Search related to

Install Joomla in CloudPanel - Step by Step Process ?

This article covers how to Install Joomla in CloudPanel control Panel. Basically, Joomla  is a free and open-source content management system for publishing web content on websites.


Step by Step how to setup Joomla 3.9 with CloudPanel:

1. Login via SSH to the server e.g. with john-ssh and go to the users tmp directory:

$ cd ~/tmp

2. Download and extract the latest Joomla 3.9 version.

$ mkdir ~/tmp/joomla-3.9 && curl -sL https://downloads.joomla.org/cms/joomla3/3-9-25/Joomla_3-9-25-Stable-Full_Package.tar.gz | tar xfz - -C ~/tmp/joomla-3.9/

3. Move files to the htdocs directory of the domain:

$ cp -R joomla-3.9/* /home/cloudpanel/htdocs/www.domain.com/

4. Reset permissions.

$ cd /home/cloudpanel/htdocs/
$ clpctl system:permissions:reset www.domain.com 775

5. Clean up the tmp directory.

rm -rf ~/tmp/*

6. Open your domain in the browser and go through the installation wizard.

7. Done! Joomla 3.9 is now installed.

Read More


Install Proxmox VE 6 on Debian Buster (Debian 10) - Step by Step Process ?

This article covers the installation of Proxmox VE 6 server on Debian 10 (Buster) Linux system. Please note that you need a 64-bit processor with support for the Intel 64 or AMD64 CPU extensions.

Visit Proxmox Documentation website  for advanced configurations and to master Proxmox VE Administration.


To Access Proxmox VE web interface:

1. Connect to the Proxmox VE admin web interface on (https://youripaddress:8006).

2. Select "PAM Authentication" and authenticate with server's root user password.

3. And add your first network interface to it.

Read More


Install the Acronis BackUp Plugin on cPanel - Step by Step Process ?

This article covers method to install the Acronis BackUp Plugin on cPanel.


To install the Acronis Backup plugin for WHM and cPanel, run the following command:

sh <(curl -L https://download.acronis.com/ci/cpanel/stable/install_acronis_cpanel.sh || wget -O -https://download.acronis.com/ci/cpanel/stable/install_acronis_cpanel.sh)

This command runs the installation script.


How to Install the backup agent ?

To back up the Virtuozzo container, the backup agent must be installed on its host as described in the Installing the backup agent on Virtuozzo host section.

1.Log into WHM UI.

2.Click Plugins> AcronisBackup.

3. Specify the credentials of the account to which the machine should be assigned. Make sure that you specify the credentials of an account created within the customer group (Customer administrator, Unit administrator, or User). Do not specify partner administrator credentials.

4. Follow the installation wizard. During the installation, the software checks if the ports required for communication with the cloud are open. 

If some of the ports are closed, the software shows numbers of these ports and the hostnames for which a port should be open. 

Open the ports, close the wizard, and restart the installation. 

Completing the installation may take several minutes. You can leave the page during this process. 

The backup agent can also be installed by using the command line.


To uninstall the Acronis Backup plugin for WHM and cPanel, run the following command:

$ yum remove acronis-backup-cpanel

Removing the extension will also uninstall the backup agent from the cPanel server.

The backup accounts you created and the backed-up data will be left intact.

Read More


Dnsmasq DHCP Server in Proxmox – How to use for VMs IP ?

This article covers methods to install, configure and resolve matters relating to Dnsmasq DHCP Server in Proxmox. When creating the VM we just need to specify the MAC address for specific IP and than just use DHCP to get the assigned IP.


To Install the DHCP server, run the command:

$ apt install isc-dhcp-server

Read More


Apache Error: "semget: No space left on device" - Fix it Now ?

This article covers methods to resolve Apache Error: "semget: No space left on device". This error indicates that apache failed and will not start again, so check the error log If you see an error similar to the following, it could indicate that your server has run out of semaphores and apache cannot be started:

[emerg] (12)Cannot allocate memory: mod_fcgid: Create process manager error
[error] (28)No space left on device: Cannot create SSLMutex Configuration Failed


To solve this problem you can restart Apache, Postgres and other services that consumer many IPC resources or increase limit of the resources in the system using 'sysctl'. When you stop all services the semaphores and shared memory segments have to be removed, if not, and you still able to see them using 'ipcs' command, try to remove them manually using 'ipcrm' command. 

1. For example to remove semaphore:

# ipcs -a

2. If this is a common problem for you, you may want to increase the semaphore limits on your VPS server. You can do that by adding the following to the /etc/sysctl.conf file:

# Increases the semaphore limits & extend Apache's uptime.

kernel.msgmni = 512
kernel.sem = 250 128000 32 512

3. Then load the new settings into the kernel:

sysctl -p

Read More


Exclude Files from Backups in cPanel - How to do it ?

This article covers how to set up both global and local exclude files. Basically, we would require to exclude certain files from backups in cPanel either for security purposes or to reduce the size of the backup file. 

When backing up large accounts, it can be desirable to skip certain large directories or exclude files for security reasons. Whatever the reason, cPanel offers two methods for excluding files from the standard backup process.


To exclude files or directories from your user backups, perform either of the following actions:

  • Exclude the files from all user's backups.
  • Exclude the files from an individual user's backups.


For one cPanel user

Users or administrators can modify the user-level exclude file. /home/username/cpbackup-exclude.conf excludes files from a specific user's home directory.

$ nano /home/username/cpbackup-exclude.conf

# add new entries here

example/
dir/example.php

Read More


Exclude Files from Backups in DirectAdmin - How to do it ?

This article covers how to Exclude Files from Backups in DirectAdmin. 


User ability to skip paths from their tar.gz backup files in DirectAdmin.

i. New optional file:

/home/username/.backup_exclude_paths

where User can add paths to this file that they wish to have skipped from their backup.

The format of the file must be relative to /home/user and should not include a "/home/user" prefix.

2. New default internal directadmin.conf setting:

allow_backup_exclude_path=1

can be disabled by setting it to 0 and restarting DA.

A sample line in the .backup_exclude_paths would look like:

domains/domain.com/awstats

so that the path:

/home/username/domains/domain.com/awstats

is skipped from the backup.

This will add:

--exclude-from=/home/username/.backup_exclude_paths

Just after the -C /home/username option in the creation of BOTH the home.tar.gz and the user's backup tar.gz.

So using the feature will truly exclude the path, regardless of if it's in /home/user/domains, or /home/user/*.

As you may have noticed, the option uses tar's exclude-file option.

This supports patterns, eg:

*.gz

So you have skip those types of files, regardless of what path they're under.

Read More


Monitoring Linux Using NCPA

This article covers how to go about setting up monitoring in Linux using NCPA. You will learn how to configure NCPA to monitor Linux.

NCPA is a cross-platform monitoring agent for Nagios Core and Nagios XI that runs on Windows, Linux/Unix, and Mac OS/X machines. Its features include both active and passive checks, remote management, and a local monitoring interface.


In Nagios XI wizards can be used to to perform configuration of hosts and services through the Web UI. Wizards take the complicated matter of creating hosts and services, defining configuration parameters, assigning contacts, contact groups, hostgroups, servicegroups, etc, into a easy steps form in the Nagios XI UI. 

Wizards can also be easily added to Nagios XI through the Admin -> Manage Wizards menu to expand the capabilities of Nagios XI.

Read More


Active Directory Temporary Group Membership on Windows Server 2016

This article covers how to implement  Active Directory Temporary Group Membership on Windows Server 2016. Temporary Group Membership is a new feature that appeared in Windows Server 2016 and is a part of the Privileged Access Management (PAM) functionality.


By default, PAM is not active and the first thing you need to do is turn it on. You can do this with the PowerShell cmdlet Enable-ADOptionalFeature. For example, to enable PAM in domain contoso.com, run the following command with domain administrator privileges:

Enable-ADOptionalFeature -Identity ″Privileged Access Management Feature″ -Scope ForestOrConfigurationSet -Target ″contoso.com″

Read More


WHM Internal server error 500 - Fix it Now ?

This article covers different ways to troubleshoot and resolve WHM / cPanel Internal server error 500.

Basically, the "Internal server error 500" message happens while accessing WHM panel or cPanel and one of the cPanel process failing to load or still running in the background.


Other causes of 500 Internal Server Error in WHM?

  • Incorrect permissions settings, usually due to having a file as "world" writeable.
  • Incorrect permissions settings for use by another script (this is common with manual installs of forums or blogs).
  • Incorrect coding in the .htaccess file.

Read More


Managing Snapshots and Maintenance in Nagios Log Server

This article covers how to manage Snapshots and Maintenance in Nagios Log Server. Here, You will learn method to create and manage backups and Repositories and how to manage your Nagios Log Server Maintenance.

Read More


Import Config Files From Nagios Core into Nagios XI

This article covers method to Import Config Files From Nagios Core into Nagios XI.

Importing configuration files automates setting up your existing Hosts, Services, Hostgroups, Servicegroups, and Host/Service Templates in your Nagios XI installation.


To Import Configuration Files Into Nagios XI:

1. In CCM expand Tools and select Config File Management. 

2. Click the Write Configs button to create / update the config files on the Nagios XI server. 

3. You can see in the screenshot to the right that the host and service config files were created and the existing hostgroups and commands config files were updated.

Read More


Sending ESXi logs to Nagios log server - How to set it up ?

This article covers how to go about Sending ESXi logs to Nagios log server. 

To Send ESXi Logs To Nagios Log Server:

1. Login to Nagios Log Server and navigate to Configure > Global (All Instances) > Global Config. 

2. Click the + Add Input button and select Custom. 

3. A new block will appear at the bottom of the list of Inputs. 

4. Type a unique name for the input which will be Syslog (ESXi).

Read More


Nagios – Monitor hosts using SSH: How to use the plugin ?

This article covers how to monitor Nagios using SSH. 

In order to monitor Linux hosts using the Nagios check_by_ssh plugin, there are a few prerequisites that must be met:

  • Create a Nagios user for monitoring on the host to be monitored.
  • Configure passwordless SSH authentication as nagios user on host to monitor.
  • Install Nagios plugins on the host to monitor.


To Create a Nagios user:

Login to the host to monitor and create a user called nagios and set the login password.

useradd -m nagios
passwd nagios

Read More


Remove Instance From Nagios Log Server Cluster

This article covers method to remove an instance from a Nagios Log Server cluster. Removing an instance from a Nagios Log Server cluster is as simple as updating the cluster_hosts configuration file and restarting the Elasticsearch database service on each node.

You can easily isolate an instance from the cluster for testing purposes. The instance that you want to isolate simply has it's own IP address in the cluster_hosts configuration file and none of the other instances. This means you will have two clusters that exist with the same cluster ID but they do not talk to each other. You

don't need to physically isolate this instance from the other instances on your network, the configuration file dictates who participates in the cluster.


To An Instance From A Nagios Log Server Cluster:

  • Open the Nagios Log Server web interface and navigate to Admin > System > Instance Status. 
  • In the Instances table click the trashcan icon to delete the removed instance. 
  • This completes the steps required to remove an instance from a Nagios Log Server cluster.

Read More


Configure Windows Firewall Rule using Group Policy

This article covers methods to Configure Windows Firewall Rule using Group Policy. Most of the procedures in this guide instruct you to use Group Policy settings for Windows Firewall with Advanced Security.


To open a GPO to Windows Firewall with Advanced Security:

1. Open the Group Policy Management console.

2. In the navigation pane, expand Forest: YourForestName, expand Domains, expand YourDomainName, expand Group Policy Objects, right-click the GPO you want to modify, and then click Edit.

3. In the navigation pane of the Group Policy Management Editor, navigate to Computer Configuration > Policies > Windows Settings > Security Settings > Windows Firewall with Advanced Security > Windows Firewall with Advanced Security - LDAP://cn={GUID},cn=

Read More


Restart Linux Services With NCPA in Nagios - How to do it Now ?

This article covers how to go about Restarting Linux Services With NCPA. In the configuration section you'll find that you will need to restart the services each time configuration changes are made. You can also view the services in the windows services administration panel, but you can also do it easily from the command line. This is an example for CentOS.


NCPA is an advanced, cross-platform agent that can be installed on Windows / Linux / AIX / Mac OS X machines. Target Audience. This document is intended for use by both Nagios administrators and users who wish to use NCPA. Installing NCPA.


How do I know if Nagios is installed?

Easiest way to check the Nagios Core version is using the Nagios GUI.

# /usr/local/nagios/bin/nagios –help

Read More


Munin plugin fails to install due to missing dependencies - Fix it Now ?

This article covers methods to resolve Munin installation error.

A quick fix to this error is to run the following commands as root should allow the installation of Munin to complete:

yum-complete-transaction --cleanup-only
yum install pango cairo pixman
/scripts/check_cpanel_rpms --targets munin

Read More


Package conflict errors with ea-nginx on CloudLinux - Fix it Now ?

