Explore information related to permission


Error: EACCES: permission denied with npm - Best Fixes ?


This article covers methods to resolve "Error: EACCES: permission denied with npm" for our customers. If you see an EACCES error when you try to install a package globally, you can either:

  • Reinstall npm with a node version manager (recommended).
  • Manually change npm's default directory.


To download the latest version of npm, on the command line, run the following command:

$ npm install -g npm

Read More



AWS s3 lambda 500 Internal Service Error - Fix it Now ?


This article covers methods to resolve AWS s3 lambda 500 Internal Service Error.

Basically,  this error occurs if Lambda function's resource-based policy doesn’t include permission for your API to invoke the function.

This error occurs if your Lambda function's resource-based policy doesn't include permission for your API to invoke the function.

When you build an API Gateway API with standard Lambda integration using the API Gateway console, the console automatically adds the required permissions. However, when you set up a stage variable to call a Lambda function through your API, you must manually add these permissions.

Finally, To verify that the error is caused by missing permissions, review your API's logs.

Read More



"no input file specified" error in Joomla – Fix it Now ?


This article covers how to resolve Joomla error "no input file specified" which occurs due to issues with the installation.

To fix this error:

  • You can login to back-end and check the "Global configuration -> SEO Settings". 
  • Switch off Search Friendly URLs. 
  • Now all menu links should work fine.

Read More



ec2 key permission denied – "Authentication failed, permission denied"


This article covers method to fix the error, ec2 key permission denied. 

"Permission denied (publickey)" and "Authentication failed, permission denied" errors occur if:

  • You're trying to connect using the wrong user name for your AMI.
  • The permissions are incorrect on the instance.
  • The incorrect SSH public key (.pub) file is in the authorized_keys file.


To fix this error, simply:

  • Verify that you're using the correct user name for your AMI.
  • Also Verify that the instance's permissions are correct and that the correct SSH public key is in the authorized_keys file.

Read More



"403 forbidden" error in phppgadmin - Fix it Now ?


This article covers methods to tackle "403 forbidden" error messages in phpPgAdmin. Basically, the "Forbidden" error happens while accessing phpPgAdmin when permissions in the phpPgAdmin configuration file are not intact. 


To resolve 403 forbidden error, In the Apache configuration, simply replace:

<Directory /usr/share/phppgadmin>
    DirectoryIndex index.php
    Order deny,allow
    Allow from all
</Directory>

With:

<Directory /usr/share/phppgadmin>
   Require all granted
</Directory>

Read More



FTP permission denied errors on Google Cloud - Fix it Now ?


This article covers methods to fix Permission denied errors.  Basically, with chmod 777, we should be able to avoid Permission denied errors when uploading files via FTP. 

In Linux OS system every file or folder belong to some user and groups. This type of system is there for better security. Unauthorized users and groups can not modify or ever read  a file or directory. Only the ROOT user have the privilege to access any file or folder in the systems,  other user cannot access root user’s files or folders. But root user can access any other users file or folders.


If you are seeing this error below,

Error /...  : open for write:permission denied
Error File transfer failed

It means that you don't have a proper permission to modify or upload that files.

To fix this issue, Upload and move files to desire location and change file or directory(folder) permission, you can easily fix you permission denied problem.

Read More



IIS Manager: Could not connect to the specified computer - Fix it Now ?


This article covers methods to resolve the IIS Manager error "Could not connect to the specified computer". 


To install and configure Microsoft Windows Internet Information Services:

  • Select: Manage / Add Roles and Features.
  • Select "Next" until you get to Server Roles. Scroll down and open Web Server (IIS) / Management Tools.
  • Select "Management Service".
  • Select "Next" and "Install".
  • Once installation completes, open services. If you already had services open, use refresh to add it to your list. Scroll down to Web Management Service. You will notice it is installed, but not started. It is also set to manual, so it will not start on reboot either. You need to change both of these so the service will run now and will run anytime the server is rebooted. Open the properties.
  • Change the Startup type to "Automatic". Do not start the service yet as you will not be able to configure the service while it is running.
  • Launch IIS, open Management Service.
  • Configure the Web Management Service, then apply your changes and start the service.


How to configure Microsoft IIS ?

