Explore information related to log

NRPE: No Output Returned From Plugin - How to fix this Nagios error ?

This article covers how to resolve Nagios error, NRPE: No Output Returned From Plugin. This error happens as a result of Permissions or Missing plugin.

To fix this Nagios error:

1. The most common solution is to check the permissions on the check_nrpe binary on the Nagios XI server:

ls -la /usr/local/nagios/libexec/check_nrpe

The expected permissions should resemble:

-rwxrwxr-x. 1 nagios nagios  75444 Nov 21 01:38 check_nrpe

2. If not, change ownership to user/group "nagios" and fix up the permissions:

$ chown nagios:nagios /usr/local/nagios/libexec/check_nrpe
$ chmod u+rwx /usr/local/nagios/libexec/check_nrpe
$ chmod u+rx /usr/local/nagios/libexec/check_nrpe

Read More


Manage Transaction Log File during Data Load - Do it Now

This article covers how to manage transaction log files in SQL Server for our customers. A transaction log is a file – integral part of every SQL Server database. It contains log records produced during the logging process in a SQL Server database.

The transaction log is the most important component of a SQL Server database when it comes to the disaster recovery – however, it must be uncorrupted.

The only way to truncate the log, so the space can be reused, is to perform a SQL transaction log backup. Therefore the most common reason for a transaction log file to have grown extremely large is because the database is in the FULL recovery model and LOG backups haven't been taken for a long time.


How do I stop a transaction log from filling up?

1. To keep the log from filling up again, schedule log backups frequently. 

2. When the recovery mode for a database is set to Full, then a transaction log backup job must be created in addition to backing up the database itself.


To fix a transaction log for a database is full:

1. Backing up the log.

2. Freeing disk space so that the log can automatically grow.

3. Moving the log file to a disk drive with sufficient space.

4. Increasing the size of a log file.

5. Adding a log file on a different disk.

Read More


Microsoft SQL Server Error 916 - Fix it now

This article covers method to resolve Microsoft SQL Server Error 916 for our customers.

The main problem is due to bugs present in SQL Server Management Studio that prevents the user to connect to the database and refuses to display the database list.

How to solve Microsoft SQL server error 916:
If you receive the following error while using Microsoft SQL Server Management Studio 2008:
The server principal "username" is not able to access the database "dbname" under the current security context. (Microsoft SQL Server, Error: 916).

Causes of SQL Server Error 916:
1. The user is not permitted to view the data of selected column within the database.
2. The database is currently not available.
3. There are multiple columns such as Size, Space available, Data Space Used, Default file group, Index Space Used, Mail host, Primary file path and user has added at least one of them to the list of Object Explorer Details.
4. If the Auto Close option for the database is enabled, then Collation column cannot be retrieved by SQL Server Management Studio (SSMS).
5. For a database, Collation column contains NULL.

In order to view the granted permissions for the guest-user, the following command is helpful if run by a member of a Sysadmin fixed server.
The query is as follows:

USE msdb;
 SELECT prins.name AS grantee_name, perms.*
 FROM sys.database_permissions AS perms
 JOIN sys.database_principals AS prins
 ON perms.grantee_principal_id = prins.principal_id
 WHERE prins.name = ‘guest’ AND perms.permission_name = ‘CONNECT’;
 GO

On running the above command, a table is presented to the user containing all the attributes of guest user.
However, an empty result shows that guest user is disabled in the database and again the SQL Server error 916 will be displayed.
To overcome the error you may perform the following available solutions.

To fix this SQL server error 916:
1. In Object Explorer, click databases.
2. Display "Object Explorer Details" (F7) or "View –> Object Explorer Details".
3. Right-click the column headers and deselect "collation".
4. Refresh the databases.

Read More


Nagios Failed to Parse Date Error - Fix it now

This article covers Nagios Failed to Parse Date Error.

Basically, the logs coming in on the same input need to use the same formatting.
To fix this Nagios error,  make sure that all devices use the same date format or configure another input for these devices.
For example:

syslog {
    port => xxxx
    type => 'alternative-syslog'
    tags => 'alternative Linux-Max'
}

Read More


GUI testing for Web Applications and Smart devices – An overview

This article covers GUI testing which refers to testing the functions of an application that are visible to a user. In the example of a calculator application, this would include verifying that the application responds correctly to events such as clicking on the number and function buttons.
Basically, the web UI testing revolves around the graphical user interface (GUI) testing that includes testing of both the functionality and usability of the website or the web app. By specifically using web UI testing, it refers to testing GUI elements like fonts, layouts, buttons, checkboxes, images, colours, and so on.

What we check in GUI Testing?
1. Testing the size, position, height, width of the visual elements.
2. Verifying and testing the error messages are displayed or not.
3. Testing different sections of the display screen.
4. Verifying the usability of carousel arrows.
5. Checking the navigation elements at the top of the page.

GUI Testing is a software testing type that checks the Graphical User Interface of the Software.

The purpose of Graphical User Interface (GUI) Testing is to ensure the functionalities of software application work as per specifications by checking screens and controls like menus, buttons, icons, and so on.

Benefits of GUI Testing:
1. Tests the user interface from the users perspective.
2. Efficiently reduces the number of risks towards the end of development life cycle.
3. Offers developers and testers ease of use and learning.
4. Helps validate the compliance of various icons and elements with their design specifications.

Read More


Administration Page Fails To Display in Nagios Log Server

This article covers how to resolve the 'Administration Page Fails To Display' in the Nagios Log Server issue for our customers.


To fix this Nagios error, all you need to do is to:
1. Increase the PHP  memory_limit in php.ini file.
You can execute the following command:

$ find /etc -name php.ini

2. Then make the necessary changes.
3. After which you should restart Apache for the changes to take effect using one of the commands below:

$ systemctl restart apache2.service

4. Once the service has restarted, the Administration page will be accessible.

If the problem persists, please increase the value again.


When using the vi editor in Linux:
1. To make changes press i on the keyboard first to enter insert mode
2. Press Esc to exit insert mode
3. When you have finished, save the changes in vi by typing :wq and press Enter

Read More


Configure Multi-Tenancy in Nagios Log Server - How to perform it

This article covers how to configure multi-tenancy in Nagios log server.
Multi-Tenancy works by assigning which hosts a user is allowed to see in the Nagios Log Server interface.
Hosts can also be placed in a host list and then applied to the users who will be allowed access.
NOTE: API users and administrators will be able to work around any restrictions placed on them, this
functionality only applies for regular users.

Read More


Enable Windows Lock Screen after Inactivity via GPO - How to do it

This article covers how to Enable Windows Lock Screen on domain computers or servers using Group Policy. Locking the computer screen when the user is inactive (idle) is an important information security element.
The user may forget to lock his desktop (with the keyboard shortcut Win + L) when he needs to leave the workplace for a short time.
If any other employee or client who is nearby can access his data. The auto-lock screen policy will fix this flaw.
After some time of inactivity (idle), the user's desktop will be automatically locked, and the user will need to re-enter their domain password to return to the session.

To enable lock screen with group policy:
1. Create a new GPO then edit it and go to:
Computer Config>Policies>Windows Settings>Security Settings>Local Policies>Security Options.
2. Find Interactive logon: Machine inactivity limit .
3. Set that to whatever time you want and it will lock the PC after it hits that timer.

To change my lock screen wallpaper using group policy:
1. Run GPEDIT. MSC.
2. Go this path "Computer Configuration\Policies\Administrative Templates\Control Panel\Personalization".
3. Enable the GP "Force a specific default lock screen image".
4. Specify the path to the image file.
5. Click OK.

To Find Windows 10's Spotlight Lock Screen Pictures:
1. Click View in File Explorer.
2. Click Options.
3. Click the View tab.
4. Select "Show hidden files, folders and drives" and click Apply.
5. Go to This PC > Local Disk (C:) > Users > [YOUR USERNAME] > AppData > Local > Packages > Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy > LocalState > Assets.