This article covers how to resolve Package conflict errors with ea-nginx on CloudLinux. Basically, Cloudlinux servers with ea-nginx, yum or cPanel updates tend to fall with this error. 


On Cloudlinux servers where already packages for ModSecurity2 are installed (ea-modsec-sdbm-util & ea-apache24-mod_security2), trying to install ea-nginx or run a yum update/cPanel update fails because as a part of ea-nginx dependencies, some of ModSecurity3 packages (ea-modsec30 & ea-modsec30-connector-nginx) will also be attempted to be installed, and that causes a conflict between the packages belonging to ModSecuirty2 and Modsecurity3, which in turn causes yum and UPCP to fail. 


To resolve systems that are currently experiencing this error, update EA packages to the beta branch:

$ yum update ea-* --enablerepo=cl-ea4-testing

 

To install ea-nginx on affected systems using the beta repository, install it with the following command:

$ yum install ea-nginx --enablerepo=cl-ea4-testing

Read More


PHPMyAdmin import database timeout - Fix it Now ?

This article covers methods to fix PHPMyAdmin import database timeout error. This error happens because of a huge file and the restoration process fails with timeout.


To resolve this error, 

1. Login to the server over SSH.

2. Create the file config.inc.php.

For Plesk Onyx and Plesk Obsidian below 18.0.30:

# cp -p /usr/local/psa/admin/htdocs/domains/databases/phpMyAdmin/libraries/config.default.php /usr/local/psa/admin/htdocs/domains/databases/phpMyAdmin/config.inc.php

For Plesk Obsidian 18.0.30 and above:

# cp -p /usr/local/psa/phpMyAdmin/libraries/config.default.php /usr/local/psa/phpMyAdmin/config.inc.php

3. Increase the value of $cfg['ExecTimeLimit'] in config.inc.php created on step 2:

$cfg['ExecTimeLimit'] = 3600;

4. Increase the settings in /etc/sw-cp-server/config to avoid '504 Gateway Timeout' error:

fastcgi_read_timeout 3600;
fastcgi_send_timeout 3600;

5. Restart sw-cp-server:

$ service sw-cp-server restart

Read More


Error – Cannot find a valid baseurl for repo: base - Fix it Now ?

This article covers methods to resolve Error – Cannot find a valid baseurl for repo: base. 

To get rid of these error messages and make it possible to update OP5 Monitor you need to change your Centos Base repos in /etc/yum.repos.d/CentOS-Base.repo as follows:

#mirrorlist=http://mirrorlist.centos.org/?release=$releasever&arch=$basearch&repo=os&infra=$infra
baseurl=http://vault.centos.org/centos/$releasever/os/$basearch/

Comment out all mirrorlist lines, remove the comment from baseurl and change it to "vault.centos.org". 

This way yum will stop complaining and you will be able to use the OP5 repos.

Read More


Modify the Default SSH Port on any Linux Distribution - Step by Step Process ?

This article covers how to change the default SSH port on your Linux machine.

To change the default port the SSHD daemon is listening on.

We can edit the configuration file using a nano editor:

$ sudo nano /etc/ssh/sshd_config

Once you make a change to the SSHD daemon configuration file, you should restart the services to reload the new changes.

$ sudo service sshd restart

Read More


Docker error "bind: address already in use" - Fix it Now ?

This article covers the best method to resolve Docker error "bind: address already in use".

Sometimes, when trying to start your docker instance, it's possible to be stunted by another process using the same port. 

Also, this docker error can happen when for any reason your host reboots. 

In this instance, try restarting your apache server. 

Stopping apache2 service in the host can solve it:

$ sudo /etc/init.d/apache2 restart 

If nginx is running globally this could be the reason too. 

Run the command:

$ sudo nginx -s stop

Read More


Database import hangs in Plesk - Fix it Now ?

This article covers methods to resolve Database importing hangs in Plesk with error reading communication packets. Generally, the database import task in Plesk fails due to non-optimized client databases.

The solution to this Plesk error is to simply optimize the databases.

Read More


Configure Windows Firewall Rules with PowerShell

This article covers method to Configure Windows Firewall Rules with PowerShell. The New-NetFirewallRule cmdlet creates an inbound or outbound firewall rule and adds the rule to the target computer.

Some parameters are used to specify the conditions that must be matched for the rule to apply, such as the LocalAddress and RemoteAddress parameters. Other parameters specify the way that the connection should be secured, like the Authentication and Encryption parameters. Rules that already exist can be managed with the Get-NetFirewallRule and Set-NetFirewallRule cmdlets.

Filter objects, such as NetFirewallAddressFilter or NetFirewallApplicationFilter, are created with each firewall rule. The filter objects and rules are always one-to-one and are managed automatically.


To enable all three network profiles. Domain, Public and Private, use this command:

Set-NetFirewallProfile -All -Enabled True

Or set the specific profile instead All:

Set-NetFirewallProfile -Profile Public -Enabled True

To disable the firewall for all three network location, use the command:

Set-NetFirewallProfile -All -Enabled False

Read More


The RPC server is unavailable – Fix it Now ?

This article covers methods to resolve RPC server error. To prevent the problem from reoccurring, check your firewall settings to see whether RPC data traffic is being blocked. If you use a third-party firewall, check the appropriate settings. If you use the Windows firewall, open the Control Panel and search for 'Windows Firewall". In the "Remote" tab, under "Remote Assistance", all of the boxes should be checked.


How to fix the RPC server error ?

Fortunately, the error can be resolved easily and quickly. You just need to restart the service.

  • From the Start menu (Windows symbol) open the Control Panel.
  • Select "Administrative Tools" and then "Services". Alternatively, you can enter "Services" in the search bar.
  • Find "DCOM Server Process Launcher" in the list and double-click to open it.
  • You are now in the configuration menu for the RPC server. Ideally, the "Startup type" should be set to "Automatic" and the "Service status" should show "Running". If this is not the case, set the "Startup type" to "Automatic" and click the "Start" button under "Service status". Click "OK" to confirm.
  • Now close any programs you have running and restart your computer.

Read More


Install Wazuh Server on Ubuntu 20.04 - Step by Step Process ?

This article covers how to go about to install Wazuh Server on Ubuntu 20.04. Wazuh is a free and open source solution for security monitoring.

It monitors hosts at an application and operating system levels and offers  threat detection, incident response, integrity monitoring, and compliance. 


To restart Kibana, Elasticsearch and Wazuh-manager with the below commands:

$ sudo systemctl restart kibana
$ sudo systemctl restart elasticsearch
$ sudo systemctl restart wazuh-manager

Read More


Configure filters in Nagios log server - Do it Now ?

This article covers method to customize Nagios Log Server Filters. Basically, to configure filters in Nagios log server, one needs to be familiar with the Filter Configuration options available within the log server.

Filters can be applied to messages before they are sent to Elasticsearch for indexing. They perform actions such as breaking apart messages into fields for easy searching, adding geo location information, resolving IP to DNS names and dropping messages you do not want indexed.

Read More


Adding Additional Instances To Nagios Log Server Cluster

This article covers method to add instances to Nagios Log Server Cluster. You will need to have an existing Nagios Log Server cluster before following the steps in this guide. An existing cluster is one or more instances of Nagios Log server.

Read More


Manage Clusters In Nagios Log Server - Fix it Now ?

This article covers how to manage and identify key information on your Nagios Log. Nagios Log Server is a clustered application, it consists of one or more instances of Nagios Log Server. An instance is an installation of Nagios Log Server, it participates in the cluster and acts as a location for the received log data to reside. The log data is spread across the instances using the Elasticsearch database, a special database used by Nagios Log Server.

Read More


Pluggable.php File Errors in WordPress – Fix it Now ?

This article covers methods to fix Pluggable.php File Errors in WordPress. Basically, this WordPress error triggers when we add a code snippet on our site or activate a new plugin.

This means that Pluggable.php file errors takes place as a result of a poorly coded theme or plugin. It could also be a result of code errors in your WP files. 


The first option when troubleshooting the Warning: cannot modify header information pluggable.php error is to manually edit the faulty file. You are already supplied with the necessary information to locate the problem in the error message (remember, it's the first file in the message). 

All you need to do is open up this file, either through an FTP client like FileZilla, or through File Manager.

Make sure to pay special attention to the starting and ending PHP tags. 

There should not be spaces before or after the <?php tag, as well as the ?> tag. 

Also, the last line of code should not be followed with a blank line or extra space.

Read More


cPanel reported error number 1 when it ended - Fix it Now ?

This article covers methods to resolve cPanel reported error number 1 when it ended. This error makes cPanel copy action on an account from another server to fail.

The error means that the destination server isn't able to login into the source server to fetch files .


To fix this error, do the following:

1) Recheck your username and password used along with the IP too.

2) Firewall, the source firewall is blocking your destination server IP. 

You would need to login into the WHM of the source server and goto "ConfigServer Security & Firewall".

Retry you transfer and it should be working.

Read More


Import Nagios Log Server Into Microsoft Hyper-V - How to Do it?

This article covers how to easily Import Nagios Log Server Into Microsoft Hyper-V. Basically, to Import Nagios Log Server Into Microsoft Hyper-V we need to follow a series of steps outlined in this guide. 

Read More


cPanel Error Iproute Conflicts With Kernel - Fix it Now ?

This article covers method to fix cPanel Error Iproute Conflicts With Kernel. Basically, this error happens when we have an outdated kernel on the server. 


Instead of deleting conflicting kernels, you can also add the iproute package to the excludes of yum in /etc/yum.conf file, then the iproute package won't be marked for the update.

It can be useful when you need to perform an update but can't reboot the server at the given moment. 

It can be excluded manually using a preferred text editor or using the following command:

$ sed -i 's/exclude=/exclude=iproute /' /etc/yum.conf

The change can be reverted using this command:

$ sed -i 's/exclude=iproute /exclude=/' /etc/yum.conf

Read More


Configure SSL / TLS in Nagios Log Server - How to do it ?

This article covers how to configure SSL/TLS in Nagios Log Server. SSL/TLS provides security between the end user's web browser and Nagios Log

Server by encrypting the traffic. This guide is intended for use by Nagios Log Server Administrators who require encrypted connections to their Nagios Log Server.

Read More


cPanel error networkmanager is installed and running

This article covers how to resolve the error, NetworkManager is installed and running. Basically, this error happens if cPanel does not support NetworkManager-enabled systems.


To fix this error, simply run the commands below and then restart the installation of cPANEL:

$ systemctl stop NetworkManager.service
$ systemctl disable NetworkManager.service

Read More


Managing Instances In Nagios Log Server

This article covers Instances in Nagios Log Server and how we can manage them. 

Nagios Log Server is a clustered application, it consists of one or more instances of Nagios Log Server. An

instance is an installation of Nagios Log Server, it participates in the cluster and acts as a location for the

received log data to reside. The log data is spread across the instances using the Elasticsearch database, a

special database used by Nagios Log Server.

Read More


Install Wazuh Server on CentOS 7 - Step by Step Process ?

This article covers the installation procedure of Wazuh Server on CentOS Linux System. Basically, Wazuh is a free, open-source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance. 


You can use Wazuh for the following applications:

  • Security analysis
  • Log analysis
  • Vulnerability detection
  • Container security
  • Cloud security


To Install Java on CentOS 8.

1. Run the command below to install JDK:

$ sudo dnf install java-11-openjdk-devel

2. Confirm that you have it installed

$ java -version

Read More


Alerting On Log Events With Nagios Log Server

This article covers Alerting On Log Events With Nagios Log Server. Basically, for alerting on Log Events with Nagios Log Server one needs to be familiar with the options available.

With this guide, you will learn how to create various alerts in Nagios Log Server, such as sending

them to a Nagios XI or Nagios Core monitoring server using Nagios Remote Data Processor

(NRDP), sending an email, sending SNMP traps and executing scripts.

Read More


Install Ajenti Control Panel on Debian 10 / Debian 9 - Step by Step Process ?

This article covers how to install Ajenti Control Panel on Debian system. Basically, Ajenti is a simple tool to manage your websites, Firewall, DNS, Cron, Logs, Files, Mail hosting services and so on.

Read More


Analyzing Logs With Nagios Log Server

This article covers how to analyze  logs with Nagios Log Server.  Basically, in order to analyze logs with Nagios Log Server one needs to be familiar with the options in the Dashboards menu. This guide is very essential to Nagios Log Server administrators and users looking for information on querying, filtering and drilling down the data in Nagios Log Server.

You can audit your IT infrastructure, maintain historical records of usage of IT infrastructure, create reports, and analyze logs using the Nagios Log Server.

Read More


Hardening Windows Using Microsoft Security Baseline

This article covers Hardening Windows Using Microsoft Security Baseline.