  • Enable remote management.
  • Use windows credentials only.
  • Deny access to all except your approved IP addresses.  Use IP address ranges only when you control the entire range.
  • Use your server’s certificate if you have one configured. (Optional).
  • Change the port from the default to something else if the server is accessible from the Internet. (Optional).
  • Now you will be able to remotely manage IIS from any IP address you granted access.

Read More



WMI Error: Login to remote object in Nagios - Fix it Now ?


This article covers how to fix the WMI error for our customers. 

Sometimes the standard permission levels defined in the Monitoring Windows Using WMI documentation do not expose all the monitoring capabilities of the WMI plugin. 

In these cases you can elevate permissions by adding the WMI user to one of the two local groups:

  • Performance Monitor Users
  • Administrators

Read More



Need at least 2 WMI samples% - Fix it Now ?


This article covers how to tackle the error, Need at least 2 WMI samples%. The reason for the message is that the WMI user account does not have sufficient permissions. This can be resolved by adding the user account to the Performance Log Users security group on the windows computer. 

  • This can be performed by opening the Computer Management console (located in Administrative tools). 
  • Expand System Tools > Local Users and Groups > Groups. 
  • Edit the Performance Log Users security group and add the user account (wmiagent) to this group.

Read More



WMI ERROR: Retrieve result data - Fix it Now ?


This article covers process to fix WMI ERROR for our Customers. Due to a memory leak in the WMI functions in Windows 2008 and Windows 7, the system resources may be exhausted in the Windows system, resulting in the error message found above.

It has been seen that systeminfo and wmic commands executed via the command prompt fails in case this issue is present, displaying error messages such as:

The paging file is too small for this operation to complete.

Looking at the process list in the Windows system, it can be determined that the WmiPrvSE.exe process has allocated unusually large amounts of memory.

Read More



Service Not Listed in WMI Wizard in Nagios - Fix it Now ?


This article covers methods to tackle Service Not Listed in WMI Wizard in Nagios. Basically, Service may not get listed in WMI Wizard in Nagios due to reasons like lower value of Truncate Output Length or insufficient permission of the user account. Windows Management Instrumentation (WMI) is a part of Windows operating systems and can provide management data and operational information about those system. WMI can be used to automate administrative tasks on remote Windows-based computers. Nagios Core and Nagios XI are capable of monitoring Windows machines via WMI. .


To Check the permissions of the files, use this command:

ls -ls /tmp/*.state

Here you can see that the root user/group is the owner of the file:

-rw-r--r-- 1 root root 91 Apr 24 16:10 /tmp/cwpss_checkcpu__1025143___.state

The simplest option is to delete the files with this command:

rm -rf /tmp/*.state

Read More



Permission denied WMI error in Nagios - Fix it Now ?


This article covers methods to fix Nagios error WMI Remote "Access Denied". Basically, Nagios supports WMI monitoring, which provides admins with a simple method of monitoring their Windows servers and workstations without having to install or configure agents. 


How to fix DCOM permission ?

  • Open Dcomcnfg.
  • Expand Component Service -> Computers -> My computer.
  • Go to the properties of My Computer.
  • Select the COM Security Tab.
  • Click on "Edit Limits" under Access Permissions, and ensure "Everyone" user group has "Local Access" and "Remote Access" permission.
  • Click on the "Edit Limit" for the launch and activation permissions, and ensure "Everyone" user group has "Local Activation" and "Local Launch" permission.
  • Highlight "DCOM Config" node, and right click "Windows Management and Instruments", and click Properties.
  • <Please add the steps to check Launch and Activation Permissions, Access Permissions, Configuration Permissions based on the default of Windows Server 2008>.


How to fix Permission for the user to the WMI namespace ?

  • Open WMImgmt.msc.
  • Go to the Properties of WMI Control.
  • Go to the Security Tab.
  • Select "Root" and open "Security".
  • Ensure "Authenticated Users" has "Execute Methods", "Provider Right" and "Enable Account" right; ensure Administrators has all permission.


How to Verify WMI Impersonation Rights?

