usr/share/metricbeat/metricbeat.
Both #Filebeat and #Logstash can be used to send #logs from a file-based data source to a supported output destination.

Read More



How to fix Common Virtualmin DNS Problems

This article will guide you on how to tackle #Virtualmin Common #DNS #Errors which occurs when glue #records at the #registrar are not correct. So to fix this, you should use the correct records on the Virtualmin system. You should also ensure that the DNS server #IP addresses are correct.

Read More



Steps to Edit Sudoers File in Linux Process to get it done

This article will guide you on how to edit #Sudoers File in Linux which involves #root privileges, with a special focus on editing the /etc/sudoers file. You can configure who can use #sudo #commands by editing the /etc/sudoers file, or by adding configuration to the /etc/sudoers. To edit the sudoers file, we should always use the #visudo command. This uses your default editor to edit the sudoers configuration.

Read More



HAProxy Logging with Rsyslog on CentOS 8

This article will guide you on how to set up #HAProxy Logging #Rsyslog with some quick and easy steps. HAProxy is installed with RightScale load #balancer ServerTemplates. Load-balancer servers are also known as front-end servers. Generally, their purpose is to direct users to available #application servers. HAProxy can be installed in front of them to provide load balancing and high availability.

Read More



Steps to Setup Ansible AWS Dynamic Inventory

This article will guide you on how to use #AWS resources using Ansible with the help of Dynamic Inventory.

The #Ansible #inventory file defines the #hosts and groups of hosts upon which #commands, #modules, and tasks in a playbook operate. The file can be in one of many formats depending on your Ansible #environment and plugins.

Ansible will use it as an inventory source as long as it returns a #JSON structure like the one above when the script is called with the --list .

Read More



JupyterLab Environment on Ubuntu 18 04

This article will guide you on the process to set up a JupyterLab Environment on Ubuntu and made it accessible remotely. 

The JupyterLab Credential Store uses a password that you set upon first use. Each credential is encrypted with a hash of your password. The encrypted credentials are stored in the credentialstore file in the #directory you start #JupyterLab from.

You can also create new #environments from within Jupyter Notebook (home screen, Conda tab, and then click the plus sign). And you can create a notebook in any environment you want. Select the "Files" tab on the home screen and click the "New" dropdown menu, and in that menu select a Python environment from the list.

Read More



Clean up Domain Controller DNS Records with Powershell

This article will guide you on the process to clean up Stale/Dead #DC DNS records with the help of #PowerShell. You can see that it is easy to clean up domain controller records with the help of this method using few Windows PowerShell #commands.

To remove old DNS records from a domain controller, simply Remove #DNS Entries by:

1. Right click a #Zone in DNS console and go to properties, Under Name server tab delete the entries that are related to decommissioned DC.

2. Open DNS Console and Remove the IP of the decommissioned DC that might be present on the #network #adapter.

Read More



Integrate SNMP traps with Nagios

This article will guide you on how to integrate SNMP traps with #Nagios. #SNMP can comprehensively monitor not only the network elements like #routers and #switches, but can also be used to monitor #network servers. Details like server hardware description, physical location, IP address, available disk space and server uptime can be monitored through SNMP.

Read More



Using Designing Dynamic Forms in drupal

This article will guide you on using dynamic composite #forms in a #Drupal #CMS. These forms change their layout according to the data they receive from the prefilling services at the time of rendering, so each separate request for form generation produces a form with a different length or content.

Read More



Working with Production checkpoint in Hyper-V 2016

This article will guide you on how to change the checkpoints in Hyper-V. Hyper-V #checkpoints allow IT #administrators to easily save the existing state of a virtual #machine before any changes are made so that if a problem crops up due to the changes, the #VM can revert to its previous state. 

Virtual machine checkpoints (formerly known as virtual machine #snapshots) capture the state, data, and #hardware #configuration of a running virtual machine. 

Read More



Modify Data Store Path in Nagios Log Server

This article will guide you on the process to modify the data #storage location in a #Nagios #Log #Server.