Every organization faces security threats. However, the types of security threats that are of most concern to one organization can be completely different from another organization. For example, an e-commerce company may focus on protecting its Internet-facing web apps, while a hospital may focus on protecting confidential patient information.

The one thing that all organizations have in common is a need to keep their apps and devices secure. These devices must be compliant with the security standards (or security baselines) defined by the organization.

A security baseline is a group of Microsoft-recommended configuration settings that explains their security impact. These settings are based on feedback from Microsoft security engineering teams, product groups, partners, and customers.


How can you use security baselines?

You can use security baselines to:

1. Ensure that user and device configuration settings are compliant with the baseline.

2. Set configuration settings. For example, you can use Group Policy, Microsoft Endpoint Configuration Manager, or Microsoft Intune to configure a device with the setting values specified in the baseline.

Read More


Access denied to VNC Server - How to fix this error ?

This article covers methods to fix the error, Access denied to VNC Server. Basically, this error occurs while trying to connect to a VNC server using a cloud connection. This message means that your RealVNC account has been signed out of VNC Viewer.

This will happen if you have recently changed the password for your RealVNC account, for example.


To resolve this VNC connection issue, click Sign in again and enter your RealVNC account credentials.

Once you see a green tick/check mark in the top right next to your name, try connecting to the VNC Server again.

Read More


Install Docker CE on AlmaLinux 8 - Step by Step Process ?

This article covers the process of installing Docker CE on AlmaLinux. Docker is a popular virtualization platform for running applications in Containers.

It allows us to build and communicate containers with one on another.


To install Docker CE on AlmaLinux 8:

1. Add official Docker CE repository on your AlmaLinux 8, so that we can install it without downloading its packages manually.

$ sudo dnf config-manager --add-repo=https://download.docker.com/linux/centos/docker-ce.repo

2. To let the system recognize the added Docker repository and the packages available in the same, run the system update that will force AlmaLinux to rebuild the system repo cache.

$ sudo dnf update

3. You can check the added repo including others of your system using the command.

$ sudo dnf repolist -v

4. Run the Command to Install Docker CE Engine.

$ sudo dnf install docker-ce docker-ce-cli containerd.io

5. Once the installation is completed, start the Docker service on your AlmaLinux and also enable it to run automatically with system boot.

$ sudo systemctl enable docker
$ sudo systemctl start docker

6. Check the Status of the Service to know it is working properly.

$ systemctl status docker

Read More


SNMP Trap Hardening in Nagios - How it Works ?

This article covers how to go about SNMP Trap Hardening in Nagios.


When using the vi editor:

1. To make changes press i on the keyboard first to enter insert mode

2. Press Esc to exit insert mode

3. When you have finished, save the changes in vi by typing :wq and press Enter

 

How to Send Test Trap ?

When working through this documentation you may want to test the changes by sending a test trap. The following KB article provides examples on how to send a test trap, which can be very helpful:


How To Send A SNMP Test Trap ?

When a test trap is received on the Nagios XI server it should be logged in the /var/log/snmptt/snmpttunknown.log file.

The default SNMP Trap configuration is stored in the /etc/snmp/snmptrapd.conf file and contains just two lines:

disableAuthorization yes
traphandle default /usr/sbin/snmptthandler

Read More


NRPE Command Plugin Not Defined - How to fix it ?

This article covers methods to resolve 'NRPE Command Plugin Not Defined' for our customers.

This error is very straight forward. Usually this is caused by a mismatch between the command name declared in Nagios XI to be check through NRPE and the actual command name of the command directive in the remote host's nrpe.cfg file.

This problem will occur in versions of check_nrpe before v3. 

What is happening here is that the initial -c check_users is being overwritten by the -a -w 5 -c 10, as check_nrpe thinks the -c 10 argument is the command argument, not one of the -a arguments.

Read More


SNMP Trap v3 Configuration in Nagios - How to get it done ?

This article covers How to configure SNMP Trap v3 on the Nagios XI server.

The main difference between v2 and v3 traps is the authentication mechanisms. v2 is much simpler by design whereas v3 has multiple layers of authentication to strengthen it. Probably the biggest difference is that the SNMP Trap Daemon (snmptrapd) is configured by default to accept v2 traps from any device regardless of what SNMP community is provided. 

However snmptrapd cannot be configured to accept traps v3 from any device, it must be configured before it can receive an SNMP v3 trap.


The default SNMP Trap configuration is stored in the /etc/snmp/snmptrapd.conf file and contains just two lines:

disableAuthorization yes
traphandle default /usr/sbin/snmptthandler

 

The disableAuthorization directive allows SNMP v2 traps from any device to be sent to Nagios XI. 

Even if this line exists the Nagios XI server will not be able to receive SNMP v3 traps unless the server has been specifically configured for SNMP v3 traps.

Read More


Install PHP 8 on CentOS 7 / CentOS 8 - Step by Step Process ?

This article covers how to install PHP 8.0 on CentOS 8/7 and RHEL 8/7.

PHP is the most used scripting language for web development, both websites and web applications.

This guide will show you how to install PHP 8.0 on CentOS 8 | CentOS 7. 

Please note the GA release is fit for running in Production if the application already supports it.


To install any additional PHP package use command syntax:

$ sudo yum install php-xxx

To Check PHP version:

$ php --version

Read More


Install PHP 8 on Ubuntu 20.04 or 18.04 - Step by Step Process ?

This article covers steps to install PHP 8 on Ubuntu. PHP is arguably one of the most widely used server-side programming languages. It's the language of choice when developing dynamic and responsive websites. Basically, popular CM platforms such as WordPress, Drupal, and Magento are based on PHP.


To Install PHP as Apache Module

Run the commands:

$ sudo apt update
$ sudo apt install php8.0 libapache2-mod-php8.0

Once the packages are installed, restart Apache for the PHP module to get loaded:

$ sudo systemctl restart apache2


To Configure Apache with PHP-FPM

Php-FPM is a FastCGI process manager for PHP. 

1. Run the following command to install the necessary packages:

$ sudo apt update
$ sudo apt install php8.0-fpm libapache2-mod-fcgid

2. By default PHP-FPM is not enabled in Apache. 

To enable it, run:

$ sudo a2enmod proxy_fcgi setenvif
$ sudo a2enconf php8.0-fpm

3. To activate the changes, restart Apache:

$ systemctl restart apache2 


To install PHP 8.0 with Nginx

Nginx doesn't have built-in support for processing PHP files. We'll use PHP-FPM ("fastCGI process manager") to handle the PHP files.

Run the following commands to install PHP and PHP FPM packages:

$ sudo apt update
$ sudo apt install php8.0-fpm

Once the installation is completed, the FPM service will start automatically. 

To check the status of the service, run

$ systemctl status php8.0-fpm

Do not forget to restart the Nginx service so that the new configuration takes effect:

$ sudo systemctl restart nginx

Read More


Configure RDS User Profile Disks on Windows

This article covers method to configure and use User Profile Disks on a server with Remote Desktop Services role running on Windows Server 2012 / 2012 R2 / 2016.

In a single RDS collection, there can exist only one VHDX profile file for one user. If a user connects to the resources from two different collections, a separate profile disk should be created for each of them.

Also note that the UPD drive is bound to the RDS server Windows OS version. You can’t transfer (use) an UPD user profile from an RDS server from one version of Windows Server to another.


To Setup & Enable RDS User Profile Disks:

1. Create a shared network location for the disks.

2. Launch SERVER MANAGER.

3. Expand REMOTE DESKTOP SERVICES > COLLECTIONS.

4. Click on your Collection.

5. Click TASKS > EDIT PROPERTIES (top right corner).

6. Click USER PROFILE DISKS (bottom of the menu on the left).

7. Click ENABLE USER PROFILE DISKS.

8. Set the location to what you created in step 1

i.e. \\YourServerNameHere\UserProfileDisks$

9. Set the maximum size of those disks.

10. Scroll down and set what you want to have stored on those VHD's.


How to Resize User Profile Disks Using PowerShell ?

You can extend the virtual vhdx drive with the user's UPD profile using the PowerShell cmdlet Resize-VirtualDisk from the Hyper-V module:

Net use U: \\rdvh1\DemoLabOficeApps
Resize-VHD -Path u:\UVHD-<SID>.vhdx -SizeBytes 40GB
Net use U: /delete

If you want to run the Resize-VHD cmdlet from a desktop with Windows 10, you must install the feature Hyper-V -> Hyper-V Platform -> Hyper-V Services.

Read More


Send test SNMP trap in Nagios - How does this work ?

This article covers how to send a trap to Nagios server to test SNMP Trap functionality.

Basically, when troubleshooting an SNMP Trap issue, it can be very helpful to remove the actual device that could be causing problems and use the snmptrap command instead.

So in this guide, you will learn all the methods of sending a trap to your Nagios server to test SNMP Trap functionality.


SNMP Trap Definition

The following trap definition can be placed in /etc/snmp/snmptt.conf which will allow the test traps sent above to be passed through to Nagios:

EVENT netSnmpExampleHeartbeatRate .1.3.6.1.4.1.8072.2.3.0.1 "netSnmpExampleHeartbeatRate" Normal
FORMAT SNMP netSnmpExampleHeartbeatRate
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "" "netSnmpExampleHeartbeatRate"


The default SNMP Trap configuration is stored in the /etc/snmp/snmptrapd.conf file and contains just two lines:

disableAuthorization yes
traphandle default /usr/sbin/snmptthandler

Read More


SMTP error no route to host - Fix it Now ?

This article covers methods to resolve SMTP error no route to host.

This error happens when the port is blocked at the hosting end or ISP.

In this guide we have outlined different methods to fix this SMTP error.

Read More


Install PHP 8 on Debian 10 / Debian 9 - Step by Step Process ?

This article covers how to install PHP 8 on any Linux distribution.


To install Apache with PHP 8 module:

$ sudo apt install apache2 libapache2-mod-php8.0 

After successful installation, restart Apache service to reload newly installed modules:

$ sudo systemctl restart apache2 


To check loaded PHP modules use the command:

$ php -m

Read More


PHPMailer SMTP error password command failed - Fix it Now ?

This article covers methods to resolve PHPMailer SMTP error password command failed. 


To fix this SMTP issue, you need to:

1) Login to your Gmail account using the web browser.

2) Click on this link to enable applications to access your account: https://accounts.google.com/b/0/DisplayUnlockCaptcha

3) Click on Continue button to complete the step.

4) Now try again to send the email from your PHP script. It should work.

Read More


Set-ADUser Modify Active Directory Users with PowerShell - Do it now ?

This article covers how to use Set-ADUser Modify Active Directory Users with PowerShell.

Basically, the Set-ADUser cmdlet is part of the Active Directory module for Windows PowerShell.


The Identity parameter specifies the Active Directory user to modify. 

You can identify a user by its distinguished name, GUID, security identifier (SID), or Security Account Manager (SAM) account name. 

You can also set the Identity parameter to an object variable such as $<localUserObject>, or you can pass an object through the pipeline to the Identity parameter.

Read More


Install Docker CE on AlmaLinux 8 - Step by Step Process ?

This article covers step by Step process to install Docker CE on AlmaLinux.

Docker is a tool that is used to run software in a container.

It's a great way for developers and users to worry less about compatibility with an operating system and dependencies because the contained software should run identically on any system.


To Install Docker on AlmaLinux:

1. We can add the Docker repository to our system with the following command.

$ sudo dnf config-manager --add-repo https://download.docker.com/linux/centos/docker-ce.repo

2. Before we begin installing Docker, we need to remove the podman and buildah packages from our system, as they conflict with Docker and will inhibit it from being installed.

$ sudo dnf remove podman buildah

3. Finally, we can install the three Docker packages we'll need by executing the following command.

$ sudo dnf install docker-ce docker-ce-cli containerd.io

4. Once installation is completed, start the Docker service and, optionally, enable it to run whenever the system is rebooted:

$ sudo systemctl start docker.service
$ sudo systemctl enable docker.service

5. You can verify that Docker is installed and gather some information about the current version by entering this command:

$ sudo docker version

Read More


WordPress error "Failed to open stream" - Fix it Now ?

This article covers methods to resolve WordPress error "Failed to open stream".

Basically, this WordPress error triggers when WordPress is unable to load a file mentioned in website code.


To fix this WordPress error:

1. First of all Login to the Dashboard of the site. At left bar of the page users can see Settings Button. Click on the button Settings. Finally click on the button Permalinks.

2. Make all the corrections to make it 'Failed to Open Stream Error' free. After making the changes Click on the button Save Changes.

Read More


WordPress error "Destination Folder Already Exists" – Fix it Now ?

This article covers methods to fix WordPress error "Destination Folder Already Exists".

Basically, this WordPress error triggers when a folder with the same name as that of the plugin or theme already exists. 


