Explore information related to permissions


Google Cloud Error Code 4033 - Fix it Now ?


This article covers methods to resolve Google Cloud Error Code 4033. Virtual Private Cloud (VPC) firewall rules apply to a given project and network. If you want to apply firewall rules to multiple VPC networks in an organization. 

VPC firewall rules let you allow or deny connections to or from your virtual machine (VM) instances based on a configuration that you specify. Enabled VPC firewall rules are always enforced, protecting your instances regardless of their configuration and operating system, even if they have not started up.

Read More



Error: EACCES: permission denied with npm - Best Fixes ?


This article covers methods to resolve "Error: EACCES: permission denied with npm" for our customers. If you see an EACCES error when you try to install a package globally, you can either:

  • Reinstall npm with a node version manager (recommended).
  • Manually change npm's default directory.


To download the latest version of npm, on the command line, run the following command:

$ npm install -g npm

Read More



"no input file specified" error in Joomla – Fix it Now ?


This article covers how to resolve Joomla error "no input file specified" which occurs due to issues with the installation.

To fix this error:

  • You can login to back-end and check the "Global configuration -> SEO Settings". 
  • Switch off Search Friendly URLs. 
  • Now all menu links should work fine.

Read More



FTP permission denied errors on Google Cloud - Fix it Now ?


This article covers methods to fix Permission denied errors.  Basically, with chmod 777, we should be able to avoid Permission denied errors when uploading files via FTP. 

In Linux OS system every file or folder belong to some user and groups. This type of system is there for better security. Unauthorized users and groups can not modify or ever read  a file or directory. Only the ROOT user have the privilege to access any file or folder in the systems,  other user cannot access root user’s files or folders. But root user can access any other users file or folders.


If you are seeing this error below,

Error /...  : open for write:permission denied
Error File transfer failed

It means that you don't have a proper permission to modify or upload that files.

To fix this issue, Upload and move files to desire location and change file or directory(folder) permission, you can easily fix you permission denied problem.

Read More



IIS Manager: Could not connect to the specified computer - Fix it Now ?


This article covers methods to resolve the IIS Manager error "Could not connect to the specified computer". 


To install and configure Microsoft Windows Internet Information Services:

  • Select: Manage / Add Roles and Features.
  • Select "Next" until you get to Server Roles. Scroll down and open Web Server (IIS) / Management Tools.
  • Select "Management Service".
  • Select "Next" and "Install".
  • Once installation completes, open services. If you already had services open, use refresh to add it to your list. Scroll down to Web Management Service. You will notice it is installed, but not started. It is also set to manual, so it will not start on reboot either. You need to change both of these so the service will run now and will run anytime the server is rebooted. Open the properties.
  • Change the Startup type to "Automatic". Do not start the service yet as you will not be able to configure the service while it is running.
  • Launch IIS, open Management Service.
  • Configure the Web Management Service, then apply your changes and start the service.


How to configure Microsoft IIS ?

  • Enable remote management.
  • Use windows credentials only.
  • Deny access to all except your approved IP addresses.  Use IP address ranges only when you control the entire range.
  • Use your server’s certificate if you have one configured. (Optional).
  • Change the port from the default to something else if the server is accessible from the Internet. (Optional).
  • Now you will be able to remotely manage IIS from any IP address you granted access.

Read More



WMI Error: Login to remote object in Nagios - Fix it Now ?


This article covers how to fix the WMI error for our customers. 

Sometimes the standard permission levels defined in the Monitoring Windows Using WMI documentation do not expose all the monitoring capabilities of the WMI plugin. 

In these cases you can elevate permissions by adding the WMI user to one of the two local groups:

  • Performance Monitor Users
  • Administrators

Read More



WMI ERROR: Retrieve result data - Fix it Now ?


This article covers process to fix WMI ERROR for our Customers. Due to a memory leak in the WMI functions in Windows 2008 and Windows 7, the system resources may be exhausted in the Windows system, resulting in the error message found above.

It has been seen that systeminfo and wmic commands executed via the command prompt fails in case this issue is present, displaying error messages such as:

The paging file is too small for this operation to complete.

Looking at the process list in the Windows system, it can be determined that the WmiPrvSE.exe process has allocated unusually large amounts of memory.

Read More



Service Not Listed in WMI Wizard in Nagios - Fix it Now ?


This article covers methods to tackle Service Not Listed in WMI Wizard in Nagios. Basically, Service may not get listed in WMI Wizard in Nagios due to reasons like lower value of Truncate Output Length or insufficient permission of the user account. Windows Management Instrumentation (WMI) is a part of Windows operating systems and can provide management data and operational information about those system. WMI can be used to automate administrative tasks on remote Windows-based computers. Nagios Core and Nagios XI are capable of monitoring Windows machines via WMI. .


To Check the permissions of the files, use this command:

ls -ls /tmp/*.state

Here you can see that the root user/group is the owner of the file:

-rw-r--r-- 1 root root 91 Apr 24 16:10 /tmp/cwpss_checkcpu__1025143___.state

The simplest option is to delete the files with this command:

rm -rf /tmp/*.state

Read More



WMI Monitoring With Nagios - How to do it ?


This article covers how to monitor Windows machines with Nagios XI using WMI.

Basically, to set up WMI monitoring with Nagios, we need to configure A WMI User Account On The Windows Machine and then set up the WMI permissions. Windows Management Instrumentation (WMI) is a technology that allows for agentless monitoring of Windows servers and workstations.


Benefits of WMI Monitoring With Nagios:

  • Increased server, services, and application availability.
  • Fast detection of server and operating system failures.
  • Fast detection of service and application failures.
  • Agentless monitoring.