Read More


Listen on Privileged Ports with Nagios Log Servers - How to set it up

This article covers how to configure Nagios Log Servers to listen on privileged ports. Now Nagios Log Server Administrators who would like configure Nagios Log Server to listen on ports below 1024 which are privileged in Linux. This can be useful if you have legacy devices that can only send on specific ports (e.g. syslog on port 514).

Ports below 1024 are privileged on Linux and only allow the root user to listen on them. 

This can be implemented via two solutions:

1. Run Logstash as root

2. Use setcap


To use Use setcap for Listening On Privileged Ports:

Here, you can use the logstash running as the nagios user but this method may be less secure in some environments as it will allow any Java process to listen on privileged ports.

i. The logstash init configuration file requires three lines to be added to the end of it, open the file with the following command:

On Debian | Ubuntu:

$ vi /etc/default/logstash

or

$ sudo /etc/default/logstash

2. Then, Add the following three lines to the end of the file:

echo $(dirname $(find /usr/lib -name libjli.so)) | awk '{print $1}'> /etc/ld.so.conf.d/java.conf

eval "$(which ldconfig)"

setcap 'cap_net_bind_service=+ep' $(readlink -f $(which java))

3. Save the file and close vi.

4. Restart Logstash Service

The logstash service needs to be restarted for these changes to apply:

$ sudo systemctl restart lagstash.service

Read More


Automatically Log in to Windows without Password - How to get this done

This article covers methods to automatically log in to Windows without password.

Here, you can disable password login on Windows 10 and boot the computer directly to the user’s desktop. In order to temporarily disable automatic logon in Windows and manually specify the user credentials under which you need to sign in, you must hold down the Shift key while Windows is booting.


CMD is the official and tricky way to bypass Windows 10 admin password. In this process, you will need a Windows Installation disk and If you don't have the same, then you can create a bootable USB drive consisting of Windows 10. Also, you need to disable UEFI secure boot option from the BIOS settings.


To Disable Windows 10 Login Password via the User Account Settings:

1. Press Win+R;

2. In the Run dialog box, enter netplwiz or control userpasswords2 command;

3. In the next window with the list of local user accounts, uncheck the option “User must enter a username and password to use this computer” and save changes (OK);


To Automatically log in to your Windows 10 PC:

1. Open the Run command box (Start > All apps > Windows System > Run or press Windows key + R).

2. A User Accounts window will open.

3. A new window labeled Automatically sign in will pop up.

4. Your computer will now bypass the log-in page when you turn on your PC, but it will not bypass the login page when you unlock your PC.

Read More


Vital Command Line commands for Linux Admins with examples

This article covers a few Vital Command Line for Linux Admins. The Linux command line is a text interface to your computer. Allows users to execute commands by manually typing at the terminal, or has the ability to automatically execute commands which were programmed in “Shell Scripts”.


Common commands in Linux:

1. su command

The su command exists on most unix-like systems. It lets you run a command as another user, provided you know that user's password. When run with no user specified, su will default to the root account. The command to run must be passed using the -c option.


2. which command

which command in Linux is a command which is used to locate the executable file associated with the given command by searching it in the path environment variable. It has 3 return status as follows: 0 : If all specified commands are found and executable.


3. Who am I command line?

whoami command is used both in Unix Operating System and as well as in Windows Operating System. It is basically the concatenation of the strings “who”,”am”,”i” as whoami. It displays the username of the current user when this command is invoked. It is similar as running the id command with the options -un.


4. What does W command do in Linux?

w is a command-line utility that displays information about currently logged in users and what each user is doing. It also gives information about how long the system has been running, the current time, and the system load average.



Facts about the demand in Linux admins?

1. The job prospects for Linux System Administrator are favorable. 

2. According to the US Bureau of Labor Statistics (BLS), there is expected to be a growth of 6 percent from 2016 to 2026. 

3. Candidates who have a firm hold on cloud computing and other latest technologies have bright chances.

Read More


An error occurred while reconnecting - Fix this Windows error now

This article covers methods to resolve fix 'An error occurred while reconnecting' Windows error. 


Causes for 'The Local Device Name is already in Use' Error on Windows:

1. Drive mapping has gone wrong – The process of network drive mapping can sometimes produce problems like this one when it comes to drive letters.

2. Some drive letters are unassigned – Some drives may have incorrect or even missing drive letters which causes this error to appear.

3. File and Printer Sharing is disabled – If this option is disabled in any firewall you might be using, networking becomes difficult and full of errors.

4. No space on the server – Users have reported that they had to free up at least a couple of gigabytes on the root drive of the network’s server to get rid of the problem.


To fix 'The Local Device Name is already in Use' Error on Windows:

Remap the Drive Using Command Prompt

Remapping the network drive is the official solution recommended by Microsoft for users facing this problem. However, it has worked for many users and it has become one of the most used methods for this problem. 

Check out the steps to implement this;

1. Search for “Command Prompt” either right in the Start menu or by tapping the search button right next to it. Right-click on the first result which will appear at the top and select the “Run as administrator” option.

2. Users who are using an older version of Windows can use the Windows Logo Key + R key combination in order to bring up the Run dialog box. Type in “cmd” in the box and use the Ctrl + Shift + Enter key combination in order to run Command Prompt as an administrator.

3. Copy and paste the command shown below and make sure you click the Enter key on your keyboard.

net use * /delete

4. After you see that the operation is completed successfully, run the following command:

net use Z: \\server\share /user:username password

5. Make sure you replace the username and password placeholders with the correct username and password. Check to see if the problem is resolved!

Read More


SSH Servers Clients and Keys - More about it now

This article covers important information about SSH Servers, Clients and Keys. Use SSH keys for authentication when you are connecting to your server, or even between your servers.

They can greatly simplify and increase the security of your login process. 

When keys are implemented correctly they provide a secure, fast, and easy way of accessing your cloud server.


Turn off password authentication Linux:

With SSH key authentication configured and tested, you can disable password authentication for SSH all together to prevent brute-forcing. When logged in to your cloud server.

1. Open the SSH configuration file with the following command.

$ sudo nano /etc/ssh/sshd_config

2. Set the password authentication to no to disable clear text passwords.

PasswordAuthentication no

3. Check that public key authentication is enabled, just to be safe and not get locked out from your server. If you do find yourself unable to log in with SSH, you can always use the Web terminal control panel.

PubkeyAuthentication yes

Then save and exit the editor.

4. Restart the SSH service to apply the changes by using the command below.

$ sudo systemctl restart sshd

With that done your cloud server is now another step along towards security. 

Malicious attempts to connect to your server will results in authentication rejection, as plain passwords are not allowed, and brute-forcing an RSA key is practically impossible.

Read More


isc-dhcp-server Job failed to start - Resolve it now

This article covers method to resolve DHCP 'isc-dhcp-server: Job failed to start' error. Basically, 'isc-dhcp-server: Job failed to start' error can happen if there is any issues with the commands that we run.


You can try to restart the service; if it really is an issue with the service starting before the network is up restarting it once the network is up should work:

$ sudo systemctl start restart isc-dhcp-server.service


If that doesn't work then try and investigate further why it's not starting by first getting the current status of the service:

$ sudo systemctl status isc-dhcp-server.service


That should also give you a PID for which you can further investigate with journaltctl where XXXX is the PID of the service:

$ journalctl _PID=XXXXX


Also, what caused/led you to do the following? Perhaps try undoing those changes as I'm not sure if that's helping or hurting. Was the /etc/init/isc-dhcp-server.conf file already there or did you manually create it?

So add a "Sleep 30" to the /etc/init/isc-dhcp-server.conf file. Also add " up service dhcp3-server restart " to my  /etc/network/interfaces file. 

Read More


restorecond Will not restore a file with more than one hard link - How to resolve this issue

This article covers Tips to fix 'restorecond: Will not restore a file with more than one hard link' error.

To fix this problem type the following commands:

# rm /etc/sysconfig/networking/profiles/default/resolv.conf

# restorecon /etc/resolv.conf

# ln /etc/resolv.conf /etc/sysconfig/networking/profiles/default/resolv.conf

Read More


Log Suspicious Martian Packets Un-routable Source Addresses in Linux

This article covers how to block and log suspicious martian packets on Linux servers.