To resolve WordPress "Destination folder already exists" error:

Since the error is caused by a plugin or theme folder that already exists, the easiest way to solve the error is by deleting the folder. 

The process of deleting a theme via FTP is the same one you use for deleting a plugin. 

The only exception is that you need to navigate to wp-content/themes instead of wp-content/plugins. 

1. To delete the plugin folder, connect to your server using your FTP credentials and navigate to your root WordPress directory, often called public_html.

2. Then, go to the wp-content/plugins directory.

3. Within the plugins directory, find the plugin folder mentioned in the error message.

4. When you've located the folder you need, right-click on it and press the Delete option from the menu that appears.

5. After that, you will be prompted to confirm your choice. Press the Yes button to proceed.

6. Then, you will have to wait a bit until the plugin folder, as well as all directories and files within it, are deleted. 

Read More


Install CloudPanel on Ubuntu 20.04 - Step by Step Process ?

This article covers the Installation procedure of CloudPanel on Ubuntu 20.04. Basically, CloudPanel, an open source, PHP-based host control software built for the cloud helps to manage hosted services.

CloudPanel is a server management control panel designed to be fast, easy to use and customizable. This piece of software supports management of Domains, Linux services, Cron jobs, FTP services, System security through IP and Bots blocking, User management, Cloud platforms support, among many others.


Main features of CloudPanel Includes:

1. Free to use and open source

2. Provides powerful intuitive interface for management

3. Designed for high Performance with minimal resource usage

4. It is secure – provision of free SSL/TLS certificates

5. It supports all major clouds – AWS, Digital Ocean, GCP, e.t.c

6. CloudPanel is available in more than ten languages, making it easy to install in any region

7. One-Click Let's Encrypt Certificates

8. NGINX Support

9. Multiple PHP Versions


To fix failed CloudPanel installation:

$ sudo apt -f install

Read More


Plesk error FPM initialization failed - Fix it Now ?

This article covers methods to fix Plesk error, FPM initialization failed.

Basically, the error "FPM initialization failed" triggers in Plesk mainly in different formats. The is as a result of Incorrect PHP configuration file was generated during subdomain creation via XML API.


To fix this Plesk error:

i. Log in to Plesk server via SSH.

ii. Remove the excessive configuration file:

rm -f  /etc/php-fpm.d/subdomain.example.com.conf

Read More


DirectAdmin PhpMyAdmin error 500 - Fix it Now ?

This article covers methods to resolve DirectAdmin PhpMyAdmin error 500. This error happens as a result of a number of reasons that include PHP settings, modsecurity rules and so on.


To resolve this error, In the library is /usr/share/phpmyadmin/libraries/sql.lib.php,

You need to modify the file:

From && ($analyzed_sql_results['select_expr'][0] == '*')))

to && ($analyzed_sql_results['select_expr'][0] == '*'))

Read More


The plesk-php7x-fpm service crashes during the reload after domain name change - Fix it Now ?

This article covers how to resolve Plesk error, The plesk-php7x-fpm service crashes during the reload after domain name change. 


To fix this error, you need to update Plesk via a command-line interface:

1. Connect to a Plesk server via SSH (Linux) / RDP (Windows Server).

2. Run Plesk Installer Update (on Windows Server, start a command prompt as an Administrator):

plesk installer update

Read More


Drupal SMTP error "could not connect to smtp host" - Fix it Now ?

This article covers methods to resolve Drupal SMTP error "could not connect to smtp host".

Basically, this error happens as a result of improper Drupal SMTP settings such as wrong SMTP server name, wrong port settings, and so on. 


To resolve this SMTP error, follow the steps given below:

1. Login into myaccount.google.com.

2. Click on the link connected apps & sites.

3. Allow less secure apps" to "ON" (near the bottom of the page).


Also, you can try the following to fix this SMTP error,

1. System access configuration

Need to allow access for firewall or network to send mail for linux, windows and mac.

Following command set permission for linux.

i.  iptables -I OUTPUT -p tcp --dport 465 -j ACCEPT

ii.  iptables -I OUTPUT -p tcp --dport 587 -j ACCEPT


2.  SMTP Authentication Support

Set your gmail and google app information.

If you want to use Gmail as SMTP server,

SMTP server: smtp.gmail.com

SMTP port: 465

Use encrypted protocol: Use SSL 

SMTP Authentication

Username : youremail@gmail.com or ouremail@yourGoogleAppsDomainName.com(google app)

Password : yourpassword

Note : Remove leading and trailing space from "SMTP Authenitcation Username" if is there otherwise it's not authenticate your request to gmail.

Read More


Plesk error Unable to import the dump - Fix it Now ?

This article covers methods to fix database error in Plesk. 


To fix this Plesk database issue:

1. Start by Checking the version of your SQL server with:

# plesk db -Ne "select version()"

2. Make sure that collation mentioned in the error message is not available in MySQL server:

# plesk db -e "show collation" | grep uft8_general_ci

3. So you have to upgrade MariaDB to version 10.1 or 10.2 on the destination server.


How to upgrade Plesk MySQL 5.5 to 5.6/5.7 or MariaDB 5.5 to 10.X on Linux?

By default, Ubuntu 20.04 is shipped with MariaDB 10.3.

1. For security reasons, create a database dump of all databases with the following command:

MYSQL_PWD=`cat /etc/psa/.psa.shadow` mysqldump -u admin --verbose --all-databases --routines --triggers > /tmp/all-databases.sql

2. Stop MariaDB:

$ service mariadb stop

3. Install repositories from Setting up MariaDB Repositories page:

# apt-get install software-properties-common
# apt-key adv --fetch-keys 'https://mariadb.org/mariadb_release_signing_key.asc'
# add-apt-repository 'deb [arch=amd64,arm64,ppc64el] https://mirror.truenetwork.ru/mariadb/repo/10.4/ubuntu focal main'

4. Create a backup of all MySQL data:

$ cp -v -a /var/lib/mysql/ /var/lib/mysql_backup

5. Start an upgrade with the following command. Leave all fields empty when asked for a 'root' user password:

$ apt-get update
$ apt-get install mariadb-server

6. Start the MariaDB service:

# service mariadb start

7. Upgrade MySQL databases:

MYSQL_PWD=`cat /etc/psa/.psa.shadow` mysql_upgrade -uadmin

8. Restart mysql service:

$ service mariadb restart

9. Execute the following commands to update package version inside Plesk:

# plesk bin service_node --update local
# plesk sbin packagemng -sdf

Read More


Enable EPEL repository on AlmaLinux 8 - Step by Step Process ?

This article covers how to enable EPEL repository on AlmaLinux 8.

Extra Packages for Enterprise Linux (EPEL) is repository with a high quality set of additional packages for Enterprise Linux operating systems such as Red Hat Enterprise Linux (RHEL), CentOS and Scientific Linux (SL), Oracle Linux (OL), AlmaLinux and any other Linux distribution from the RHEL family.


Run the command below to install EPEL Repository on AlmaLinux OS 8:

# sudo yum install https://dl.fedoraproject.org/pub/epel/epel-release-latest-8.noarch.rpm

Accept installation using the y key.

Read More


Install WHM Cpanel on AlmaLinux 8 Server - Step by Step Process ?

This article covers the complete steps to install WHM Cpanel on AlmaLinux 8 Server.

To manage Linux servers for hosting purposes most of the services are using WHM's Cpanel.

Although there are many hosting manager software, because of its easy-to-use interface and features, it is one of the best control panels for Web hosting services. 


cPanel, Control Panel, is a control panel developed in 1997 that offers us high-quality web hosting with excellent features that, thanks to WHM (Web Host Manager), can be managed from a graphics console, with everyone doing their job.

Read More


WordPress RSS Feed Errors - Fix it Now ?

This article covers how to resolve WordPress RSS feed errors. RSS feed errors in WordPress all generally come back to your code in one way or another. Fortunately, you don't necessarily have to have any experience with XML to fix the problem.

Over time, the RSS Feed may develop some issues. These issues may be primarily due to poor formatting.

However, there are other causes such as theme problems, copy and paste codes, and bad plugins.

To resolve these issues, you can either opt for manual fixing or use plugins.


To troubleshoot a WordPress RSS feed error:

1. Manually check for errors in functions.php.

2. Switch to a default theme.

3. Test for plugin conflicts.

Read More


iisnode encountered an error when processing the request - Fix it Now ?

This article covers methods to resolve "iisnode encountered an error when processing the request" error.

Basically, this iisnode error triggers when the application pool doesn't have enough permissions to write to the current folder. 

Therefore, you need to Allow, 'Full Control', for user 'IIS_IUSRS', from 'Advanced Security' upon right clicking your application root directory.


This error simply denotes that Your application pool doesn't seem to have enough permissions to write to the current folder.

1. You can either edit the permissions to give the IIS_IUSRS group write permissions to that folder

2. Go into the advanced settings menu and under Process Model -> Identity change the user account to a user that already has write permissions.

Read More


Install CloudPanel Control Panel on Debian 10 - Step by Step Process ?

This article covers how to Install CloudPanel Control Panel on Debian 10. With Cloud panel, you can manage MySQL, NGINX, PHP-FPM, Redis, Domain, FTP, User management, and many more from the web-based interface. 

It supports all major cloud providers including, AWS, Google, Digital Ocean, and specially designed for high performance with minimal resource usage.

It also offers a CLI tool that helps you to perform several operations including, database backup, password reset, permissions, and more.


To Install CloudPanel on Debian Linux:

1. You can download it with the following command:

# curl -sSL https://installer.cloudpanel.io/ce/v1/install.sh -o cloudpanel_installer.sh

2. Once the script is downloaded, set proper permission to the downloaded script with the following command:

# chmod +x cloudpanel_installer.sh

3. Next, run the script using the following command:

$ ./cloudpanel_installer.sh


Main Features of CloudPanel as listed in the official project website are:

1. It is open source and free to use

2. It provides a powerful intuitive interface for management

3. It is secure – provision of free SSL/TLS certificates

4. Designed for high Performance with minimal resource usage

5. It supports all major clouds – AWS, Digital Ocean, GCP, e.t.c

6. CloudPanel is available in more than ten languages, making it easy to install in any region

Read More


Graphs not recording for ICMP and ping checks - Fix it Now ?

This article covers method to fix Nagios error, Graphs not recording for ICMP and ping checks.

This problem happens after upgrading to Nagios XI 2014.


Solution to Nagios XI ICMP and Ping Checks Stopped Graphing:

1. First a Perl package needs to be installed using one of the commands below:

$ apt-get install -y librrd-simple-perl

2. Download and unzip the required files:

cd /tmp
wget https://assets.nagios.com/downloads/nagiosxi/scripts/rrd_ds_fix.zip
unzip rrd_ds_fix.zip

3. To run the script with RRD backups:

./fix_ds_quantity.sh -d /usr/local/nagios/share/perfdata/

Read More


Cloudflare err_ssl_protocol_error - Fix it Now ?

This article covers methods to resolve Cloudflare ERR_SSL_PROTOCOL_ERROR. Basically, this error happens as a result of a number of reasons that include wrong DNS settings, SSL mode, TLS version or issues with SSL certificate. 


To fix this error,

1. If you are not the site owner, contact the site owner and let them know you are having issues accessing their site.

2. The domain name has not fully been set to use Cloudflare yet. Check to see if there are non-Cloudflare nameservers that are conflicting with the assigned Cloudflare name servers.

3. You are signed up for Cloudflare, but you have set a DNS record to :grey:. If you have a subdomain or hostname and that serves HTTP/HTTPS traffic, we would advise that you :orange: this DNS record to take advantage of Cloudflare’s security and performance features. See What subdomains are appropriate for :orange:/:grey: clouds? 69

4. The Free Universal SSL certificate hasn’t yet been deployed, :grey: (deactivate) Cloudflare so that your website can continue to use your origin’s SSL certificate. Wait 24 hours and :orange: (activate) Cloudflare again to see if your SSL certificate has been successfully deployed.

5. You have some conflict with TLS 1.3, disable it and see if you still encounter the error.

6. You have selected Full SSL (strict) under your SSL/TLS app, but your origin does not have a valid certificate (i.e., it is expired, self-signed, or not issued by a trusted CA). Temporarily select another SSL option until you have a valid origin certificate in place.

7. Try to look at developer web console (firefox Ctrl+Shift+K) - anything interesting under Security tab.

8. Also, Try to run the command curl -vk on the affected domain.

Read More


Nginx error while loading shared libraries - Fix it Now ?

This article covers methods to resolve error, Nginx error while loading shared libraries for our customers. 

This error happens when Nginx is looking for a file libpcre.so.1 which comes under the PCRE library and cannot find it because it is not available in the system.

To install PCRE with the below command:

$ yum install pcre

If you don't have root privilege, then you may ask the system administrator to install it.