  • Click Start, click Run, type gpedit.msc, and then click OK.
  • Under Local Computer Policy, expand Computer Configuration, and then expand Windows Settings.
  • Expand Security Settings, expand Local Policies, and then click User Rights Assignment.
  • Verify that the SERVICE account is specifically granted Impersonate a client after authentication rights. 

Read More



WMI Monitoring With Nagios - How to do it ?


This article covers how to monitor Windows machines with Nagios XI using WMI.

Basically, to set up WMI monitoring with Nagios, we need to configure A WMI User Account On The Windows Machine and then set up the WMI permissions. Windows Management Instrumentation (WMI) is a technology that allows for agentless monitoring of Windows servers and workstations.


Benefits of WMI Monitoring With Nagios:

  • Increased server, services, and application availability.
  • Fast detection of server and operating system failures.
  • Fast detection of service and application failures.
  • Agentless monitoring.

Read More



WHM Internal server error 500 - Fix it Now ?


This article covers different ways to troubleshoot and resolve WHM / cPanel Internal server error 500.

Basically, the "Internal server error 500" message happens while accessing WHM panel or cPanel and one of the cPanel process failing to load or still running in the background.


Other causes of 500 Internal Server Error in WHM?

  • Incorrect permissions settings, usually due to having a file as "world" writeable.
  • Incorrect permissions settings for use by another script (this is common with manual installs of forums or blogs).
  • Incorrect coding in the .htaccess file.

Read More



iisnode encountered an error when processing the request - Fix it Now ?


This article covers methods to resolve "iisnode encountered an error when processing the request" error.

Basically, this iisnode error triggers when the application pool doesn't have enough permissions to write to the current folder. 

Therefore, you need to Allow, 'Full Control', for user 'IIS_IUSRS', from 'Advanced Security' upon right clicking your application root directory.


This error simply denotes that Your application pool doesn't seem to have enough permissions to write to the current folder.

1. You can either edit the permissions to give the IIS_IUSRS group write permissions to that folder

2. Go into the advanced settings menu and under Process Model -> Identity change the user account to a user that already has write permissions.

Read More



Windows Server error, You don't currently have permission to access this folder - Fix it now ?


This article covers methods to fix the 'You Don't Currently Have Permission to Access This Folder' issue for our customers.
If you happen to meet "You don't currently have permission to access this folder" issue when you are opening a folder, do not worry. You can fix the problem with the  effective tips here.

To remove the folder access error:

1. Gain Access by Allowing Everyone
i. Right-click on the folder that you're unable to access and select "Properties".
ii. Click on "Security" tab and under Group or user names click on "Edit".
iii. Click on "Add" and type everyone. Click on "Check names" and then click "OK".
iv. Select "Everyone". Under "Allow", select "Full control" and click on "Apply" and click "Ok".

2. Change the Ownership of the File/Folder
You can also try to change the ownership of the file or folder to troubleshoot "You Don't Currently Have Permission to Access This Folder" issue on Windows 10/8/7.
i. Right-click on the folder to navigate to "Properties".
ii. Go to the "group or username" section on the "Security" tab.
iii. Click on "Advanced", and then "Change".
iv. Type your account name. Click on "Check names" > "OK".
v. Check "Replace owner on sub containers and objects" > "OK".

Read More



SQL error 300 - Fix it Now


This article covers tips to resolve SQL error 300. The reason of the error is related with user permission on VIEW SERVER STATE. You can upgrade SQL Server Management studio with the same version like SQL Instance or higher. 


Also, To mitigate this error, give the following GRANT and the error message will disappear:

USE master
GO
GRANT VIEW SERVER STATE TO "LoginName"

Read More



Libvirt error Unable to resolve address name or service not known


This article covers tips to fix 'Libvirt error: Unable to resolve address: name or service not known'. 

QEMU guest migration fails and this error message appears:

# virsh migrate qemu qemu+tcp://192.168.122.12/system error: Unable to resolve address name_of_host service '49155': Name or service not known

Note that the address used for migration data cannot be automatically determined from the address used for connecting to destination libvirtd (for example, from qemu+tcp://192.168.122.12/system). 

This is because to communicate with the destination libvirtd, the source libvirtd may need to use network infrastructure different from that which virsh (possibly running on a separate machine) requires.