The Nagios Core log, includes checks, notifications, external #commands, and events. This file is rotated daily into the /usr/local/nagios/var/archives folder by default setting in nagios.

Changing Data Path In Nagios Log Server involves: 

DATA_DIR="$ES_HOME/data" Modify it to the new path you would like to use: DATA_DIR="/new/path/data" Save the file and exit vi. The time it takes to move your existing data will vary depending on how much data there is and the speed of the source and destination #paths.

Read More



How to restore Deleted Active Directory Objects and Users

This article will put you through the steps to restore Deleted Active Directory Objects/Users. You can also right click on any unwanted change or object deletion in #Active #Directory and click “Rollback Change” to restore the change with a single-click.

Active Directory #Recycle Bin feature preserves all link valued and non link valued attributes. This means that a restored object will retain all it's settings when restored. By default, a deleted object can be restored within 180 days.

Read More



Create a Nagios log server instance in Amazon EC2 cloud

This article will guide you on how to create a #Nagios log server instance in the amazon ec2 #cloud. To enable these reports, simply enable Detailed Billing Reports With #Resources and Tags for your account. Then open up the Reports tab of the Billing #Console. From there you can look at the EC2 Instance Usage Report and the #EC2 Reserved Instance Utilization Report.

Read More



Method to store uploaded files in Azure using a Drupal CMS

This article will guide you on how to store the uploaded #files inside Azure in a Drupal #CMS. The Windows #Azure #Blob module allows for the uploading and storing of files on the Windows Azure #storage service. 

Read More



How to configure Redis as PHP Session Handler on Ubuntu 14 04

This article will guide you on the steps to configure Redis as a #PHP Session Handler.  #Redis is a powerful and fast key-value storage service. It can also be used as a #session handler for PHP, enabling scalable PHP #environments. Redis server can be used as a session handler for a PHP application running on Ubuntu and it is a data structure server. 

All of the data is stored in #RAM, so the speed of this system is phenomenal, often performing even better than #Memcached.

Redis is much more than a cache. But unlike a cache, Redis lets you operate on the values. There are 5 data types in Redis - Strings, Sets, Hash, Lists and Sorted Sets. Each data type exposes various #operations.

Read More



Method to Install Software From Source on Ubuntu

This article will guide you on steps to #install #software from #source on #Ubuntu. The Complete #command is apt-get which is the easiest way to install files/Softwares #packages.

Once installed, on the command line, you can use dpkg --listfiles packagename . For instance, dpkg --listfiles firefox . 

If you want to see what files a package contains without installing it, then you can install apt-file and use that.

Read More



Using Bpytop to monitor Linux and FreeBSD Resources

This article will guide you on how to use Bpytop Monitoring for Linux & FreeBSD Resources.

#Bpytop is a great utility which is useful on your #Linux, #macOS, and #FreeBSD as a #resource #monitor. It is much faster than bashtop and works pretty well as Python 3 is standard on many Unix boxes.

Read More



Process to install node js Windows

This article will guide you on how to install Node.js and verify its installation. Additionally, you will also learn how to uninstall it. #Node . js is a runtime environment that allows software developers to launch both the #frontend and #backend of web apps using #JavaScript. Although JS underpins all the processes for app assembly, as a backend #development #environment, Node. js, differs from the frontend environment.

Read More



Steps to create a Self-Signed SSL Certificate for Apache in CentOS 8

This article will guide you on how to configure #Apache to serve encrypted requests using a self-signed SSL certificate and to redirect unencrypted HTTP requests to #HTTPS. Self-signed #certificates or certificates issued by a private CAs are not appropriate for use with the general public. It can only properly verify the identity of the server when it is signed by a trusted third party because any attacker can create a self-signed certificate and launch a man-in-the-middle attack.

Read More



Download multiple files simultaneously using cURL

This article will guide you on the process to #download multiple files using curl utility. Curl allows downloading files simultaneously from a remote system.