Read More


Clean Up and Compress WinSxS Folder on Windows Server / Windows 10 - Do it Now ?

This article covers methods to Clean Up and Compress WinSxS Folder on Windows Server/Windows 10. 

WinSxS folder in Windows is the reasons of its constant growth and ways to clean up it. 

The C:\Windows\WinSxS directory is the repository of Windows components. This directory contains DLLs, binary and XML files necessary for installation and operation of various Windows roles or features.

When installing the Windows updates (usually this happens every month), the new version of the updated component is installed on the system, while the old one is saved to the WinSxS folder (it is necessary to provide compatibility and make it possible to rollback to the previous versions of the components when you uninstall the Windows update).


To clean up the WinSxS folder on Windows 10 and Windows Server 2016/2019:

1. Optimize the component store and remove old versions of Windows component files left after installing Windows updates;

2. Features on Demand – allows you to remove unused Windows components from the disk;

3. Enable NTFS compression on the WinSxS folder – a way to reduce the size of the WinSxS directory using the built-in compression of the NTFS file system.


How to Check the Actual Size of WinSxS Folder on Windows 10?

The easiest way to get the current size of the WinSxS folder on Windows is to open the properties of the %windir%\WinSxS folder in File Explorer (or use a PowerShell script). 

You can find out the real size of the WinSxS folder on disk using the du tool from Sysinternals:

du -v c:\windows\winSXS

Read More


Install Ajenti Control Panel on Ubuntu 20.04 - Step by Step Process ?

This article covers step by step procedure to install Ajenti Control Panel on Ubuntu 20.04 for our customers.

Ajenti is a free to use and open source Server management and configuration Panel written in Python, JavaScript, and AngularJS. It provides a web dashboard for administration as opposed to command line management.

With this tool you can manage websites, DNS, Cron, Firewall, Files, Logs, Mail hosting services and so on.


The Ajenti Project consists of Ajenti Core and set of stock plugins forming the Ajenti Panel.

1. Ajenti Core: Web interface development framework which includes a web server, IoC container, a simplistic web framework and set of core components aiding in client-server communications.

2. Ajenti Panel: Consists of plugins developed for the Ajenti Core and a startup script, together providing a server administration panel experience.


To Install Ajenti Control Panel on Ubuntu 20.04:

1. Update and upgrade your Ubuntu machine.

$ sudo apt update
$ sudo apt dist-upgrade

2. If the upgrade is completed reboot the system before initiating installation of Ajenti on Ubuntu 20.04.

$ sudo systemctl reboot

3. There is a script provided for the installation of Ajenti control panel on Ubuntu 20.04. First download the script with curl.

$ curl -O https://raw.githubusercontent.com/ajenti/ajenti/master/scripts/install.sh

4. Run the installer script with sudo command.

$ sudo bash ./install.sh

Read More


PrestaShop back office error 500 or blank page - Fix it Now ?

This article covers methods to resolve PrestaShop back office error 500.

The error happens when the Back-office is accessed only from Debug mode activated or in production mode activated. The characteristic of this error is that it only occurs in one of the modes and not in both.

Also, this is an error that is occurring ONLY IN PRESTASHOP STORES VERSION 1.7, and that makes it impossible for us to enter the Back-office, showing an error 500 or the page goes blank. 

That's why we call it a critical mistake, for leaving the store inoperative.


To fix a HTTP 500 error on PrestaShop online store website:

You can activate your web host's FTP or CPanel error reports in your PrestaShop shop.

1.  From PrestaShop v1.4 to v1.5.2

i. Open config/config.inc.php

ii. On line 29, you will find this line: @ini_set('display_errors','off');

iii. Replace it with: @ini_set('display_errors','on');


2. PrestaShop v1.5.3 and later versions (including 1.6 and 1.7)

i. Open config/defines.inc.php

ii. On line 28, you will find this line: define('_PS_MODE_DEV_', false);

iii. Replace it with: define('_PS_MODE_DEV_', true);

Once error reports from the FTP or CPanel are activated, you can browse your store's front or back office to find out what the problem is.


More about Server error 500:

Error 500 means Internal server Error. Whenever a 500 error occurs, the task to return information by the server to the web browser will stop. 

Therefore, as we mentioned above, this is a critical error that would leave the website inoperative.

The 500 errors, as we noted above, are internal server errors and their origin may be in a programming code error on any item that is included and related to the request for information returned by the server to the web browser. 

Therefore, not all 500 errors come from the same source.

Read More


WordPress error "Your Connection Is Not Private" - Fix it Now ?

As a result of the SSL connection, sensitive information is protected from being stolen while being transferred between the server and the browser, which is one step in hardening your WordPress security

"Your Connection Is Not Private Error" message means that Google Chrome is preventing you from visiting your site because it is untrusted.

Ultimately, the chrome browser prevents you from gaining access to your website because the SSL certificates cannot be validated.

Typically, the "connection is not private" error in google chrome originates from issues from the side of the client, or from problems with the site's certificate.


To Fix Your Connection Is Not Private WordPress Error:

1. Reload the page

2. Check your network connection

3. Set time and date on your computer

4. Try browser's incognito mode

5. Clear your Browser Cookies, Cache, and History 

6. Disable Antivirus Temporarily

7. Update your Operating System

8. Restart your Computer

Rebooting your device will help clear out the temporary cache. 

This could surely very well fix your issue.

Read More


Prestashop parse error – How to fix the syntax error ?

This article covers ways to resolve Prestashop parse error.

Basically, Prestashop parse error happens when we install Prestashop 1.7 or above or accessing the admin panel of the store.


To fix this error:

1. You can start with emptying your cache by deleting the /var/cache directory.

If that doesn't work copy lines 28-30 from another shop and save it.

2. Also you can try to remove the following:

# php -- BEGIN cPanel-generated handler, do not edit
# Set the “ea-php72” package as the default “PHP” programming language.
<IfModule mime_module>
  AddHandler application/x-httpd-ea-php72 .php .php7 .phtml
</IfModule>
# php -- END cPanel-generated handler, do not edit

From end of .htaccess. 

Just to be sure if that is not source of issues.

Read More


Move Exchange Mailboxes to Another Database – How to perform it ?

This article covers how to move Exchange Mailboxes to Another Database.

Exchange administrator can move user mailboxes in the Active Directory forest from one database to another between Exchange servers, or between mailbox databases on the same server through the Exchange Admin Center web interface or PowerShell CLI.

To move the user or resource mailbox from one database to another, you need to create a move request (if migration occurs within the same Active Directory forest, this is called a local move request; if you want to move a mailbox between AD forests — this is a remote move request). 

To move the user mailbox the New-MoveRequest cmdlet is used.


The following two services process your move request to move mailboxes:

1. Exchange Mailbox Replication service (MRS)

2. Exchange Mailbox Replication Proxy


How to Create local move requests ?

You can create local move requests for:

1. A single mailbox.

2. Multiple mailboxes (also known as a batch move request).

3. Multiple mailboxes that you specify in a comma-separated value (CSV) file (also known as a migration batch).

Read More


Cloudflare 502 error - Fix it Now ?

This article covers methods to resolve Cloudflare 502 error. Basically, the Cloudflare 502 error triggers when the origin web server responds with a standard HTTP 502 bad gateway or 504 gateway timeout error. 

This happens due to firewall restrictions and server resource issues.


Cause of 502 Bad Gateway Errors:

1. Domain name not resolvable

The domain name is not pointing to the correct IP or it does not point to any IP this problem may happen. Also, DNS propagation could take some time to make changes in DNS setting. It may take 24 to 48 hours to make reflect which is dependent upon the TTL defined per record on the DNS.

2. server down

The origin server is not reachable, this may due to the server is down for some reason or there is no communication to the server given.

3. Firewall blocks

A firewall interrupts the communication between the edge servers and the origin server. This may be caused by security plugins of your CMS.

As a part of DDOS protection and mitigation process or due to some strict firewall rules servers can be blocked from accessing the original server.

Read More


Nginx upstream timed out error - Fix it Now ?

This article covers methods to resolve Nginx upstream timed out error. Basically, this error happens as a result of server resource usage and software timeouts.

A possible issue here could be that PHP is using too much RAM and the PHP FPM process gets killed. 


Therefore, do the following to fix this nginx error:

1. Make sure that there is enough RAM on the server, to check that you could use the top, htop or free -m commands.

2. Make sure that the PHP memory limit is not too high compared to the actual available memory on the Droplet. 

For example if you have 1GB of RAM available your PHP memory limit should not be more than 64MB otherwise only a few processes could consume all of your memory.

3. Optimize your website by installing a good caching plugin, that way you would reduce the overall resource usage on the server.

4. Delete any plugins that are not being used. Generally speaking, it is always recommended to try and keep the number of your plugins as low as possible.

5. Consider using a CDN like Cloudflare, that way it would offload some of the heavy liftings from your Droplet. 

Read More


WordPress error "Installation failed, could not create directory" - Fix it Now ?

This article covers methods to fix WordPress error "Installation failed, could not create directory". Basically, this WordPress error happens when there exist insufficient disk space, incorrect folder permission and so on. 

Your WordPress site's plugins and themes provide important functionality for you and your users.

Encountering an error when attempting to install or update one can throw a wrench in your plans and slow down your progress.

To determine if a file permissions issue is causing a plugin or theme installation error on your site, you can use the Site Health tool or check out your server's error log. 

After that, resetting your permissions using FTP should only take a few minutes.

Read More


Nagios error Unable To Login Using Two Factor Authentication

This article covers how to resolve Two Factor Authentication error in Nagios. 


To Reset nagiosadmin account Password:

1. Open an SSH or direct console session to your Nagios XI host and execute the following command:

/usr/local/nagiosxi/scripts/reset_nagiosadmin_password.php --password=newpassword

Note: If you would like to use special characters in your password, you should escape them with "\".

For example, if you want to set your new password to be "$new password#", then you can run:

/usr/local/nagiosxi/scripts/reset_nagiosadmin_password.php --password=\$new\ password\#

Read More


WordPress error "Sorry this file type is not permitted for security reasons" - Fix it Now ?

This article covers methods to resolve WordPress error "Sorry this file type is not permitted for security reasons". Basically, "Sorry this file type is not permitted for security reasons" in WordPress occurs when we try to upload a document to the WordPress library.

As we explained above, WordPress default configuration limits the types of files that you can upload to your site for security reasons.


To Fix "Sorry, This File Type Is Not Permitted for Security Reasons" Error in WordPress, Try to Use the Free WP Extra File Types Plugin:

1. If you'd prefer not to edit your wp-config.php file and/or you want more control over exactly which file types can be uploaded to your site, you can use the free WP Extra File Types plugin at WordPress.org

2. Once you install and activate the plugin, go to Settings → Extra File Types in your WordPress dashboard.

3. There, you'll see a lengthy list of file types. Check the box next to the file type(s) that you want to be able to upload and then click Save Changes at the bottom.

4. If you don't see the file type that you'd like to upload on the list, you can also add your own custom file types at the bottom of the plugin's settings list.

Read More


SNMP MIB Upload Problems in Nagios – Fix it Now ?

This article covers Nagios SNMP MIB Upload Problems.

This issue happens while uploading SNMP MIB files and it could be as a result of insufficient permissions on the SNMP MIB files.


Execute the following commands to reset the permissions and ownership on the Nagios SNMP MIB files:

# chmod -R ug+rw /usr/share/snmp/mibs
# chown -R root:nagios /usr/share/snmp/mibs

After executing those commands you should be able to upload the MIB file that previously did not work.

Read More


SNMPTT Service generates Cannot find module errors in Nagios

This article covers methods to fix "Cannot find module" errors in Nagios.

Basically, SNMPTT Service generates "Cannot find module" errors in Nagios when a MIB file contains spaces in the filename. 

The MIB files are located in the /usr/share/snmp/mibs/ folder.

This was identified as an issue and resolved in Nagios XI 5.4.0. As of version 5.4.0, when you upload MIBs via the Manage MIBs page the filename will have any spaces replaced with an underscore.

Read More


Reset Upgrade Status In Nagios Web Interface - How to Perform it ?

This article covers how to Reset Upgrade Status In Nagios Web Interface.

When upgrading Nagios XI using the web interface the upgrade progress may stall with the message "Upgrade in progress". 

Sometimes you will need to clear this message manually due to unforeseen circumstances, this guide explains how to clear the message.


To Reset Upgrade Status in Nagios:

The following command will reset the upgrade status on Nagios XI (using the default username and password listed above):

For MySQL/MariaDB:

mysql -u'nagiosxi' -p'n@gweb' nagiosxi -e "update xi_commands set status_code = '2' where command = '1120';"

Read More


WordPress error "The site is experiencing technical difficulties" - Fix it Now ?

This article covers methods to fix WordPress error "The site is experiencing technical difficulties". 