To fix Libvirt error: Unable to resolve address: name or service not known:

The best solution is to configure DNS correctly so that all hosts involved in migration are able to resolve all host names.

If DNS cannot be configured to do this, a list of every host used for migration can be added manually to the /etc/hosts file on each of the hosts. 

However, it is difficult to keep such lists consistent in a dynamic environment.

i. If the host names cannot be made resolvable by any means, virsh migrate supports specifying the migration host:

# virsh migrate qemu qemu+tcp://192.168.122.12/system tcp://192.168.122.12

Destination libvirtd will take the tcp://192.168.122.12 URI and append an automatically generated port number. 

ii. If this is not desirable (because of firewall configuration, for example), the port number can be specified in this command:

# virsh migrate qemu qemu+tcp://192.168.122.12/system tcp://192.168.122.12:12345

iii. Another option is to use tunnelled migration. Tunnelled migration does not create a separate connection for migration data, but instead tunnels the data through the connection used for communication with destination libvirtd (for example, qemu+tcp://192.168.122.12/system):

# virsh migrate qemu qemu+tcp://192.168.122.12/system --p2p --tunnelled

Read More



Date Time in Laravel and PHP with Carbon


This article covers how to manage date/time easily in Laravel and PHP with Carbon. Basically, Carbon is a package that helps us to deal with date/time in Laravel and PHP in a much easier and systematic manner.

Working with date and time in PHP is not the easiest or most clear of tasks. We have to deal with strtotime, formatting issues, lots of calculations, and more.


Carbon provides some nice functionality to deal with dates in PHP such as:

1. Dealing with timezones

2. Getting current time easily

3. Converting a datetime into something readable

4. Parse an English phrase into datetime (first day of January 2016)

5. Add and Subtract dates (+ 2 weeks, -6 months)

6. Semantic way of dealing with dates


Carbon is already included in Laravel so there's no need to go and add it with Composer.

Whenever we need to use Carbon, we can import it like so:

<?php

use Carbon\Carbon;

After importing you can do a lot with this great package.

Read More



Ignore permission denied message from find command in Linux


This article covers how to resolve the error 'ignore permission denied message from find' which occurs while running a 'find' command in Linux.
The find command is used to locate files on a Linux or Unix like operating system.
The find command will search directory to match the supplied search criteria.
You can search for files by type, name, owner, group, date, permissions and more. By default the find will search all subdirectories for you.

Linux divides the file permissions into read, write and execute denoted by r,w, and x.
The permissions on a file can be changed by 'chmod' command which can be further divided into Absolute and Symbolic mode.
The 'chown' command can change the ownership of a file/directory.

If you prefer using the command line, you can easily find a file's permission settings with the ls command, used to list information about files/directories.
You can also add the –l option to the command to see the information in the long list format.

To change directory permissions in Linux, use the following:
1. chmod +rwx filename to add permissions.
2. chmod -rwx directoryname to remove permissions.
3. chmod +x filename to allow executable permissions.
4. chmod -wx filename to take out write and executable permissions.

Read More



Checkpoint Process in SQL Server - An Insight into it


This article covers the Checkpoint process in SQL server and the four types of checkpoints available.
Checkpoints are the useful repositories of information and serve best for the recovery of SQL server databases.

Different Types of Checkpoint in #SQL:
1. Automatic Checkpoint
An automatic checkpoint is the most common type that is triggered by a background process. Server Configuration Option “Recovery Interval” is used by the SQL Server Database Engine to determine how often automatic checkpoints are issued on a given database.
2. Indirect Checkpoint
A new type of #checkpoint introduced in SQL Server 2012 is an Indirect checkpoint. Indirect checkpoint also runs in the background, but it meets user-specified target recovery time for a given database.
3. Manual Checkpoint
Manual checkpoint runs like any other Transact-SQL command. It runs to completion by default. This type of checkpoint occurs in the current database only. It is also possible to set the time frame in which you want your checkpoint completed.
4. Internal Checkpoint
The fourth type is Internal checkpoint that cannot be controlled by user.

Read More



ModSecurity failed to open the audit log file error


This article will guide you on methods to resolve the error 'ModSecurity failed to open the audit log file' which occur as a result of a missing log files or due to improper permissions.