The curl tool lets us fetch a given #URL from the command-line. Sometimes we want to save a web file to our own computer. Other times we might pipe it directly into another program. Either way, #curl has us covered.

This is the basic usage of curl:

curl http://some.url --output some.file

Read More



How to create a new host user in DNN

This guide will help you to create a new host user in #DNN by registering the user from the front end and editing the dbo.Users table of the #database.

DNN (formerly #DotNetNuke) is a web content management system and web application framework based on #Microsoft . NET. The DNN Platform Edition is open source. DNN is written in C#, though it existed for many years as a VB.NET project.

Read More



Export data into Excel in Ionic Application using XLSX

This article will guide you on the steps to #export data into excel file using #XLSX.

How do I export #data from angular to excel?

Environment setup involves;

Step 1: Downloading the XLSX Module.

Step 2: Downloading the File-Saver Module.

Step 3: Creating a Download #Excel button.

Step 4: Writing exportexcel() method.

Step 5: HTML #Table from which the data will be downloaded.

Read More



How to Secure Django Admin

This article will guide you on the methods to secure #Django admin. You can Deploy your site behind #HTTPS.

Best practices for keeping Django admin secure.

Something less sophisticated like a fake Django admin login screen page django-admin-honeypot.

It is always better for security to deploy your site behind HTTPS. Deploy your site behind HTTPS, it's easy to implement and it's free #Certbot, just choose #software and system and you're ready to go.


Read More



Send NXLogs with SSL TLS to Nagios Log Server

This guide will guide you on how to send NXLogs with SSL/TLS to #Nagios #Log #Server. Encryption ensures that the traffic between the #Windows machine and Nagios Log Server is not sent in plain text.

Read More



Monitoring Performance Counters in Nagios XI Using NCPA

This article will guide you on how to configure #Nagios XI to monitor performance counters by monitoring Performance Counters in Nagios XI is possible using #NCPA as well as use cases where real-time monitoring actually provides no benefit at all, and may also be both a distraction and a detriment to monitoring #teams and #admins.

Read More



How to Run AWS Amazon DynamoDB Steps to do it

This article will guide you on how to set up #Amazon DynamoDB which can be downloaded as an executable .jar file.

#DynamoDB uses hashing and B-trees to manage #data. Upon entry, data is first distributed into different partitions by hashing on the #partition key. Each partition can store up to 10GB of data and handle by default 1,000 write capacity units (WCU) and 3,000 read capacity units (RCU).

Read More



Cloning existing KVM virtual machine images on Linux

This article will guide you on how to use the virt-clone command which provides a number of options to clone a #KVM #VM. You can use the virt-sysprep if you need to clone the VM and make/reset anything inside the guest #OS.

Read More



Selecting the number of vCPUs and Cores for a Virtual Machine

This articles will guide you when selecting the number of vCPUs and Cores for a Virtual Machine which depends on the operating system used and some other factors.

Basically, When Selecting the Number of #vCPUs and #Cores for a Virtual Machine, you can use all CPU #resources allocated to a virtual machine, it must see one 8 core #processor, 2 vCPUs with 4 cores each or 1 vCPU with 4 cores in two threads instead of 8 vCPUs.

Read More



Testing RPC ports with PowerShell

This article will guide you on how to go about pinging available RPC ports with PowerShell and #Sysinternals tools and we can test #RPC #ports with #PowerShell.

In #Windows, do this by typing "cmd" in the search box in the Start Menu and clicking the command prompt icon. In the command prompt window, type "telnet" followed by a space, then an IP address or domain name followed by another space, and then the port number.

Read More



Install and Configure Free VMware Hypervisor

This article will guide you on the process to Configure Free VMware Hypervisor, to create a virtual #machine, and install a guest operating system.

“VMware vSphere Hypervisor #VMware #vSphere #Hypervisor is a free product that provides a simple and easy way to get started with #virtualization at no cost.