Most of the time, this error is the result of a plugin or theme conflict. Due to WordPress open-source nature, many different developers with various coding backgrounds and styles create extensions that users can add on to the platform.

Unfortunately, this means that sometimes plugins and themes from different developers don’t play nicely with one another. When two tools with conflicting code are both installed on a WordPress site, it can lead to a wide range of issues.


To fix this WordPress error,

1. Troubleshoot for a Plugin or Theme Conflict

It's important to note that, while you're working in recovery mode, the fatal error will persist for other users and your site's visitors. Only the user who logged in via the recovery mode link will be able to access the website normally.

2. Ensure That You're Running a Supported Version of PHP

If you're running an outdated version of PHP, you'll need to update it.

3. Enable WordPress Debug Mode

To enable this feature, you'll need to access your wp-config.php file via FTP, and add the following line of code right before "That's all, stop editing! Happy publishing.":

define( 'WP_DEBUG', true );

Read More


Host Still Visible After Deletion in Nagios - How to resolve ?

This article covers steps to resolve Host Still Visible After Deletion (Ghost Hosts). Basically, by following this guide, you can easily resolve the error, Host Still Visible After Deletion in Nagios.

It is possible that you have multiple instances of nagios running or you have so called "ghost" hosts or services.

In order to check for multiple instances of nagios, run the following command from the command line:

$ ps -ef | head -1 && ps -ef | grep bin/nagios

Read More


Problems Using Nagios With Proxies - Fix it Now ?

This article covers how to resolve Problems Using Nagios With Proxies which arises if we do not configure proxies correctly while using Nagios.

Note that the Nagios XI code makes several internal HTTP calls to the local Nagios XI server to import configuration data, apply configuration changes, process AJAX requests, etc. 

These functions may not work properly when you deploy a proxy if it is not configured properly, which could result in a non-functional Nagios XI installation.

Read More


Migrate Performance Data in Nagios - Step by Step Process ?

This article covers how to perform Migrate Performance Data in Nagios.

Basically, to migrate, we have to convert the data to XML and import it into RRD’s on the new machine.

Historical performance data that is used to generate graphs are stored in Round Robin Database (RRD) files.

RRD performance data files are compiled binaries, so for a simple file transfer a user would have to have the architecture match on both machines.

Read More


Nagios mysql_error out of range value for column - Fix it now ?

This article covers Nagios error, mysql_error out of range value for column which is evident in the /var/log/messages file on the Nagios XI server.

To resolve this issue you will need to define the SQL Mode in the MySQL / MariaDB my.cnf configuration file:

1. Locate the [mysqld] section and check to see if there is an sql_mode already defined:

[mysqld]
# Recommended in standard MySQL setup
sql_mode=NO_ENGINE_SUBSTITUTION,STRICT_TRANS_TABLES

2. If the sql_mode= line already exists you will need to replace it with the following. 

If the line does not exist you will need to add the following line:

[mysqld]
sql_mode=""

Read More


Prestashop error "an error occurred while sending the message" - Fix it Now ?

This article covers methods to fix Prestashop error "an error occurred while sending the message".

This error happens when the theme that we use does not adapt to the latest version of Prestashop.

To resolve this error, you can try modifying the contact form file.

Add this before the submit button :

<style>
input[name=url] {
display: none !important;
}
</style>
<input type="text" name="url" value=""/>
<input type="hidden" name="token" value="{$token}" />

Read More


Can't connect to mysql error 111 - Fix this error now ?

This article covers methods to fix mysql error, 'Can't connect to mysql error 111' on Linux machine for our customers.
This can happen when there was a host IP change. 

This issue can prevent connection to the database.
As it turned out if you do come accross this look in /etc/my.cnf, there is a line:

bind-address = ip.add.ress

This may be the old address for the server and this will stop connections, change this to your new address and restart MySQL/MariaDB and you should be good again.

Read More


WordPress error "Could Not Save Password Reset Key To Database" - Fix it Now ?

This article covers methods to resolve WordPress error "Could Not Save Password Reset Key To Database" which usually occurs when we try to login into our WordPress site.

As the database is part of the hosting space, you'll get that database error when you fill-up the entire available disk space of your account.
That can happen if you created several staging sites or uploaded too many large files like big images on your website.

A more common reason for this WordPress issue can be substantial backup files created by your backup plugin.

Backup files need a lot of space on your system, which can quickly fill up the entire available webspace.
1. So to fix this WordPress error, immediately log in to your website using an FTP client like the Filezilla program or the File Manager in your cPanel hosting dashboard.
2. Then go to the media folder wp-content/uploads and check there for large files which you can delete, for instance, backup files with the ending .*zip or large media files with the file extension *.tiff, *.png, or *.png.
3. You should never use the *.tiff format, though. This one uses a lot of disk space, so it's better to use *.jpg instead of that.
4. After, open your WordPress website, log in, or use the password reset function again.

To fix this WordPress error in cPanel:

1. You'll need to free up space on your server.
2. Log into the HostPapa Dashboard and click My cPanel.
3. Then select Files > cPanel File Manager.
4. Navigate to your WordPress root folder and select wp-content/uploads.
5. Search through your upload files to locate and delete large files that you may no longer need.
6. Click the Size link to sort the list by file size.
7. Take a look elsewhere on the server for files and folders you are happy to delete.
8. Once you've created some space on your server, you can attempt to log into WordPress once again.

Read More


Plesk Webmail Server Not Found - Fix it Now ?

This article covers methods to resolve the Plesk error "Webmail Server Not Found" which can happen while opening webmail/domain in a browser or when we issue Let's Encrypt on the domain. The main reason for this error is that the Webmail / domain does not resolve correctly in global DNS system because Plesk server is not set up to manage DNS.

To use DNS with a Plesk server:
1. DNS Server should be installed in Plesk Installer.
2. Log into Plesk and find your Name Servers in Plesk > Domains > example.com > DNS Settings, take the "value" for the record type "NS".
3. Then, it is required to change Name Server for your domain at your domain registrar's account.

Read More


503 bad sequence of commands - Fix it now ?

This article covers methods to fix the email error, "503 bad sequence of commands" which happens as a result of a number of reasons.

To resolve SMTP response: 503 Bad sequence of commands, consider the following and also read the complete guide here.
The IP that should be 10.0.0.0 - whatever that is, look at that box, this is where the problem is likely to be.
Your internal domain is domain.com or domain.net etc.
You may also add a test email account and check if it works as expected. If this works, then this could be an issue with the email account or with the service provider.

Read More


Mapped Network Drives Not Showing in Elevated Programs

This article covers methods to fix 'Mapped Network Drives Not Showing in Elevated Programs' issue for our customers.
When UAC is enabled, the system creates two logon sessions at user logon. Both logon sessions are linked to one another.
One session represents the user during an elevated session, and the other session where you run under least user rights.
When drive mappings are created, the system creates symbolic link objects (DosDevices) that associate the drive letters to the UNC paths.
These objects are specific for a logon session and are not shared between logon sessions.
When the UAC policy is configured to Prompt for credentials, a new logon session is created in addition to the existing two linked logon sessions.

To resolve this Windows issue:

1. In Local Group Policy Editor, locate the following Group Policy path:

Local Computer Policy\Windows Settings\Security Settings\Local Policies\Security Options

2. Configure the following policy to Prompt for consent: User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode


Note:
The EnableLinkedConnections registry entry forces the symbolic links to be written to both linked logon sessions that are created, when UAC is enabled.

Read More


Shrink VMDK Virtual Disk Size on VMWare ESXi - Do it Now ?

This article covers how to shrink VMDK Virtual Disk Size on VMWare ESXi.
By default, VMware creates "growable" disks that grow larger in size as you add data.

Unfortunately, they don't automatically shrink when you remove data.
You'll need to clean up or compact your disks to actually free up space on your hard drive.

VMware Workstation also allows you to create snapshots, which contain a complete "snapshot" of a virtual machine's state at the point in time you created them.
These can take a lot of space if the virtual machine has changed significantly since then.
You can free up additional space by deleting snapshots you no longer need.

1. To view the snapshots for a virtual machine, select the virtual machine in VMware Workstation and click VM > Snapshot > Snapshot Manager.
2. To delete a snapshot you no longer need, right-click it in the Snapshot Manager window and select "Delete". It will be removed from your computer.
3. You won't be able to restore your virtual machine to that previous point in time after deleting the snapshot, of course.

Before we try to shrink the virtual disk files, we should try to remove any unneeded files from the virtual machine to free space.

For example, on Debian-based VMs, you can run:

$ apt-get clean

To clear out the local repository of retrieved package files.
Next, run the command below to fill the unused space with zeros:

cat /dev/zero > zero.fill;sync;sleep 1;sync;rm -f zero.fill


Free Disk Space In VMware Workstation

In VMware Workstation, first power off the virtual machine you want to compact. You can't complete this process if it's powered on or suspended.
1. Select the virtual machine you want to compact in the main window and click VM > Manage > Clean Up Disks.
2. The tool will analyze the selected virtual machine's disk and show you how much space you can reclaim.
To reclaim the space, click "Clean up now".
If no space can be freed, you'll see a "Cleanup is not necessary" message here instead.

Read More


Can't move the folder because there is a folder in the same location that can't be redirected

This article covers Steps to resolve Windows error, Can't move the folder because there is a folder in the same location that can't be redirected.


To resolve this error, try the following:

1. Open Registry Editor by pressing Windows logo+R then type "regedit". Press Enter.
2. Now head to this address:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders

3. Locate a personal folder at the right panel that is displaying the error and double-click on it.
4. Replace the current value data with the corresponding Default Value in the below list:

Desktop - %USERPROFILE%\Desktop 
Favorites - %USERPROFILE%\Favorites 
Music - %USERPROFILE%\Music 
Pictures - %USERPROFILE%\Pictures 
Videos - %USERPROFILE%\Videos 
Documents - %USERPROFILE%\Documents 
Downloads - %USERPROFILE%\Downloads

Note the Corresponding registry key for the Downloads folder.
5. Click Ok to save the changes, close Registry Editor and restart the computer.


Read More


PiP is not recognized as an internal or external command - Fix it Now ?

This article covers different methods to resolve PiP is not recognized as an internal or external command.

Basically, the error, "PiP is not recognized as an internal or external command" happens when we try to install Python packages via a Command Prompt window.
PiP is a recursive acronym for "Pip Installs Packages".

It's essentially a package management system used to install and manage software packages written in Python. Most users make use of PiP to install and manage Python packages found in the Python Package Index.

To add PIP to the PATH environment variable using the Windows GUI:

1. Press Windows key + R to open up a Run dialog box. Then, type "sysdm.cpl" and press Enter to open up the System Properties screen.
2. Inside the System Properties screen, go to the Advanced tab, then click on Environment Variables.
3. In the Environment Variables screen, go to System variables and click on Path to select it. Then with the Path selected, click the Edit… button.
4. In the Edit environment variable screen, click on New and add the path where the PiP installation is located. For Python 3.4, the default location is C:\Python34\Scripts.
5. Once the path is added, open a fresh CMD window and try to install a python package that comes with PiP.

You should no longer see the "pip is not recognized as an internal or external command" error.

Read More


WordPress issue "Add Media button not working" - Fix it Now ?

This article covers how to Fix WordPress Add Media Button Not Working.
The main reason behind this error is usually custom scripts not working correctly, plugins, or themes.
You can pinpoint the cause of your woes using your browser's Inspect -> Console.
The console tool highlights script errors that can help you to identify where the problem lies.

To fix this WordPress error:

1. That aside, start by deactivating all of your plugins.
2. Then check if the Add Media button is working.
3. If the button is working, then it is obvious one of your plugin is causing the script conflict.
4. Next, reactivate the plugins one by one, and check the Add Media button after each activation.
5. When you find the responsible plugin, contact the developer for help or find a replacement.
6. If the problem persists after deactivating all plugins, you need to ensure you've cleared your caches first and then test if your theme is the cause of the WordPress Add Media button not working.
7. Just activate a default WordPress theme such as Twenty Seventeen and then check if the problem is gone.
If the button works, the issue here is your theme.

Read More


Undefined index notice in Joomla - Fix it now ?

This article covers how to resolve Undefined index notice in Joomla. A notice, in PHP terms (PHP is the scripting language that powers Joomla), is more or less a complaint. For example, if you're using a deprecated function such as ereg_replace (by the way, we have had quite a few sites with the ereg_replace() is deprecated notice that we needed to fix) then PHP will complain with a notice.
A notice may also be displayed if you're trying to use questionable casting that PHP thinks will not return the result that you want (for example, if you try to forcefully cast an array into a string).

To fix this Joomla warning:

Change PHP's error reporting in the .htaccess file to hide all errors.
You can do that by adding the following code to your .htaccess file:

php_flag display_startup_errors on
php_flag display_errors on
php_flag html_errors on

The above code will ensure that no error whatsoever will be displayed on your website.