1. Setting ownership to www-data:www-data and file permissions from 600 to 660 will fix this problem.

2. Ensure that the permissions are properly configured on these files.

Execute the command below:

chmod 0644 /etc/apache2/logs/error_log

chmod 0600 /etc/apache2/logs/modsec_audit.log

The modsec log files are assigned 0600 permissions by default, whereas the error_log is assigned 0644 permissions by default.

3. mkdir permission denied signifies that the user you're running the mkdir as, doesn't have permissions to create new directory in the location you specified. 

You should use ls command on the higher level directory to confirm permissions.

4. The mkdir command by default gives rwx permissions for the current user only. To add read, write, and execute permission for all users, add the -m option with the user 777 when creating a directory.

Read More



WordPress 403 Forbidden Error


This article will guide you on different methods to fix the 403 #forbidden error in WordPress.

The 403 Forbidden #error means that your server is working, but you no longer have permission to view all or some of your site for some reason.

The two most likely causes of this error are issues with your WordPress site's file permissions or .htaccess file. 

Also, some plugin issues might also cause the #403 Forbidden error.

To Fix 403 Forbidden WordPress Error:

1. Create a Backup. Most of the time, you are not responsible for the errors that occur on your WordPress website hosting server.

2. Check . htaccess File.

3. Deactivate All Plugins. Login to your WordPress admin dashboard and navigate to #Plugins - Installed Plugins.

Read More



Preserve Permissions in rsync


This article will guide you on how to use rsync to preserve permissions. 

Rsync, or Remote #Sync, is a free command-line tool that lets you transfer files and directories to local and remote destinations. #Rsync is used for mirroring, performing backups, or migrating data to other servers.

a = archive - means it preserves #permissions (owners, groups), times, symbolic links, and devices. Use of "/" at the end of path: When using "/" at the end of source, rsync will copy the content of the last folder.

To preserve permissions when files and folders are copied or moved, use the Xcopy.exe utility with the /O or the /X switch. 

The object's original permissions will be added to inheritable permissions in the new location.

To make rsync to preserve timestamps:

1. To overcome this, there is another option that you can specify in the rsync command that will preserve the timestamps during the synchronization process. 

2. Without preserving the timestamp, the files will display the modification date and time as the time that the rsync command was run.

Read More



How Chmod 777 works


This article will guide you on how to give #Chmod 777 to folders and files in #Linux. We also discussed the risks and more information about file permissions. 

If you are managing a Linux system, it is crucial to know how the Linux #permissions work.

You should never set 777 (rwxrwxrwx) permissions #files and #directories permissions. 777 means that anyone can do anything with those files.

To Give Root Privileges to a User in Linux:

1. Adding to Root Group using usermod. Let see how we can grant normal user root access by adding to root group.

2. Adding to #Root Group using Useradd Command.

3. Editing /etc/passwd file.

4. Setting as Sudo User.

Read More



Steps to deploy DACPAC with SSMS


This article will guide you on the steps to deploy DACPAC which involves registering a DAC instance by storing the DAC definition in the #msdb system database. 

A DAC is a self-contained unit of #SQL Server #database deployment that enables data-tier developers and database administrators to package SQL #Server objects into a portable artifact called a #DAC package, also known as a #DACPAC.

Read More



An error occurred when calling the RevokeSecurityGroupIngress operation Steps to fix this aws error


This article will guide you on the steps to fix the AWS error "An error occurred when calling the RevokeSecurityGroupIngress operation" which shows that the target security group doesn’t have an inbound rule, or isn’t located in the default Amazon Virtual Private Cloud (Amazon VPC).

Read More



Unable to open Outlook attachments


This article will guide you on the different methods to tackle Outlook error message "unable to open outlook attachments" which occurs while opening an Outlook attachment. 

Read More



Solve 403 Forbidden permission error in Xampp server


We have dealt with server permission related server bugs for numerous customers as part of our Server Support Services.

Read More




For Linux Tutorials

We create Linux HowTos and Tutorials for Sys Admins. Visit us on LinuxAPT.com

Also for Tech related tips, Visit forum.outsourcepath.com or General Technical tips on www.outsourcepath.com






Focus on your business, not your servers.

Click Here to Learn More