Log Suspicious Martian Packets in Linux:

On the public Internet, such a packet's (Martian) source address is either spoofed, and it cannot originate as claimed, or the packet cannot be delivered. 

Both IPv4 and IPv6, martian packets have a source or destination addresses within special-use ranges as per RFC 6890.


Benefits of logging of martians packets:

As I said earlier a martian packet is a packet with a source address that cannot be routed over the public Internet. 

Such a packet is waste of resources on your server. 

Often martian and unroutable packet used for a dangerous purpose or DoS/DDOS your server. 

So you must drop bad martian packet earlier and log into your server for further inspection.


To log Martian packets on Linux?

You need to use sysctl command command to view or set Linux kernel variables that can logs packets with un-routable source addresses to the kernel log file such as /var/log/messages.


To log suspicious martian packets on Linux:

You need to set the following variables to 1 in /etc/sysctl.conf file:

net.ipv4.conf.all.log_martians

net.ipv4.conf.default.log_martians


Edit file /etc/sysctl.conf, enter:

# vi /etc/sysctl.conf

Append/edit as follows:

net.ipv4.conf.all.log_martians=1 

net.ipv4.conf.default.log_martians=1


Save and close the file.

To load changes, type:

# sysctl -p

Read More


WordPress 401 error - Fix it now

This article covers easy to follow methods to resolve WordPress 401 error. 

The 401 error has multiple names including Error 401 and 401 unauthorized error. 

These errors are sometimes accompanied by a message ‘Access is denied due to invalid credentials’ or ‘Authorization required’.


To fix the 401 error in WordPress:

1. Temporarily Remove Password Protection on WordPress Admin

2. Clear Firewall Cache to Solve 401 Error in WordPress

3. Deactivate All WordPress Plugins

4. Switch to a Default WordPress Theme

5. Reset WordPress Password

Read More


Virtuozzo VS Hyper-V - Which is better

This article covers some comparison between Virtuozzo VS Hyper-V. 

Hyper-V and Virtuozzo are both popular VPS platforms used by a large number of web hosting providers for the provisioning of Windows VPS hosting services, with Virtuozzo being favoured for Windows Server 2003 VPS hosting and Hyper-V being the most reliable solution for Windows Server 2008 VPS hosting services.


Advantages of using Virtuozzo over Hyper-V include:

1. Direct Linux support – Virtuozzo can be installed on their Windows or Linux VPS hosting nodes, and although Hyper-V can be used for the hosting of virtual machines running Linux it is only available for use on Windows Server 2008.

2. Web based control panel (Parallels Power Panel) – the Parallels Power Panel will allow users to manage their Linux or Windows VPS hosting server from a web based interface meaning that if they aren't in a situation where they can access their VPS server via Remote Desktop then they can use the Power Panel to restart their VPS server if necessary or to kill any services or processes which may be overloading their VPS server’s resources.

3. Separate application – the fact that Virtuozzo is a separate application which can be installed on top of the operating system can have its advantages in some cases, for example if a web hosting providers wishes to discontinue using a server for VPS server hosting then all they have to do is uninstall the application from their server, although in most cases it is advised to do an OS reload anyway to ensure that you have a blank canvas to start with.


Advantages of using Hyper-V over Virtuozzo:

1. Cost – with Virtuozzo VPS hosting web hosting providers have to pay for the cost of the Virtuozzo application and the cost of the operating system license, but because Hyper-V is part of the Windows Server 2008 operating system they will only need to pay for the operating system license – this can help to reduce the costs of Hyper-V VPS hosting services and as the cost of the operating system falls, prices will fall further and will eventually meet Virtuozzo Windows Server 2003 hosting services when it comes to price which will mean that people will gradually move over to using Windows Server 2008 VPS hosting.

2. Reliability – as Hyper-V is part of the Window Server 2008 operating system, web hosting providers are able to guarantee reliable Windows Server 2008 VPS server hosting services.

3. Native support for Windows Server 2008 – although Virtuozzo may have support for Windows Server 2008, it hasn’t been able to offer the most reliable of Windows Server 2008 VPS hosting services.

Read More


500 oops vsftpd refusing to run with writable root inside chroot - Fix it now

This article covers fixes to '500 oops vsftpd refusing to run with writable root inside chroot()' error which occurs while connecting to vsftpd if it is a newly installed vsftpd or if it is upgraded. 


To fix this error, you need to upgrade your Server by adding the jessie repository to my Debian installation and upgrade it so:

echo "deb http://ftp.us.debian.org/debian jessie main contrib non-free" >> /etc/apt/sources.list

aptitude update

aptitude upgrade vsftpd

echo "allow_writeable_chroot=YES" >> /etc/vsftpd.conf

service vsftpd restart


Also, add the value:

seccomp_sandbox=NO

to the configuration and restart the service with service vsftpd restart:

Then "allow_writeable_chroot=YES" 

Read More


NFS vs SMB - Which is better

This article will guide you on the comparison between NFS and SBM performance. 

NFS vs. SMB comparison. 

Server Messaging protocol (SMB) is the native file sharing protocol implemented in Windows systems.

The Network File System (#NFS) protocol is used by Linux systems to share files and folders.


NFS, or Network File System, was designed in 1984 by Sun Microsystems. This distributed file system protocol allows a user on a client computer to access files over a network in the same way they would access a local storage file. Because it is an open standard, anyone can implement the protocol.


The Server Message Block Protocol (#SMB protocol) is a client-server communication protocol used for sharing access to files, printers, serial ports and other resources on a network. It can also carry transaction protocols for interprocess communication.

Read More


NFS vs CIFS - The main Differences

This article covers NFS vs CIFS performance. 

NFS, or Network File System, was designed in 1984 by Sun Microsystems. This distributed file system protocol allows a user on a client computer to access files over a network in the same way they would access a local storage file. Because it is an open standard, anyone can implement the protocol.

All versions of NFS can use Transmission Control Protocol (TCP) running over an IP network, with NFSv4 requiring it. NFSv2 and NFSv3 can use the User Datagram Protocol (UDP) running over an IP network to provide a stateless network connection between the client and server.


Common Internet File System (CIFS) is a network filesystem protocol used for providing shared access to files and printers between machines on the network. A CIFS client application can read, write, edit and even remove files on the remote server.

Microsoft operating systems use CIFS for remote file operations (typically mapping network drives), browsing (via the Network Neighborhood icon), authentication (NT and Windows 2000), and remote printer services.


The NFS service has the following benefits:

1. Enables multiple computers to use the same files, so everyone on the network can access the same data.

2. Reduces storage costs by having computers share applications instead of needing local disk space for each user application.

Read More


Redis Slow Log - More about it

This article covers how Redis Slow Log works. Redis Slow #Log is one of the best tools to debug and trace the Redis database. 

The Redis Slow Log is a system to log queries that exceeded a specified execution time. 

The execution time does not include I/O operations like talking with the client, sending the reply and so forth, but just the time needed to actually execute the command (this is the only stage of command execution where the thread is blocked and can not serve other requests in the meantime).


You can configure the slow log with two parameters: 

1. slowlog-log-slower-than tells Redis what is the execution time, in microseconds, to exceed in order for the command to get logged. Note that a negative number disables the slow log, while a value of zero forces the logging of every command. 

2. slowlog-max-len is the length of the slow log. The minimum value is zero. When a new command is logged and the slow log is already at its maximum length, the oldest one is removed from the queue of logged commands in order to make space.


Redis Slow Log configuration can be done by editing redis.conf or while the server is running using the CONFIG GET and CONFIG SET commands.

Available since 2.2.12.

This #command is used in order to read and reset the Redis slow queries log.


Redis slow log overview

The #Redis Slow Log is a system to log queries that exceeded a specified execution time. 

Slowlog, as its name, is used to record commands whose execution time exceeds limitation (a little slow).