Note that if you have an Error Reporting setting in your configuration settings other than "Default", then this setting will override the error reporting defined in your .htaccess.
For example, if your Error Reporting is set to "Maximum", then the above code in your .htaccess file has no effect.


Read More


Outlook error "We Couldn't Create The Outlook Data File" - Fix it Now ?

This article covers different methods to fix the Outlook error 'We Couldn't Create The Outlook Data File'.

Main Causes of 'We couldn't create Outlook Data File' error:

This error is fairly well known among Outlook users, so people have found possible causes that led to this error happening.
1. Gmail account: The error seems to only occur when you’re trying to add a Gmail account to Outlook. The exact cause of this is unknown, however, it might have something to do with Gmail’s security options.
2. Outlook bug: A common cause of this issue is a bug within Outlook itself. The bug prevents you from adding an email account via the Add account option.
3. Simplified Account Creation Wizard: This is a relatively new Outlook feature. Generally, whenever a new feature is added to an application, it's bound to cause errors and bugs.

How to Remove Outlook Write Protection from a Hard Disk ?

One of the easiest ways of removing write protection from a disk is by using the Diskpart utility:
1. Hold the Windows and R keys down on your keyboard at the same time.
2. Type in diskpart and press OK.
3. Type in the following command and press Enter after each one:
i. list disk
ii. select disk (number)
iii. For example, if your Drive 1 is protected, you're going to type in select disk 1.
    attributes disk clear read-only
4. Once the Diskpart utility finished clearing the Read-only protection, you can type in exit and hit Enter to close the command prompt.

Read More


WordPress error "This site ahead contains harmful programs" - Fix it Now ?

This article covers WordPress error "This site ahead contains harmful programs".

Basically, the error, This site ahead contains harmful programs happens when Google finds any suspicious code.


It's risky for Google users to visit hacked websites because they could become targets of the hacker:
1. Hackers could steal their data or redirect them to phishing sites.
2. Hackers could trick them into downloading malware onto their devices.
3. Visitors may be subjected to viewing inappropriate malicious content and ads.

Search engines like Google constantly crawl the web for new sites and new content to index.
They use bots and algorithms to check a website's content is original and relevant.
They can also check which websites are using deceitful tactics such as keyword stuffing.


During this process, they can also detect if there's malicious code on your website.
If they do, they proceed to:

1. Blacklist your website immediately.
2. Display "Site Ahead Contains Harmful Programs" or "This site contains malware" warnings to visitors.
3. Depending on the risk posed by your site, it gives users an option to bypass their security warning and proceed to your site by clicking on 'details'.
Or they can choose to leave the site and go 'back to safety'.

Read More


DISM Error 0x800f0906 "The source file could not be downloaded"

This article covers methods to fix DISM Error 0x800f0906. Basically, the failure of the DISM command-line utility will lead us to the DISM Error 0x800f0906.
The DISM (Deployment Image Servicing and Management) command-line utility is an incredibly nifty little tool that can be used to service and repair a Windows installation.
The DISM.exe command failing can be a pretty significant issue, especially if this happens when you desperately need the utility to work its magic.
When the DISM command-line tool fails with error code 0x800f0906, the accompanying error message either states that the source files could not be downloaded or that the files required to repair the store could not be found.

To resolve DISM Error 0x800f0906:

Uninstall the KB3022345 Update
1. Press the Windows key on your keyboard to open the Start menu, and either click Control Panel, or type in Control Panel and open the result, depending on which version of Windows you’re using.
2. Switch to Icons view, in the top right corner of Control Panel, and open Programs and Features from the list.
3. On the left side, click on the View installed updates
4. You will see a search box in the top right corner, type KB3022345 to find the update with less effort.
5. When you've found it, right-click it, and choose
6. Once everything is done, reboot your device.

Read More


Can't read from the source file or disk - Fix it Now ?

This article covers how to fix "can't read from the source file or disk" error.
Basically, this error triggers when trying to copy certain files to or from an external hard disk.
Many users have reported that they got "Can't read from the source file or disk" error message while copying, deleting or moving files from one location to another.

To fix Error Message: Can't read from the source file or disk:
1. Restart the PC
If you can't read from the source file or disk while copying in Windows 10, and this happens for the first time, try restarting the computer (do not turn off and on, just restart).
Rebooting helps the computer deal with such errors on its own and returns it to an adequate working state.
2. Check the file name
Changing the file name is justified when the file was created in one OS, and its use occurs in another. You may not be able to read from the source file or disk while deleting after using this file on the command line. If this is your situation, be sure to rename the file properly and restart the computer after that.
3. Try to open the file on another PC
Try to do the same as in method 2, but on another PC. Better yet, if it will be a completely different OS (for example, you have Windows installed, then look for a computer with a Mac, etc.).
This will help get rid of any conflicts between the file and the computer, which can happen quite often.
4. Use chkdsk to fix bad sectors
The free chkdsk utility usually handles such errors with ease.

Read More


SQL Server divide by zero error encountered - Fix it Now ?

This article covers methods to resolve resolve error 'SQL Server divide by zero error encountered'. This error is caused by performing a division operation wherein the denominator or the divisor is 0. This error is not encountered when the denominator or divisor is NULL because this will result to a NULL value.


Many client applications or drivers provide a default value of ARITHABORT is OFF.
The different values might force SQL Server to produces a different execution plan, and it might create performance issues.
You should also match the setting similar to a client application while troubleshooting the performance issues.

Read More


The source file names are larger than is supported by the file system

This article covers methods to resolve Windows error "The source file names are larger than is supported by the file system". Most Windows users encounter this issue when trying to copy or delete a file on the computer and they may receive an error message saying Source Path Too Long with the explanation of the source file name(s) are larger than is supported by the file system.


This Windows error error happens mainly because one or more files that are kept in a series of subfolders that have long names, but Windows only allows 258 characters at most in the folder path subfolder.
This will prevent you from moving the files or folders that are saved in this folder.

To fix this windows error, try the following:

Delete the File/Folder by Bypassing the Recycle Bin
You know that when you delete files from your computer, these files will be first moved to the Recycle Bin and they will stay there until you delete them permanently.
i. Click on the file or folder that is bothered by the Source Path Too Long error.
ii. Press the SHIFT and Delete buttons at the same time to permanently delete the file or folder.

Read More


Drupal 406 error - Fix it Now ?

This article covers methods to resolve Drupal 406 error.

There are many errors that you may see as you visit different websites across the web.

One of the more common ones is the 406 – Not Acceptable error.

Cause for Drupal 406 error:

In regards to a site on your hosting account, the cause of the 406 error is usually due to a mod_security rule on the server.
Mod_security is a security module in the Apache web server that is enabled by default on all hosting accounts.
If a site, page, or function violates one of these rules, server may send the 406 Not Acceptable error.

To prevent Drupal 406 Not acceptable error:

Mod_security can be turned off. You can also disable specific ModSecurity rules or disable ModSecurity for each domain individually.
If you would like mod_security disabled you can disable mod_security via our Modsec manager plugin in cPanel.

Read More


Disk full due to large System Volume Information Folder on Windows

This article covers how to access System Volume Information Folder and clear up the disk space.
Basically, the disk full warning in windows can also happen due to the large System Volume Information Folder.

What is System Volume Information Folder in Windows?

1. WindowsImageBackup —system restore points on desktop Windows versions or System State backups made using Windows Server Backup (wbadmin) in server OSs;
2. The contents of Indexing Service database used for fast file search (including Outlook search);
3. Distributed Link Tracking Service database;
4. Disk snapshots made by Volume Shadow Copy, which can be used to recover older versions of files. For each snapshot, a separate file is created with a long ID as a name;shadow copy files on system volume information folder
5. NTFS disk quota settings;
6. Base and chunks of the Data Deduplication service;
7. DFS Replication database (dfsr.db);
8. WPSettings.dat file – created by the storage service (StorSvc);
9. The USB drives will also store an IndexerVolumeGuid file that defines the unique disk label used by the Windows Search service;
10. AppxProgramDataStaging, AppxStaging – Windows UWP app backups (it can be used for recovery after removal).

Read More


Make Sure the File is an NTFS Volume and isn't in a Compressed Folder or Volume

This article covers methods to resolve Windows error "Make Sure the File is an NTFS Volume and isn't in a Compressed Folder or Volume" for our customers.
The first thing you should do to isolate the error is to change the path of the downloaded ISO file.
Sometimes, the error is triggered by the address of the ISO file for some reason in which case moving the file to another drive solves the problem.
Therefore, try changing the volume in which the ISO file is stored to fix your error.

Causes of this Windows error:

This error is not something new, however, there was a certain thing that made it trigger the most.

Following are the factors that usually cause it —


1. Windows 10 security update.

For most of the users, the error came into being after the release of KB4019472 Windows 10 update which happened to be a security update. This update made the error emerge for most of the users.


2. Location of ISO file.

In some cases, the error can be due to the location or path of the downloaded ISO file. In such a scenario, you will have to change the location.

Read More


Windows error "The volume does not contain a recognized file system" - Fix it Now ?

This article covers methods to fix 'The volume does not contain a recognized file system' the Windows error for our customers.

What Caused The Volume Does Not Contain the Recognized File System Error ?

Here are some of the reasons that can cause the error occurs on devices:
1. System re-installation
2. Presence of virus or malware
3. Unsafe system shut down.
4. Failure of file system conversion
5. Deletion of essential system files by mistake
6. Presence of bad sectors
7. Users misapplication
8. Virus/Trojan infection
9. Insufficient power supply

To fix this Windows error:

1. Proceed to Start and click on My Computer or This PC.
2. Select that drive that is not accessible and then choose Properties by right-clicking it.
3. From the Properties window, select the Tool tab and click on the Check button from the Error checking.
4. Select the Scan Drive option.
Once the scanning process is complete, please go back to This PC or My Computer to check whether the drive is fixed or not.

Read More


Unable to connect to VNC Server using your chosen security setting - How to fix it ?

This article covers method to resolve Unable to connect to VNC Server using your chosen security setting.
Basically, the unable to connect error could trigger due to incompatible encryption settings or due to the version of the VNC running in the remote server.

To fix this VNC error, simply apply the following:

1. On the remote computer, change the VNC Server Encryption parameter to something other than AlwaysOff.
2. Change the VNC Viewer Encryption parameter to Server, PreferOn or PreferOff.

Read More


Shopify error 429 too many requests - Fix it Now ?

This article covers Shopify error 429 too many requests. Basically, 429 too many requests can trigger due to increased number of API requests.
Calls to the REST Admin API are governed by request-based limits, which means you should consider the total number of API calls your app makes.

In addition, there are resource-based rate limits and throttles.

To avoid rate limit errors in Shopify:

Designing your app with best practices in mind is the best way to avoid throttling errors.
1. Optimize your code to only get the data that your app requires.
2. Use caching for data that your app uses often.
3. Regulate the rate of your requests for smoother distribution.
4. Include code that catches errors. If you ignore these errors and keep trying to make requests, then your app won’t be able to gracefully recover.
5. Use metadata about your app's API usage, included with all API responses, to manage your app’s behavior dynamically.
6. Your code should stop making additional API requests until enough time has passed to retry.

The recommended backoff time is 1 second.

Read More


VNC Server is not currently listening for cloud connections - Fix it Now ?

This article covers methods to fix VNC 'Timed out waiting for the response from the host computer' error for our customers.

If you see this message when trying to connect from VNC Viewer, please check the following:
1. Check that the remote computer is connected to the Internet. If it isn't, you won't be able to connect.
2. It may be that the remote computer is asleep. It is advisable to prevent a remote computer sleeping or hibernating while remote access is required:
Windows: In Control Panel > Power Options > Change when the computer sleeps, make sure Put the computer to sleep when plugged in is Never.
Mac: In System Preferences > Energy Saver, make sure Prevent computer from sleeping automatically when the display is off is selected.
3. If you have disabled cloud connections in VNC Server's Options dialog, under the Connections heading. Make sure this is checked.
4. You may have the wrong team selected in VNC Viewer. Please ensure you have selected the correct team for the computer to which you want to connect.
5. If you have purchased a subscription but did not subscribe from within your trial team, you will need to join your computer(s) to the new, paid-for team.

Read More


Windows Server error, You don't currently have permission to access this folder - Fix it now ?

This article covers methods to fix the 'You Don't Currently Have Permission to Access This Folder' issue for our customers.
If you happen to meet "You don't currently have permission to access this folder" issue when you are opening a folder, do not worry. You can fix the problem with the  effective tips here.