Read More



Azure CLI create CDN

This article will guide you on the steps to create Azure CLI CDN.

What is #Azure #CDN?

Azure Content Delivery #Network (CDN) lets you reduce load times, save #bandwidth and speed responsiveness—whether you are developing or managing #websites or mobile #apps or encoding and distributing #streaming #media, gaming #software, firmware updates or IoT endpoints.

Azure CDN from #Microsoft provides Azure customers the ability to deliver content from Microsoft's own global CDN network.

Read More



SSLSessionCache cannot occur within VirtualHost section

This article will guide you on the steps to resolve #SSLSessionCache cannot occur within #VirtualHost section issue. Basically, SSLSessionCache is a file-based #cache of established #SSL sessions.

Read More



Process to rsync only new files in Linux

This article will guide you on the steps to #transfer only the new files using rsync locally and from Local to #Remote #Linux.

Syncing to a remote system is trivial if you have SSH access to the remote #machine and #rsync installed on both sides. Once you have #SSH access verified between the two machines, you can #sync a folder to a remote #computer by using the rsync syntax.

Read More



Installation and Configuration of ClamAV

This article will guide you on the steps to install #Clam #AntiVirus which is an open-source #antivirus tool to detect many types of #malicious #software, including #viruses. 

Read More



Step by step process to Secure Apache with Lets Encrypt on CentOS 8

This article will guide you on the process to secure #Apache with Let’s Encrypt by installing Let's Encrypt #Certbot client, downloading #SSL #certificates for the #domain, and setting up automatic certificate renewal.

The objective of Let's Encrypt and the #ACME protocol is to make it possible to set up an #HTTPS server and have it automatically obtain a browser-trusted certificate, without any human intervention.

Read More



How To Connect to a Redis Database Different ways to do it

This article will guide you on the steps to connect to a #Redis #database using different commands like redis-cli using #commands.

Running redis-cli followed by a command name and its arguments will send this command to the Redis instance running on localhost at port 6379. You can change the host and #port used by redis-cli, just try the --help option to check the usage information.

Read More



Monitoring squid proxy server with Nagios log server

This article will guide you on how to configure the #Nagios log server to use a #proxy server.

#Squid is a caching and forwarding #HTTP web proxy. It has a wide variety of uses, including speeding up a web server by caching repeated requests, #caching web, #DNS and other computer network #lookups for a group of people sharing network resources, and aiding security by filtering #traffic.

Read More



How To Troubleshoot Common HAProxy Errors

This article will guide you on the different methods to #troubleshooting and fix common #HAProxy errors which can range from diagnosing #errors with the service itself to locating misconfigured options for modules. 

Read More



Configure Nagios log server to use a proxy server

This article will guide you on the steps to configure the #Nagios log server to use a #proxy server.

In order to #monitor the server using Nagios Core, you will need to add the host and services to nagios #server from the command line. 

#Logs located in the /usr/local/nagios/var/archives folder are used as the data source for the Availability and #SLA #reports.

Read More



NFS server not responding timed out error How to fix

This article will guide you on how to fix #NFS server not responding timed out #error which occurs when there is a heavy #server or #network load.

Why NFS is not working?

i. Check the file /proc/fs/nfs/exports and make sure the volume and client are listed correctly.

ii. Finally, try to ping the client from the server, and try to ping the server from the client. 

iii. If this doesn't work, or if there is packet loss, you may have lower-level network problems.

Read More



OpenVPN dns leak How to fix it

This article will guide you on the steps to fix #OpenVPN DNS leak issue. 

A DNS leak occurs when the browser sends a #DNS request directly, thus ignoring the #VPN.  Although the link will seem encrypted or anonymous, the ISP will be able to track your online.

Read More



Curl error 55 How to fix this error

This article will guide you on how to solve #Curl error 55 which occurs when fails to upload the file to the #server due to Insufficient quotas, improper #firewall settings, incorrect time settings, and so on.