The execution time does not include I/O operations like talking with the client, sending the reply and so forth, but just the time needed to actually execute the command (this is the only stage of command execution where the thread is blocked and can not serve other requests in the meantime).

The Redis SLOWLOG is used to help identify queries which are taking too long to execute.


You can configure the slow log with two parameters:

slowlog-log-slower-than tells Redis what is the execution time, in microseconds, to exceed in order for the command to get logged. Note that a negative number disables the slow log, while a value of zero forces the logging of every command. slowlog-max-len is the length of the slow log. The minimum value is zero. When a new command is logged and the slow log is already at its maximum length, the oldest one is removed from the queue of logged commands in order to make space.


The configuration can be done by editing redis.conf or while the server is running using the CONFIG GET and CONFIG SET commands.

Read More


Authentication In Vue Using Vuex

This article covers how to perform Authentication In Vue Using Vuex. 

Using Vuex allows us to store and manage authentication state and proceed to check state in our application using only a few lines of code.


To Set up the application modules:

For this project, we want to create a vue application that has vuex and vue-router. 

i. We will use the vue cli 3.0 to create a new vue project and select router and vuex from the options.

Run the following command to set it up:

$ vue create vue-auth

ii. Follow the dialogue that shows up, add the necessary information and select the options we need and complete the installation.

iii. Next, install axios:

$ npm install axios --save

Read More


MongoDB error topology was destroyed - Fix it now

This article covers method to fix the error 'MongoDB error topology was destroyed' which happens due to many reasons that include interruption of the node server’s connection to the MongoDB instance while it was trying to write to it. If the mongo driver drops the connection for any reason.
Another reason could be mongoose disconnecting before the creation of mongo document indexes.
You might try updating mongo.
There's also a mongo config setting that can easily in the database using too much memory and being killed by the kernel.

Read More


Troubleshoot KVM Virtualization Problem

This article covers how to troubleshoot KVM virtualization problem.


Log file locations and tools used to track down #KVM #problems are:
1. $HOME/.virtinst/virt-install.log – virt-install tool log file.
2. $HOME/.virt-manager/virt-manager.log – virt-manager tool log file.
3. /var/log/libvirt/qemu/ – Log files for each running virtual machine. If centos is virtual machine name, than log file is /var/log/libvirt/qemu/centos.log.

You can use the grep and other Linux tools to view this files:
# tail -f /var/log/libvirt/qemu/freebsd.log
# grep something $HOME/.virtinst/virt-install.log
$ sudo tail -f /var/log/libvirt/qemu/openbsd.log

Hyper-V backups can fail for any number of reasons, but there are some things to look for when backups don’t work the way that they are supposed to.
When backups fail, the first thing that you should do is to check the backup logs in an effort to learn more about the problem.
Specifically, you need to determine if the problem is confined to a particular host, a particular virtual machine, or perhaps related to the backup target itself.

Read More


Phpmyadmin keeps asking for password

This article will guide you on tips to resolve phpMyAdmin error when it keeps asking for a password to login.

This #phpMyAdmin problem can arise due to many different reasons that include browser cache issues, using an incorrect password, drive being full, and so on. 

To fix this problem, you need to reset the cPanel password as follows:

1. Login to WHM at https://<your vps ip>:20871) as user root, using the server's root password.

2. Go to 'Home >> Account Information >> List Accounts'.

3. Click on the + sign near the domain for which you want to change the cPanel password. 4. You can see an option there to change the password.

5. Select the option "Sync #Mysql password with account password" and change password.

Read More


Build serverless web application with AWS lambda

This article will guide you on how to build serverless Web Application AWS #Lambda. 

1. The application architecture uses #AWS Lambda, Amazon API Gateway, Amazon DynamoDB, Amazon Cognito, and AWS Amplify Console. 

2. Amplify Console provides continuous deployment and hosting of the static web resources including HTML, CSS, JavaScript, and image files which are loaded in the user's browser. 

3. JavaScript executed in the browser sends and receives data from a public backend API built using Lambda and API Gateway. 

4. Amazon Cognito provides user management and authentication functions to secure the backend API. 

5. Finally, #DynamoDB provides a persistence layer where data can be stored by the API's Lambda function.

Read More


OnApp Cloud

This article will guide you on OnApp cloud. You will also learn about its dashboard and features. 

OnApp Enterprise is a complete on-premises cloud solution for SMBs and enterprises. 

It makes private and hybrid cloud easier to manage and easier to scale. 

OnApp clouds can be created on almost any commodity x64 infrastructure, and across heterogeneous compute and storage hardware.


The features of OnApp cloud comprise of:

1. Public, private & hybrid cloud, plus VPS

2. Xen, KVM & VMware, plus Amazon EC2

3. Storage, backup and disaster recovery

4. Smart servers & bare metal servers

5. Global cloud & CDN through OnApp federation

6. CPU, disk, IOPS,RAM, servers, networks & more


OnApp is used:

i. By Telcos, MSPs and other service providers to create, manage and sell their own IaaS cloud products - either using their own datacenter infrastructure, third party infrastructure or hyperscale infrastructure.

ii. OnApp is used by hosts, telcos, MSPs, CDN vendors and other service providers to sell public/private/hybrid cloud services; and by enterprises for on-premise private & hybrid public/private cloud.

Read More


Troubleshoot Redis latency Issues

This article will guide you on steps to troubleshoot Redis #latency problems.

#Amazon #ElastiCache allows you to seamlessly set up, run, and scale popular open-source compatible in-memory data stores in the cloud. 

Build data-intensive apps or boost the performance of your existing databases by retrieving data from high throughput and low latency in-memory data stores.

#Redis #performance monitoring metrics:

1. Used Memory

"memory_used" gives the total amount of memory in bytes that is used by the Redis server. If it exceeds physical memory, system will start swapping causing severe performance degradation.

2. Peak used memory

"memory_used_peak" metric calculates and displays the highest amount of memory in bytes consumed by the Redis server.

3. Used CPU system

The metric "cpu_used_sys" gets the total amount of system CPU consumed by the Redis server. High CPU usage is not bad as long as it doesn't exceed CPU limit.

4. Used CPU user

The metric "cpu_used_user" records the total amount of user CPU consumed by the Redis server.

5. Used CPU user children

The metric "cpu_used_user_children" records the total amount of user CPU consumed by other background processes.

6. Used CPU system children

Get the total amount of system #CPU consumed by background processes with the metric "cpu_used_sys_children".

7. Rejected connections

Use the metric "total_conn_rec" and get the total number of connections accepted by the Redis server.

8. Connected clients

Get the total number of slave connections made to the Redis server with the metric "conn_slaves".

Read More


Vue js authentication using vue-router

This article will guide you on how to set up Vue.js authentication using vue-router. If we couple Vue.js with vue-router, we can build high-performance applications.

To run a Vue application:

1. Open the package.json file and add the following:

[...]
"scripts": {
    "dev": "webpack-dev-server --inline --progress --config build/webpack.dev.conf.js",
    "start": "npm run dev",
    "server": "node server/app",
    "build": "node build/build.js"
  },
[...]

2. We added the server script to help us start up the node server. Now, run the following command to start the server:

npm run server

3. Then create another terminal instance and run the Vue app like this:

npm run dev

This will build all the assets and start the application. You can open the link it shows you to see the application.

Read More


Roundcube empty startup greeting

This article will guide you on methods to resolve #Roundcube empty startup greeting error which occurs due to many reasons which include improper configuration of SSL, network #problem, firewall #error and so on.

Roundcube is a webmail client with strong security features and extensive customization options from its plugin repository.

It is important to set Roundcube config file as follows:

$config['default_host'] = 'imaps://domain.tld';

// TCP port used for IMAP connections

$config['default_port'] = 993;


To fix cPanel Roundcube Webmail "An error occurred":

This error indicates a potentially corrupt index file. 

1. establish an SSH session with the server and navigate to:

/home/<username>/mail/<domain name>/<email account name>/

2. Find dovecot.index and rename it to dovecot.index.bak.

Read More


MySQL error log cPanel

This article will guide you on more information about MySQL error logs and methods to resolve its errors. 