Read More



WHM Internal server error 500 - Fix it Now ?


This article covers different ways to troubleshoot and resolve WHM / cPanel Internal server error 500.

Basically, the "Internal server error 500" message happens while accessing WHM panel or cPanel and one of the cPanel process failing to load or still running in the background.


Other causes of 500 Internal Server Error in WHM?

  • Incorrect permissions settings, usually due to having a file as "world" writeable.
  • Incorrect permissions settings for use by another script (this is common with manual installs of forums or blogs).
  • Incorrect coding in the .htaccess file.

Read More



iisnode encountered an error when processing the request - Fix it Now ?


This article covers methods to resolve "iisnode encountered an error when processing the request" error.

Basically, this iisnode error triggers when the application pool doesn't have enough permissions to write to the current folder. 

Therefore, you need to Allow, 'Full Control', for user 'IIS_IUSRS', from 'Advanced Security' upon right clicking your application root directory.


This error simply denotes that Your application pool doesn't seem to have enough permissions to write to the current folder.

1. You can either edit the permissions to give the IIS_IUSRS group write permissions to that folder

2. Go into the advanced settings menu and under Process Model -> Identity change the user account to a user that already has write permissions.

Read More



SQL error 300 - Fix it Now


This article covers tips to resolve SQL error 300. The reason of the error is related with user permission on VIEW SERVER STATE. You can upgrade SQL Server Management studio with the same version like SQL Instance or higher. 


Also, To mitigate this error, give the following GRANT and the error message will disappear:

USE master
GO
GRANT VIEW SERVER STATE TO "LoginName"

Read More



Checkpoint Process in SQL Server - An Insight into it


This article covers the Checkpoint process in SQL server and the four types of checkpoints available.
Checkpoints are the useful repositories of information and serve best for the recovery of SQL server databases.

Different Types of Checkpoint in #SQL:
1. Automatic Checkpoint
An automatic checkpoint is the most common type that is triggered by a background process. Server Configuration Option “Recovery Interval” is used by the SQL Server Database Engine to determine how often automatic checkpoints are issued on a given database.
2. Indirect Checkpoint
A new type of #checkpoint introduced in SQL Server 2012 is an Indirect checkpoint. Indirect checkpoint also runs in the background, but it meets user-specified target recovery time for a given database.
3. Manual Checkpoint
Manual checkpoint runs like any other Transact-SQL command. It runs to completion by default. This type of checkpoint occurs in the current database only. It is also possible to set the time frame in which you want your checkpoint completed.
4. Internal Checkpoint
The fourth type is Internal checkpoint that cannot be controlled by user.

Read More



ModSecurity failed to open the audit log file error


This article will guide you on methods to resolve the error 'ModSecurity failed to open the audit log file' which occur as a result of a missing log files or due to improper permissions.

1. Setting ownership to www-data:www-data and file permissions from 600 to 660 will fix this problem.

2. Ensure that the permissions are properly configured on these files.

Execute the command below:

chmod 0644 /etc/apache2/logs/error_log

chmod 0600 /etc/apache2/logs/modsec_audit.log

The modsec log files are assigned 0600 permissions by default, whereas the error_log is assigned 0644 permissions by default.

3. mkdir permission denied signifies that the user you're running the mkdir as, doesn't have permissions to create new directory in the location you specified. 

You should use ls command on the higher level directory to confirm permissions.

4. The mkdir command by default gives rwx permissions for the current user only. To add read, write, and execute permission for all users, add the -m option with the user 777 when creating a directory.

Read More



Preserve Permissions in rsync


This article will guide you on how to use rsync to preserve permissions. 

Rsync, or Remote #Sync, is a free command-line tool that lets you transfer files and directories to local and remote destinations. #Rsync is used for mirroring, performing backups, or migrating data to other servers.

a = archive - means it preserves #permissions (owners, groups), times, symbolic links, and devices. Use of "/" at the end of path: When using "/" at the end of source, rsync will copy the content of the last folder.

To preserve permissions when files and folders are copied or moved, use the Xcopy.exe utility with the /O or the /X switch. 

The object's original permissions will be added to inheritable permissions in the new location.

To make rsync to preserve timestamps:

1. To overcome this, there is another option that you can specify in the rsync command that will preserve the timestamps during the synchronization process. 

2. Without preserving the timestamp, the files will display the modification date and time as the time that the rsync command was run.

Read More



Steps to deploy DACPAC with SSMS


This article will guide you on the steps to deploy DACPAC which involves registering a DAC instance by storing the DAC definition in the #msdb system database. 

A DAC is a self-contained unit of #SQL Server #database deployment that enables data-tier developers and database administrators to package SQL #Server objects into a portable artifact called a #DAC package, also known as a #DACPAC.

Read More



An error occurred when calling the RevokeSecurityGroupIngress operation Steps to fix this aws error


This article will guide you on the steps to fix the AWS error "An error occurred when calling the RevokeSecurityGroupIngress operation" which shows that the target security group doesn’t have an inbound rule, or isn’t located in the default Amazon Virtual Private Cloud (Amazon VPC).

Read More



Unable to open Outlook attachments


This article will guide you on the different methods to tackle Outlook error message "unable to open outlook attachments" which occurs while opening an Outlook attachment. 

Read More




For Linux Tutorials

We create Linux HowTos and Tutorials for Sys Admins. Visit us on LinuxAPT.com

Also for Tech related tips, Visit forum.outsourcepath.com or General Technical tips on www.outsourcepath.com






Focus on your business, not your servers.

Click Here to Learn More