Read More



Docker Cannot connect to the Docker daemon

This article will guide you on the steps to fix 'Docker: Cannot connect to the #Docker daemon' error which occurs if the docker #daemon is not running on the #host or the user not having root privileges. 

Read More



cURL 18 transfer closed with outstanding read data remaining

This article will guide you on the steps to fix cURL error 'cURL 18 transfer closed with outstanding read data remaining' which occurs while retrieving data from a #URL using a #cURL.

This #error can be fixed by correcting the permission of #directory '/var/cache/nginx'

Read More



Backup, Restore and Migrate a MongoDB database on CentOS 8

MongoDB is highly scalable, using shards. Horizontal scalability is a big plus in most #NoSQL databases. MongoDB is no exception. It is also highly reliable due to its replica sets, and the data is replicated in more nodes asynchronously.

This article will guide you on the steps to perform #backup, #restore and #migrate a #MongoDB #database on #CentOS 8.

Read More



Logs Not Searchable or Not Coming In Nagios Log Server

This article will guide you in solving #Logs Not Searchable or Not Coming In #Nagios Log #Server which occurs in the process of running a query in the Nagios dashboard.

Read More



Invalid State of a Virtual Machine on VMWare ESXi

This article will guide you on the steps to resolve the Invalid State of a Virtual Machine on VMWare #ESXi error which relates to #orphaned virtual machines.

A virtual machine can show up as invalid or orphaned in these situations. After a vMotion or #VMware DRS migration. After a VMware HA #host failure occurs, or after the #ESX host comes out of maintenance mode. A virtual machine is deleted outside of vCenter Server. #vCenter Server is restarted while a migration is in progress.

Read More



Steps to Install Pure-FTPD on Ubuntu 18.04 LTS Server

#Pure-FTPd is a fast, production-quality, standard-conformant #FTP (SSL/TLS) server, based upon Troll-FTPd.

This article will guide you through the processes to install Pure-FTPd on your #Ubuntu server.

Read More



Advantages of using our Server Management Services

Ibmi Media Server administrators will help you install, configure, and maintain various types of hardware and software, which often involves creating user accounts, carrying out backup and recovery functions, and monitoring the performance of servers at all times. Our Support Experts will take care of configuring, managing, and implementing operating systems.

Read More



After hours tech support Common issues and how to prevent them

After Hours Tech Support Help Desk is designed to meet your immediate technology support needs during scheduled outside of regular business hours.  We encourage you to use this service for any unexpected technology support troubleshooting needs that may arise.

Read More



AWS Config Systems Manager Automation error

This aws error has to do with the AWS Config rule vpc-sg-open-only-to-authorized-ports and Systems Manager Automation document AWS-DisablePublicAccessForSecurityGroup which throws an error "InvalidPermission.NotFound".

Read More



Install ioncube on Directadmin control panel

This article will guide you on the steps to set up the Ioncube loader and fix DirectAdmin Ioncube errors such as incorrect timezone and misconfiguration in the php.ini file which cause errors after installing the Ioncube loader in DirectAdmin.

Read More



RAM Disk in Nagios XI

This article will guide you on how to make use of a RAM disk can provide huge performance improvements on larger systems or any system where check latencies are greater than 2 seconds.

Read More



Scheduling Reports in Nagios Log Server Process to do it

This article will guide you on the steps to manage users in Nagios Log Server by Scheduling Reports in Nagios Log Server which is used by Nagios Log Server Administrators to automate reporting.

Read More



Running Out Of Disk Space On The Nagios XI VM

This article will guide you on how to fix 'running out of disk space on the Nagios' problem.

Read More



Unable to open Outlook attachments

This article will guide you on the different methods to tackle Outlook error message "unable to open outlook attachments" which occurs while opening an Outlook attachment. 

Read More



Cleanup tasks with Docker How to run it quickly

This tutorial will guide you on how to perform cleanup tasks with Docker which involves keeping the Docker clean to solve the server space issue that is especially important when Docker is running as a virtual machine.