You will learn how to fix MySQL errors, crashes and other unexpected behavior from #MySQL. 

To view mysql error logs:

1. edit /etc/my.cnf [mysqld] log=/tmp/mysql.log.

2. restart the computer or the mysqld service service mysqld restart.

3. open phpmyadmin/any application that uses mysql/mysql console and run a query.

4. cat /tmp/mysql.log ( you should see the query ).

To Clear cPanel Error Log:

1. Login to your server using an #SSH client.

2. To clear the #Apache #errors, type the following and press Enter. cat /dev/null> /usr/local/apache/logs/error_log.

3. To delete PHP error_log files, type the following and press Enter. find /home -type f -name error_log -delete.

Read More


Enable FirewallD logging for denied packets on Linux

This article will guide you on how to enable #FirewallD logging for denied packets on #Linux. It is an important task to keep an eye on the rejected and dropped packets using FirewallD for #Linux system administrators. 

To enable logging option you need to use #LOG iptables/kernel module. It turn on kernel logging of matching packets. When this option is set for a rule, the Linux kernel will print some information on all matching packets (like most IP header fields) via the kernel log.

To log a dropped packet in iptables:

1. iptables -N LOGGING: Create a new chain called LOGGING.

2. iptables -A INPUT -j LOGGING: All the remaining incoming packets will jump to the LOGGING chain.

3. line#3: Log the incoming packets to syslog (/var/log/messages).

To  restart iptables:

i. To start firewall from a shell enter: # chkconfig iptables on. # service iptables start.

ii. To stop firewall, enter: # service iptables stop.

iii. To restart #firewall, enter: # service iptables restart.

Read More


WordPress Brute Force Attack

This article will guide you on Brute Force Attack and different ways to troubleshoot and fix a Brute-Force Attack in #WordPress.

Brute-force attacks work by calculating every possible combination that could make up a password and testing it to see if it is the correct password. 

As the password's length increases, the amount of time, the computational power required on average, to find the correct password increases exponentially.

#Brute #Force #Attack Prevention Techniques:

1. Limit failed login attempts.

2. Make the root user inaccessible via #SSH by editing the sshd_config file.

3. Don't use a default port, edit the port line in your sshd_configfile.

4. Use Captcha.

5. Limit logins to a specified IP address or range.

6. Two factor authentication.

7. Unique login URLs.

Read More


Logging in Apache More about it

The Apache access logs stores information about events that occurred on your #Apache web #server. Apache web servers also provide administrators with another type of log file called error logs. 

The Apache error log has a logging level that filters the messages sent to the log. Apache #logs nothing for a single page request in warn level.

This log file is used to provide more information regarding a particular error that has occurred on the web server.

By default, you can find the Apache #access log file at the following path:

i. /var/log/apache/access. log.

ii. /var/log/apache2/access. log.

iii. /etc/httpd/logs/access_log.

To enable the Apache #HTTP access logs:

1. Open the Apache HTTP configuration at /Applications/MAMP/conf/apache/httpd.conf.

2. Find this line.

3. Change the line.

4. Restart Apache using the MAMP widgit.

5. Now, view your new logfiles!

Read More


Create user in DirectAdmin

This article will guide you on how we can create a #user in DirectAdmin and fix errors related to it. DirectAdmin provides an easy way to create a user as a reseller. And the errors during its creation are mainly due to home directory unavailability or improper permissions or due to the disk being full. 

#DirectAdmin can be accessed at http://server.ip.address:2222. 

Use the Admin username/password from the output information provided by setup.sh (the same information is specified in the /usr/local/directadmin/scripts/setup.

To install Direct Admin:

1. Set a main #domain name. By default, no web #site is associated with your server.

2. Create nameservers (optional) Add at least one additional IP address to your sever.

3. Set your e-mail address in the control panel.

Read More


Asp net error 1334

This article will guide you on steps to resolve Asp.net #error 1334 which is a generic error often encountered while trying to run an #ASP .NET web application in Windows. ASP.NET uses the common language runtime (CLR), which provides a way of notifying #applications of errors in a uniform way. 

When an error occurs, an exception is thrown. An exception is any error, condition, or unexpected behavior that an application encounters.

To fix Asp.net error #1334:

1. Run a repair of .NET #Framework 2.0 and attempt to restart the Backup Exec Server service.

2. If the issue persists, uninstall .NET Framework 2.0 and all related updates.  

3. Reboot the #Media Server. 

4. Reinstall .NET Framework 2.0.

5. Reboot the Media Server.

Read More


Install Vesta control panel in Ubuntu

This article will guide you on easy steps to install Vesta control panel in #Ubuntu. VestaCP is a control panel for Linux with many features that facilitate the administration of a #server. 

Vesta Development team provides an installer script that automates setting up of Vesta hosting control panel on Ubuntu / Debian and RHEL based Linux distributions. Login to your Ubuntu / #Debian system and ensure the system is updated. Download #Vesta installer. Run install with sudo if you're logged in as standard user.

To install vestaCP on Ubuntu:

1. # Connect to your server as root via #SSH

ssh root@your.server

2. # Download installation script

curl -O http://vestacp.com/pub/vst-install.sh

3. # Run it

bash vst-install.sh

To change my VestaCP port:

i. conf file and change the port that NGINX listens on from 8083 to 2083 (or the port you chose to use). listen 2083; 

ii. Once the port has been changed, press CTRL+X , followed by y , and then hit enter to save your changes. 

iii. The final step is removing the firewall entry for the previous port we were using.

Read More


Azure Cache for Redis client-side issues

This article will guide you on troubleshoot Azure #Cache for Redis client for issues and fix common Redis #error.

Azure Cache for Redis gives you the ability to use a secure open source Redis cache. It is a dedicated offering managed by Microsoft, to build highly scalable and responsive applications by providing you super-fast access to your data.

All #Redis #data resides in the server's main memory, in contrast to databases such as PostgreSQL, Cassandra, MongoDB and others that store most data on disk or on SSDs.

The way to test for this in Redis is to simply query the key. If the key is empty, populate it. If it is a string use get (or exists).

To configure a storage account for your cache metrics:

1. In the Azure Cache for Redis page, under the Monitoring heading, select Diagnostics.

2. Select + Add diagnostic setting.

3. Name the settings.

4. Check Archive to a storage account.

5. Select Configure to choose the storage account in which to store the cache metrics.

Read More


WordPress Login Page Refreshing and Redirecting Issue

This article will guide you on methods to resolve WordPress Login Page Refreshing and Redirecting Issue. 

Your login credentials (username/password) are incorrect. You're being blocked by your security plugin. You changed the WordPress login URL. There's a problem with your #WordPress #site (White Screen of Death, 500 Internal Server #Error, and so on.)

To fix redirect #problems in WordPress:

1. Delete cookies on that specific site.

2. Clear WordPress site, server, proxy, and browser cache.

3. Determine nature of redirect loop.

4. Check your HTTPS settings.

5. Check third-party services.

6. Check your WordPress site settings.

7. Temporarily disable WordPress #plugins.

8. Check redirects on your server.

Read More


PowerShell Error clear

This article will guide you on how to tackle PowerShell $Error clear and method to clear errors with $Error. 

To clear error variable when you start #PowerShell, simply run $error. clear(). A downside of this method is that you lose all the errors that were generated before you clear the error variable.

To delete a variable, along with its value, use Remove-Variable or Remove-Item. This cmdlet does not delete the values of variables that are set as constants or owned by the #system, even if you use the Force parameter.

1. You can use this variable to represent an absent or undefined value in #commands and #scripts. 

2. #Windows PowerShell treats $null as an object with a value, that is, as an explicit placeholder, so you can use $null to represent an empty value in a series of values.

Read More


SQL server error 1326 Steps to fix it

This article will guide you on methods to resolve SQL server error 1326 which occurs due to the IIS Service not having any rights to use the named pipe.

If the SQL server resides on a separate server from IIS, then the IUSR_machinename account needs to be validated on the Windows NT server that SQL resides on.

#SQL #SERVER – Fix : Error : 1326 Cannot connect to #Database Server Error: 40 – Could not open a connection to SQL Server.

Now if SQL Server can be connected perfectly from #local system, but cannot be connected from a remote system, in that case firewall on the server where SQL Server is installed can be issued.

Follow instructions below to fix the issue:

1. Go to control panel >> #Firewall Settings >> Add SQL Server’s Port to Exception List.

2. Now try to connect to SQL Server again. It will allow you to connect to the server successfully.

Read More


Duplicity restore full backup

This article will guide you on steps to perform a Duplicity-restore full backup. #Duplicity is an efficient #backup application.

#rsync is a protocol built for Unix-like systems that provides unbelievable versatility for backing up and synchronizing data. It can be used locally to back up files to different directories or can be configured to sync across the Internet to other #hosts.

Incremental Backup captures only the changes made since the last incremental backup. Saves both time and #storage space, and ensures that your backup is up to date. Differential Backup captures only the changes made since the last full backup, not since the last differential backup.

When a normal or full backup runs on a selected drive, all the files on that drive are backed up. This, of course, includes system files, application files, user data — everything. The downside of normal backups is that they take a very long time to run, and in some cases this is more time than a company can allow.

To Use Duplicity with GPG to Securely Automate #Backups on #Ubuntu:

1. Install the Prerequisite Packages.

2. Download and Install Duplicity from Source.

3. Create SSH Keys.

4. Create GPG Keys.

5. Run an Initial Test.

6. Create Your First Backup.

7. Restore a Backup.

Read More


Microsoft SQL server error 18470 How to fix it

This article will guide you on the different factors that causes SQL server error: 18470 and also how to fix this #error.

In SQL Server Configuration Manager, in the left pane, click SQL Server Services. In the results pane, right-click SQL Server (#MSSQLServer) or a named instance, and then click Start, Stop, Pause, Resume, or Restart.

User gets the #Microsoft SQL Server Error: 18470. This may happen if the SA (System Administrator) user account is disabled in #SQL Server. It can be verified by trying to log in to SQL Server Management Studio (#SSMS) using the SA account. In the Login Properties screen, select Status on the left side.

To Microsoft SQL Server Error 18456:

1. Log In with Remote Desktop.

2. Run Microsoft SQL Server Management.

3. Checking the Server Authentication Mode.

4. Restart the SQL Service.

5. Checking SQL User Permissions.

6. Mapping the User to the #Database.

Read More


VestaCP mail not working How to fix

This article will guide you on different methods to resolve #Vestacp #mail #problems which generally occurs mainly due to #Exim problem, firewall issues, and so on. This tips will resolve the #email problems in VestaCP.

To fix email not working:

1. Verify your internet connection is working. If it's not, there are four things you can do to fix it.

2. Make sure you're using the correct email server settings.

3. Confirm your password is working.

4. Confirm you don't have a security conflict caused by your firewall or antivirus #software.

Read More


RoundCube CONNECTION FAILED Database Error

This article will guide you on the different methods to fix Database Error: Connection Failed error shows up due to database errors or #PHP #errors. 

Establishing a Database Connection #Error basically means that for some reason or another the PHP code was unable to connect to your #MySQL database to retrieve the information it needs to fully build that page. That's why the error is always shown on a blank page because there is no information about your site as it is not connected to your database.

Establishing a Database Connection Error Occur due to:

1. Incorrect Login Credentials.

2. Corrupt #Database

Read More


When You Are Locked Out of WordPress Admin

This article will guide you on different ways to tackle Your #WordPress Site #error when you Are Locked Out of WordPress #Admin #Dashboard.
A common reason that can lock you out of the WordPress admin area is error establishing the #database connection. Usually, this error occurs when your database is corrupted, unresponsive or your web #hosting service provider has issues with its servers. Sometimes, this error can last for hours and spoil your user experience badly.

Read More


DirectAdmin Skin or Interface Issues

This article will guide you on different methods to fix #DirectAdmin #skin or #interface issues.
To fix DirectAdmin Skin or Interface Issues:
What if the DirectAdmin skin is corrupted? How to fix DirectAdmin Skin or Interface Issues? Here are some steps you can try.
1. Reinstall skin.
cd /usr/local/directadmin/data/skins/
./packskins.sh
2. Recompile PHP using the following commands.
cd /usr/local/directadmin/custombuild
./build update
./build clean
./build php d
These steps will fix almost every issues with DirectAdmin skin.

Read More


Webmail timeout issue in DirectAdmin


This article will guide you on how to resolve #timeout #error in #webmail in #DirectAdmin. Generally, webmail timeout issue can occur if the timeout value is exceeded.
The term timeout or time-out has several meanings, including: A network parameter related to an enforced event designed to occur at the conclusion of a predetermined elapsed time.
To fix Webmail timeout error in DirectAdmin:
Modify the config file "/var/www/html/webmail/inc/config.php" or in /var/www/html/webmail/inc/config.security.php
and set
Code:
# Session timeout for inactivity
#
$idle_timeout = 10; //minutes
to whatever value you need.

Read More


Improve SQL Server Bulk Data Import Performance

This article will guide you improve #bulk #data #import #performance. The BULK INSERT command is much faster than bcp or the data pump to perform text file import operations, however, the BULK INSERT statement cannot bulk copy data from #SQL Server to a data file. Use the bcp utility instead of DTS when you need to export data from the SQL Server table into a text file.
To Speed up SQL Bulk Insert with #transactions:
1. Declare the variables that store the number of desired items ( @items ), the size of the chunks( @chunk_size ) and the counter of the number of executed inserts( @counter )
2. Open the first transaction and initialize the while loop.

Read More


Install Froxlor on CentOS 7

This article will guide you on steps to #install Froxlor on #CentOS 7 and also resolve common Froxlor #errors.
#Froxlor is a simple but powerful server administration #software for managing #domains, emails and files.
To install Froxlor web hosting control panel:
1. Ensure that your webserver serves /var/www.
2. Extract froxlor into /var/www.
3. Point your browser to http://[ip-of-webserver]/froxlor.
4. Follow the #installer.
5. Login as #administrator.
6. Adjust "System > Settings" according to your needs.
7. Choose your distribution under "System > Configuration".
8. Follow the steps for your services.

Read More


Orphaned users in SQL Server

This article will help you to identify #Orphaned #Windows #Logins and Groups in #SQL Server.
To Resolve an Orphaned User:
To map an orphaned user to a login which already exists in master, execute the ALTER USER #statement in the user database, specifying the login name.
ALTER USER <user_name> WITH Login = <login_name>; When you recreate a missing login, the user can access the database using the password provided.
To fix orphaned users for all databases in SQL Server:
1. Login with same name as user exists – generate ALTER LOGIN to map the user to the login.
2. No login with same name exists – generate DROP USER to delete the orphan user.
3. Orphan user is [dbo] – change the database owner to SA (or whatever SA was renamed to).

Read More


Auto shrink feature in SQL server

This article will guide you on how to enable and disable AutoShrink #database property. Basically, it is not recommended to enable the AutoShrink database property as it can cause many issues in the #SQL Server.
Auto Shrink is database property that allow SQL Server to automatically shrink database files if its value set to ON/True. Shrinking a database is not a good practice because it is very expensive operation in terms of I/O, CPU usage, locking and #transaction log generation.
Users can enable and disable database auto shrink option using SSMS and T-SQL both ways.
To turn on auto shrink in SQL Server:
1. Activating the database auto shrink by using #SSMS:
2. Enable database auto shrink using T-SQL:
3. Database >> #Reports >> Standard Reports >> Disk Usage.
4. Check free space for the database files:
5. Shrink database file:

Read More


Install WebsitePanel on Windows

This article will guide you on steps to #install #WebsitePanel on #Windows. Also, we saw how to fix some common errors of WebsitePanel.
WebsitePanel began as #DotNetPanel, which its creators made only for the Windows web technology platform as a Windows #hosting panel. The initial DotNetPanel developers contributed a great deal to WebsitePanel. And now #Microsoft has added to their legacy by investing in WebsitePanel’s future.
WebsitePanel is a Multi-Tenant, Enterprise Hosting Automation Tool with support for Private #Cloud Servers. It enables you to centralize the management of your hosting infrastructure and share resources across multiple customer accounts.
1. Save time and money spent on system management.
2. Simplify deployment processes.
3. Administer everything from a single interface.