Read More



Solve Oversized OST File issues in Outlook

This article will guide you on the different methods to fix an over-sized OST file which affects data accessibility and synchronization.

Read More



Deploy Static Website to the Cloud

This article will guide you through the steps to deploy a static website.

Read More



Install and Configure Salt Master on Ubuntu

This article will give you a comprehensive guide on the steps to perform installation and configuration of Salt Master and Minion servers on Ubuntu which involves a series of steps that include installing the master daemon, initial master configuration, installing a separate minion, and configuring the Minion.

Read More



Using Ansible to copy MySQL databases

This article will guide us on how to perform database migration using Ansible as the controller which can help to copy a MySQL database from one remote server to another.

Read More



Universally Unique Identifier UUID with uuidgen

This tutorial will guide you the steps to generate Universally Unique Identifiers (UUIDs) with uuidgen.

Read More



Configure Postfix as a Send Only SMTP Server

This article will guide you on how to perform configuration of Postfix as a Send Only SMTP Server which involves a series of steps that include installing postfix and modifying the configuration file.

Read More



Reduce Windows edb size

This article will guide you in using different methods to reduce Windows.edb file size by simply defragmenting, removing, and re-creating, moving the windows.edb file into another drive and so on.

Read More



VMWare how to find VMS by IP or MAC address

This tutorial will guide you on how to easily find VMS by IP or mac address.

Read More



Process of forwarding Nagios Log Server to another Destination

This article will guide you on the steps to forward Nagios log to another server by creating a new output in NLS.

Read More



PHPMailer smtp error could not authenticate

This article will guide you on how to fix PHPMailer error "smtp error: could not authenticate" which generally occurs when the application can’t establish an SMTP connection to the mail server. This is experienced when users send emails via PHPMailer using SMTP authentication.

Read More



Steps to kill an unresponsive Virtual Machine

This article will guide you through the steps to kill an unresponsive Virtual Machine in VMWare ESXi.

Read More



MongoDB connection timeout

This article will help you to fix common MongoDB errors such as MongoDB connection timeout which generally occurs due to the wrong settings in the MongoDB server, bad connection parameters and so on.

Read More



An Operating System Wasnt Found in the process of booting Windows

This guide will help to fix the error "An Operating System Wasn’t Found when booting Windows" which occurs if there is no operating system bootloader found on the current disk.

Read More



Major effects of shifting focus to CentOS Stream

This article is about the major effects of shifting focus to the CentOS Stream which is a sudden move by Red Hat.

Read More



Errors have been detected in the file xxx ost

This article will guide you on ways to troubleshoot the error "Errors have been detected in the file xxx.ost".

Read More



Set up SNMP VMWare ESXi 5 5

This article will guide you on the steps to follow to configure SNMP VMWare ESXi 5.5.

Read More



Configuration File Is Out Of Date in Nagios

This article will guide you on the different methods to fix Nagios error "Configuration File Is Out Of Date" in CCM after applying configuration changes in Nagios due to incorrect configuration of system time.

Read More



BSOD Error 0x0000007B on Boot on Windows Server 2008 R2 How to fix

This article will guide you on how to fix Windows error 0x0000007B which generally occurs due to a number of reasons like issues with device drivers , viruses, and data corruption.

Read More



Steps to remove Hidden Network Adapters in Windows

This article will guide you on the steps to remove Hidden Network Adapters in Windows which causes issues while assigning a previously used static IP address for a new network interface.

Read More



Troubleshooting Redis for Pivotal Platform Defined Errors

This article will guide you on the solutions to defined errors in the process of troubleshooting Redis for Pivotal Platform.

Read More



Page Splits in SQL Server

This article will guide you on how to prevent page splits which can cause performance issues.

Read More



Microsoft Outlook conflicting or unsupported encryption capabilities

This article will help to fix "Outlook conflicting or unsupported encryption capabilities" by simply turning off e-mail address matching for certificates and it depends on the version of Outlook you are running.

Read More