Read More


Disable Password History in DNN websites

This guide will help to disable password history in #DNN by disabling Enable #Password #History option under the Membership Management tab.
To disable Disable Password History in DNN:
In Host > Host Settings > Advanced Settings > Membership Management, you can disable the history by unchecking "Enable password history".

Read More


Windows block remote network access for local user accounts

This article will guide you on ways to #restrict remote network access for a local user account.

To restrict local #accounts in #Windows 10,

Open the Settings app, then select Accounts. Select Family & other users. Scroll down to the Other Users section, then choose Add someone else to this PC. If the new user already has a #Microsoft account, enter the associated #email address, then click Next.

To restrict a Windows user:

1. Select Settings.

2. Tap Accounts.

3. Select Family & other users.

4. Tap "Add someone else to this #PC."

5. Select "I don't have this person's sign-in information."

6. Select "Add a user without a Microsoft account."

Read More


Virtual Log Files in SQL Server

This article will guide you on how to find the total number of #VLFs. The DMF sys.dm_db_log_info specifically looks at virtual log files or VLFs for which it needs a database ID for input.

To find it, check the number of virtual log files (VLFs) in each #database and alerts when there's 1,000 or more.

Read More


Set up email settings in Nagios Log Server

This article will guide you on how #Nagios #Log Server sends emails and the effective ways to configure them.

By default, Nagios #Mail notification is sent using /bin/mail command. To change this, modify the definition for notify-host-by-email command and notify-service-by-email command in /etc/nagios/objects/commands. cfg file and configure the mail server accordingly.

Log Server has user-friendly features like a search function. You can refine your logs to a specific purpose, like failed logins, or a specific date, so you can easily find the logs you need. Log Server's customizable home dashboard lets you display log data in a variety of ways, whether that's a map or a bar chart.

Read More


Install Graylog on CentOS 7 How to do it

This article will guide you on steps to #Graylog on #CentOS 7 and an effective method to make the logs more structured and searchable.

Graylog is a leading centralized log management solution built to open standards for capturing, storing, and enabling real-time analysis of terabytes of #machine data. 

Graylog is an open source log management platform which enables you to aggregate up to terabytes of log data, from multiple log sources, DCs, and geographies with the capability to scale horizontally in your data center, #cloud, or both.

To #Install Graylog 3 with Elasticsearch on CentOS 7:

1. Configure #SELinux. 

2. Add required #repositories 

3. Install #Java, #Elasticsearch, and #MongoDB. 

4. Configure Elasticsearch for Graylog. 

5. Install Graylog 3 on CentOS 7. 

6. Start Graylog service on CentOS 7.

Read More


Backup and Restore Nagios Log Server

This article will guide you on the steps to perform #backup and #restore a #Nagios #Log #Server cluster. Taking Backup and Restore of Nagios Log Server helps not to lose any data as it is held in other instances.

Backup and recovery describes the process of creating and storing copies of #data that can be used to protect organizations against data loss. #Recovery from a backup typically involves restoring the data to the original location, or to an alternate location where it can be used in place of the lost or damaged data.

To do a backup and system restore:

1. Click Start.

2. Go to Control Panel.

3. Go to System and Security.

4. Click Backup and Restore.

5. At the Back up or restore your files screen, click Restore my files. 

6. Browse to locate the backup file. 

Read More


Pure-ftpd 530 login authentication failed error on Directadmin

This article will guide you how to resolve Pure-ftpd 530 login #authentication failed #error on #DirectAdmin which occurs as a result of incorrect ownership of pureftp.passwd file or password #database corruption.

While trying to connect to your FTP server hosted by #IIS, you may run into “530 User cannot log in, home directory inaccessible” error. This error occurs whether you are using anonymous access or basic authentication. A sample connection log from an FTP #client: 530 User cannot log in, home directory inaccessible.

To Install Pure-FTPd on Ubuntu 20.04 :

1. Create Atlantic.Net Cloud Server. First, log in to your Atlantic.Net Cloud Server. 

2. #Install Pure FTPd. 

3. Create #FTP User. 

4. Create a Self-signed SSL/TLS certificate. 

5. Configure Pure FTPd to use SSL/TLS. 

6. Connect FTP Server from Client.

Read More


Rewrite URLs with mod_rewrite for Apache on Ubuntu 16 04

This article will guide you on how to rewrite URLs with mod_rewrite in #Apache. Basically, mod_rewrite helps in creating human-readable URLs.

The URL #Rewrite #Module is an extension software for #IIS (Internet Information Services). URLs should be created so that they are easy to remember for the users and easy to find for the search engines. The URL Rewrite Module enables web administrators to develop and implement rules that assist them in this task.

htaccess rewrite rule includes setting a combination of rewrite condition ( #RewriteCond ) tests along with a corresponding rule ( #RewriteRule ) if the prior conditions pass. In most cases, these rules should be placed at any point after the RewriteEngine line.

Read More


WordPress White Screen of Death error Tips to resolve

This article is about will guide you on steps to resolve WordPress White Screen of Death which is very frustrating as there is no error message, and you are locked out of your WordPress website. 

This error can also happen due to a poorly coded theme or plugin installed on your site. Sometimes it can happen if there is an issue with your web hosting server. Since the white screen error can be caused by any number of things, it requires methodical #troubleshooting to fix.

To fix WordPress White Screen of Death:

1. Disable Your WordPress Plugins.

2. Switch to a Default WordPress Theme.

3. Clear Browser and #WordPress #Plugin Cache.

4. Switch on Debugging Mode.

5. Increase Your #Memory Limit.

6. Check File Permission Issues.

7. Check for Failed Auto-Update Issues.

8. Resolve #Syntax #Errors or Restore a #Backup.

Read More


How to use Ionic Auth Guard to Login and Rout to pages

This article will guide you on how to create Login and Routing to pages using #Ionic Auth Guard.
Auth-guard makes use of CanActivate interface and it checks for if the user is logged in or not. If it returns true, then the execution for the requested route will continue, and if it returns false, that the requested route will be kicked off and the default route will be shown.
To create a login page in ionic 4:
1. GETTING STARTED. After making sure you have the latest version on Ionic and Cordova installed, let's go and create an #app now and integrate authentication in it.
2. Update app/app. #module.
3. Create User Model.
4. Updating Services.
5. Add #Auth #Guard.
6. Update Pages.

Read More


Using Cron to Automate Tasks on CentOS 8

This article will guide you on the steps to set up #Cron job on #CentOS 8 to help automate #tasks. Cron is a #clock daemon, whose name originates from #Chronos, the Greek word for time. It enables users to automate the execution of #commands, scripts (a group of commands) or programs at specified time intervals.
The simplest way to validate that cron tried to run the #job is to simply check the appropriate log file; the log files however can be different from system to system. In order to determine which log file contains the cron #logs we can simply check the occurrence of the word cron in the log files within /var/log .

Read More


Steps to Install GoAccess on Ubuntu

This article will guide you on how to #Install GoAccess on Ubuntu which is a command-line tool and how to use it for analyzing server #logs.
With #GoAccess, you are able to #SSH into any web server you control and view or analyze relevant statistics quickly and securely. Apart from the command-line dashboard interface, it's also capable of displaying the #statistics in other formats such as HTML, JSON, and CSV, which you can use in other contexts or share with others.

Read More


Nagios Authentication and Importing Users with AD and LDAP

This article will guide you on how to integrate #Nagios Log Server with Active Directory or #LDAP to allow user authentication and validation with the Nagios Log Server interface.
Currently by default LDAP traffic (without SSL/TLS) is unsigned and unencrypted making it vulnerable to man-in-the-middle attacks and eavesdropping. After the patch or the windows update would be applied, LDAPS must be enabled with Active Directory.
To Set up Active Directory Authentication using LDAP:
1. Enter the LDAP "Server" and "Port" attributes on the Server Overview tab of the LDAP Users page.
2. Enter the proper base for the Active Directory in the "Base DN" attribute.
3. Set the Search Scope.
4. Enter the Username Attribute.
5. Enter the Search Filter.
6. Verify that the settings are correct by clicking the Verify button.

Read More


Hiding and Showing Tabs on certain pages in Ionic

This article will guide you on the steps to hide and show tabs on certain pages. Here, you will see that your tabs automatically hide when you navigate to a page in the hideTabBarPages array.
Ionic 4 uses Angular's #routing system, instead of the #Ionic 3 method of navController. Here, we will be leveraging this change, to allow us to pragmatically hide the tab bar on pages of our choice while leaving it visible everywhere else.

Read More


Send Syslog with SSL TLS to Nagios Log Server

This article will guide you on how to Send #Syslog with #SSL / #TLS to Nagios Log Server by encryption which ensures that the #traffic between the #Linux machine and Nagios Log Server is not sent in plain text.

Read More


How to install Metricbeat on CentOS 7 to Gather Infrastructure Metrics

This article will guide you on the steps to install #Metricbeat and configure the Elastic Stack to collect and analyze system metrics. Metricbeat is configured using a #YAML configuration file. On Linux, this file is located at: /etc/metricbeat/metricbeat. yml. On #Docker, you will find it at: /usr/share/metricbeat/metricbeat.
Both #Filebeat and #Logstash can be used to send #logs from a file-based data source to a supported output destination.

Read More


Steps To Harden OpenSSH Client on Ubuntu 18 04

This article will guide you on how to harden #OpenSSH Client by following some quick and easy steps.
#Hardening of the #OS is the act of configuring an OS securely, updating it, creating #rules and #policies to help govern the system in a secure manner, and removing unnecessary applications and services. This is done to minimize a computer OS's exposure to threats and to mitigate possible #risk.

Read More


HAProxy Logging with Rsyslog on CentOS 8

This article will guide you on how to set up #HAProxy Logging #Rsyslog with some quick and easy steps. HAProxy is installed with RightScale load #balancer ServerTemplates. Load-balancer servers are also known as front-end servers. Generally, their purpose is to direct users to available #application servers. HAProxy can be installed in front of them to provide load balancing and high availability.

Read More


Modify Data Store Path in Nagios Log Server

This article will guide you on the process to modify the data #storage location in a #Nagios #Log #Server.

The Nagios Core log, includes checks, notifications, external #commands, and events. This file is rotated daily into the /usr/local/nagios/var/archives folder by default setting in nagios.

Changing Data Path In Nagios Log Server involves: 

DATA_DIR="$ES_HOME/data" Modify it to the new path you would like to use: DATA_DIR="/new/path/data" Save the file and exit vi. The time it takes to move your existing data will vary depending on how much data there is and the speed of the source and destination #paths.

Read More


How to Secure Django Admin

This article will guide you on the methods to secure #Django admin. You can Deploy your site behind #HTTPS.

Best practices for keeping Django admin secure.

Something less sophisticated like a fake Django admin login screen page django-admin-honeypot.

It is always better for security to deploy your site behind HTTPS. Deploy your site behind HTTPS, it's easy to implement and it's free #Certbot, just choose #software and system and you're ready to go.


Read More


Send NXLogs with SSL TLS to Nagios Log Server

This guide will guide you on how to send NXLogs with SSL/TLS to #Nagios #Log #Server. Encryption ensures that the traffic between the #Windows machine and Nagios Log Server is not sent in plain text.

Read More


Manage php ini directives with PHP FPM

This article will guide you on how to manage PHP-FPM for a busy site and want to be able to handle lots of #requests.

Read More


Monitoring squid proxy server with Nagios log server

This article will guide you on how to configure the #Nagios log server to use a #proxy server.

#Squid is a caching and forwarding #HTTP web proxy. It has a wide variety of uses, including speeding up a web server by caching repeated requests, #caching web, #DNS and other computer network #lookups for a group of people sharing network resources, and aiding security by filtering #traffic.

Read More


How To Troubleshoot Common HAProxy Errors

This article will guide you on the different methods to #troubleshooting and fix common #HAProxy errors which can range from diagnosing #errors with the service itself to locating misconfigured options for modules. 

Read More


Configure Nagios log server to use a proxy server

This article will guide you on the steps to configure the #Nagios log server to use a #proxy server.

In order to #monitor the server using Nagios Core, you will need to add the host and services to nagios #server from the command line. 

#Logs located in the /usr/local/nagios/var/archives folder are used as the data source for the Availability and #SLA #reports.

Read More


Plesk Domain forwarding Setting it up

This article will guide you on the process to configure #Domain #forwarding in #Plesk which allows forwarding one domain to another domain and helps website owners who want to move their websites without losing traffic. We also discussed Plesk domain forwarding related #errors.

Read More


Logs Not Searchable or Not Coming In Nagios Log Server

This article will guide you in solving #Logs Not Searchable or Not Coming In #Nagios Log #Server which occurs in the process of running a query in the Nagios dashboard.

Read More


Steps to Install Pure-FTPD on Ubuntu 18.04 LTS Server

#Pure-FTPd is a fast, production-quality, standard-conformant #FTP (SSL/TLS) server, based upon Troll-FTPd.

This article will guide you through the processes to install Pure-FTPd on your #Ubuntu server.

Read More


Fix SQL error 824

This article will guide you through the steps to fix 824 error which is a logical Input/Output (I/O) error.

Read More


Scheduling Reports in Nagios Log Server Process to do it

This article will guide you on the steps to manage users in Nagios Log Server by Scheduling Reports in Nagios Log Server which is used by Nagios Log Server Administrators to automate reporting.

Read More


Set up Inputs in Nagios Log Server

This article will guide you on how to configure inputs in nagios log server via different methods. 

Read More


Redis Latency Monitoring How to enable it

This article will guide you on the aspects of Latency Monitoring and how it helps Redis which helps the user to check and troubleshoot possible latency problems.

Read More


Nagios Log Server To Monitor A New Log Source

This article will guide you through the steps to need to take to configure Nagios log server to monitor a new log source.

Read More


Cleanup tasks with Docker How to run it quickly

This tutorial will guide you on how to perform cleanup tasks with Docker which involves keeping the Docker clean to solve the server space issue that is especially important when Docker is running as a virtual machine.

Read More


Process of forwarding Nagios Log Server to another Destination

This article will guide you on the steps to forward Nagios log to another server by creating a new output in NLS.

Read More


Search message tracking logs on Exchange 2016

This article will guide you on the different ways to search the message tracking logs by using the Get-MessageTrackingLog cmdlet in Exchange 2016.

Read More


Setting up Zimbra Amavis Spam filtering

This article will guide you on the steps to configure whitelist and blacklist on Zimbra Amavis for Zimbra Amavis Spam filtering.

Read More


How to fix corrupt Exchange mailbox

Basically, here is a complete guide on how to fix Corruption of Exchange server mailboxes  which occurs when a client incorrectly updates MAPI flags while processing the mailbox folder elements.

Read More


Centralizing logs on Ubuntu with Journald

This article will help you to configure centralization of logs with Journald on Ubuntu for both the Server and Client system.

Read More


Solution to SSLPassPhraseDialog builtin is not supported on Win32 error

Easy way to fix  SSLPassPhraseDialog builtin is not supported on Win32 error in relation to Apache web server.

Read More


How to resolve Roundcube Webmail Login Failed error

As part of our Server Support Services, we have helped clients to solve Roundcube related bugs.

Read More


Method to change Vestacp admin password and fix vestacp errors

Changing VestaCP admin password could results in some errors due to bugs in the server environment. When an important Directory or missing file situation occurs, such errors tend to disrupt access to the Admin panel

Read More