To remove the folder access error:

1. Gain Access by Allowing Everyone
i. Right-click on the folder that you're unable to access and select "Properties".
ii. Click on "Security" tab and under Group or user names click on "Edit".
iii. Click on "Add" and type everyone. Click on "Check names" and then click "OK".
iv. Select "Everyone". Under "Allow", select "Full control" and click on "Apply" and click "Ok".

2. Change the Ownership of the File/Folder
You can also try to change the ownership of the file or folder to troubleshoot "You Don't Currently Have Permission to Access This Folder" issue on Windows 10/8/7.
i. Right-click on the folder to navigate to "Properties".
ii. Go to the "group or username" section on the "Security" tab.
iii. Click on "Advanced", and then "Change".
iv. Type your account name. Click on "Check names" > "OK".
v. Check "Replace owner on sub containers and objects" > "OK".

Read More


How to Manage Indices in Nagios Log Server - Do this now ?

This article covers how to manage indices in Nagios log server. An index in Nagios Log Server is how the Elasticsearch database stores log data. Nagios Log Server creates and index for every day of the year, this makes it easy to age out old data when no longer required.
Nagios Log Server is a clustered application, it consists of one or more instances of Nagios Log Server. An instance is an installation of Nagios Log Server, it participates in the cluster and acts as a location for the received log data to reside. The log data is spread across the instances using the Elasticsearch database, a special database used by Nagios Log Server.

Read More


Enable CDN in Prestashop and Resolve related issues - How to do it ?

This article covers how to enable CDN on PrestaShop for our customers.
You can Speed up your website with the PrestaShop CDN addon.
Faster loading leads immediately to happier users and higher conversions.
Making your pages load faster will also improve your SEO.
Google ranks faster websites higher, so you'll soon receive more visitors from search engines.

To How to Enable CDN for Prestashop:

1. Make sure Prestashop is installed and work normally.
2. Login to Prestashop admin panel (e.g. http://prestashop.testing.com.my/admin1234/)
3. Navigate to Advanced Parameters > Performance.
4. Scroll down the page to Media servers and fill in the CDN hostname.
5. Click Save at the top right corner to save the setting.

Read More


Error: Function lookup() did not find a value for the name DEFAULT_EXEC_TIMEOUT

This article covers how to fix this issue found while installing OpenStack with packstack.
In the case you installed packstack with epel repo enabled, you need to uninstall it and all the dependences, and re-install it after disabling epel, so all the proper versions of dependencies are installed correctly.
1. To begin, ensure that epel repo is disabled and try again.
2. Run the following commands:

# yum autoremove epel-release
# yum autoremove openstack-packstack
# yum clean all
# yum install -y openstack-packstack

Read More


VNC error 'Timed out waiting for the response from the host computer' - Fix it Now ?

This article covers methods to fix VNC 'Timed out waiting for the response from the host computer' error for our customers.


1. You can try adding a firewall rule:

$ sudo /sbin/iptables -I INPUT 1 -p TCP --dport 5901:5910 -j ACCEPT

2. Or directly modify the file /etc/sysconfig/iptables file and add a line:

-A INPUT -p tcp -m state --state NEW -m tcp --dport 5901:5910 -j ACCEPT

3. Restart the iptables service:

$ service iptables restart

4. If there is no iptables.service file, use yum to install it:

$ yum install iptables-services

5. Then Run the command,

$ sudo /sbin/iptables -I INPUT 1 -p TCP --dport 5901:5910 -j ACCEPT

The firewall does not need to be restarted, nor does it execute flush privileges, and then connect with the VNC client and find that the connection is up.

Read More


"Are you sure you want to do this" error in WordPress - Fix it Now ?

This article covers methods to fix 'Are you sure you want to do this' error in WordPress for our customers.

One of the most common solutions is to revert your website to an older backup before the error occurred. If you update your backup regularly, it is one of the most powerful tools to use against errors.
If you do not update regularly, the backup is close to worthless because it is missing your regular content updates and website changes.

To fix "Are You Sure You Want to Do This" Error in WordPress:

1. You will not need any additional plugins to solve this issue and in fact, a plugin is likely causing the issue. The error is very simple to track but can become quite tedious if you have a lot of plugins and themes installed. The process includes disabling your themes and plugins while checking to see if the error is fixed. If you have a lot of plugins, this process may take a while. Deactivating the plugins will not be enough because they can still cause a problem. This is why it is recommended to uninstall a plugin if you are not using it.
2. Log into the cPanel and click on the File Manager. Click on the public-html directory and locate the wp-content folder. This folder contains all of the content on your website. Locate the plugins folder and right-click it.
Select the Rename option and rename it to "plugins off" or something similar.

Read More


Empty Screen in Nagios XI for Wizard - Fix it Now ?

This article covers ways to fix 'Empty Screen in Nagios XI' for our customers. In some pages of XI you may come across empty screens, such as no configuration wizards appearing under the Configure menu.
When plugins, components or wizards are not installed through the proper menus, this creates problems in Nagios XI, such as "wiping out" all wizards, so they can not be viewed in the Web interface, blank pages in the Web browser and other weird behaviors.

To fix this Nagios error:

Remove the problematic component/wizard by running in terminal as a root:

$ rm -rf /usr/local/nagiosxi/html/includes/components/somedashlet
$ rm -rf /usr/local/nagiosxi/html/includes/components/somecomponent
$ rm -rf /usr/local/nagiosxi/html/includes/configwizards/somewizard

Read More


Improve phone support efficiency - Facts you need to know ?

This article covers some key points to improve phone support efficiency.
In the contact centre environment, becoming more efficient involves reviewing internal processes, eliminating unnecessary steps and duplicate handling, and often implementing new processes. 

The main aims are to reduce call handling times and improve first call resolution.

Methods to Boost Contact Centre Efficiency:
1. Migrate to a cloud hosted solution
Cloud hosted technology solutions don't rely on equipment infrastructure, and therefore scale from five agents to one thousand and back again without incurring any downtime.
2. Improve your self-service options
Customers want choice.  They want to be able to take care of routine and straightforward interactions themselves.
3. Implement automatic call distribution
Poor call traffic distribution results in customers being sent to the wrong department, which ties up personnel and delays them in getting on with helping the right people.
4. Improve your verification process
The average time to verify the identity of a user using Personal Verifiable Questions (PVQs) is 45-90 seconds.
5. Offer a call back service
A cost-effective way to improve team efficiency, and the customer experience, is to use call-backs to defer calls until a later time. 

There are two options for call backs.

i. Virtual queuing – whereby the customer's place in the queue is held and called when her turn arrives
ii. A timed call-back, where customers are offered a selection of time slots for their call-back. This option allows you to schedule the call back to take place during a "trough" period, and so keeps staff productive during quieter periods.

Read More


Activate python virtualenv in Dockerfile - How to perform it ?

This article covers how to Activate python virtualenv in Dockerfile.

Basically, to package Python application in a Docker image, we often use virtualenv. However, to use virtualenv, we need to activate it.
Therefore, there is no point in using virtualenv inside a Docker Container unless you are running multiple apps in the same container, if that's the case I'd say that you're doing something wrong and the solution would be to architect your app in a better way and split them up in multiple containers.

There are perfectly valid reasons for using a virtualenv within a container.
You don't necessarily need to activate the virtualenv to install software or use it.
Try invoking the executables directly from the virtualenv's bin directory instead:

FROM python:2.7
RUN virtualenv /ve
RUN /ve/bin/pip install somepackage
CMD ["/ve/bin/python", "yourcode.py"]


One solution is to explicitly use the path to the binaries in the virtualenv.

In this case we only have two repetitions, but in more complex situations you’ll need to do it over and over again.
Besides the lack of readability, repetition is a source of error.
As you add more calls to Python programs, it's easy to forget to add the magic /opt/venv/bin/ prefix.
It will (mostly) work though:
FROM python:3.8-slim-buster
RUN python3 -m venv /opt/venv
# Install dependencies:
COPY requirements.txt .
RUN /opt/venv/bin/pip install -r requirements.txt
# Run the application:
COPY myapp.py .
CMD ["/opt/venv/bin/python", "myapp.py"]
The only caveat is that if any Python process launches a sub-process, that sub-process will not run in the virtualenv.

Read More


WordPress error 'Another update currently in process' – Fix it Now ?

This article covers how to resolve WordPress error 'Another update currently in process'.
Basically, this issue usually occurs when a WordPress user, or multiple users, are simultaneously trying to perform a WordPress update while a WordPress core update is running.
During a core update, an additional row called core_updater.lock is placed within the wp_options table of the website’s database. It serves to prevent any other updates from being run while the core update is in progress.
After the WordPress core has been updated, the core_updater.lock row will be deleted, which will allow users to perform any other updates.
The error message will disappear then, or it will be gone automatically after 15 minutes.

To fix this WordPress error:

1. Log into the WordPress administration dashboard and select Plugins > Add New. Search for Fix Another Update, then install and activate the plugin.
2. Navigate to Settings > Fix Another Update In Progress and the database lock will be removed.
3. If you wish to remove the lock directly in the database, Select Databases > phpMyAdmin from the cPanel menu.
4. Select your WordPress database from the sidebar, then click the Browse button next to the wp_options database table (your database prefix may be different).
5. In the database rows that appear, look for an entry called ‘core_updater.lock’ and select the Delete button to remove. You can now proceed with your outstanding updates.

Read More


Securing Web Servers from DoS attacks - Best Practices ?

This article covers Tactics To Prevent DDoS Attacks & Keep Your Website Safe.
Basically, it is impossible to prevent DoS and DDoS attacks entirely. But we can limit them to a certain extend by implementing security actions mentioned in this guide.
Denial of service attacks are here to stay, and no business can afford to be unprotected.

Facts about DDoS Attacks:
1. DDoS stands for Distributed Denial of Service.
2. It is a form of cyber attack that targets critical systems to disrupt network service or connectivity that causes a denial of service for users of the targeted resource.
3. A DDoS attack employs the processing power of multiple malware-infected computers to target a single system.

Best Practices for Preventing DDoS attacks:

1. Develop a Denial of Service Response Plan
Develop a DDoS prevention plan based on a thorough security assessment. Unlike smaller companies, larger businesses may require complex infrastructure and involving multiple teams in DDoS planning.
2. Secure Your Network Infrastructure
Mitigating network security threats can only be achieved with multi-level protection strategies in place.
This includes advanced intrusion prevention and threat management systems, which combine firewalls, VPN, anti-spam, content filtering, load balancing, and other layers of DDoS defense techniques.
3. Practice Basic Network Security
The most basic countermeasure to preventing DDoS attacks is to allow as little user error as possible.
Engaging in strong security practices can keep business networks from being compromised.
4. Maintain Strong Network Architecture
Focusing on a secure network architecture is vital to security. Business should create redundant network resources; if one server is attacked, the others can handle the extra network traffic.
5. Leverage the Cloud
Outsourcing DDoS prevention to cloud-based service providers offers several advantages. First, the cloud has far more bandwidth, and resources than a private network likely does. With the increased magnitude of DDoS attacks, relying solely on on-premises hardware is likely to fail.

Read More


Install Bcrypt in Docker and resolve related errors

This article covers how to install Bcrypt in Docker and fix relating Docker errors.

To fix bcrypt error on Docker:

The error looks like this,

internal/modules/cjs/loader.js:807
app_1 | return process.dlopen(module, path.toNamespacedPath(filename));

To resolve, simply Add the following lines of code to the start.sh file,

#!/usr/bin/env bash

# install new dependencies if any
npm install
# uninstall the current bcrypt modules
npm uninstall bcrypt
# install the bcrypt modules for the machine
npm install bcrypt
echo "Starting API server"
npm start

Here,

i. npm uninstall bcrypt would remove bcrypt modules for the other operating system.
ii. npm install bcrypt would install for the current machine that the app would be running on.

Read More


WordPress error Failed to Load Resource - Fix it Now ?

This article covers how to resolve the WordPress error Failed to load resource in WordPress as a result of issues in WordPress URL settings.

To fix this WordPress error:

1. Replace The Missing Resource

The missing resource is an image in one of your blog posts or page, then try to look for it in the media library.

If you are able to see the media library, then try to add again by editing the post or page.

2. Replace theme or plugin files

In case, if the failed resource is a WordPress plugin or theme file, then the easiest way to replace it is by reinstalling the plugin or theme.

First, you need to deactivate your current WordPress theme.

All you have to do is visit the Appearance » Themes page.

Read More


NRPE: No Output Returned From Plugin - How to fix this Nagios error ?

This article covers how to resolve Nagios error, NRPE: No Output Returned From Plugin. This error happens as a result of Permissions or Missing plugin.

To fix this Nagios error:

1. The most common solution is to check the permissions on the check_nrpe binary on the Nagios XI server:

ls -la /usr/local/nagios/libexec/check_nrpe

The expected permissions should resemble:

-rwxrwxr-x. 1 nagios nagios  75444 Nov 21 01:38 check_nrpe

2. If not, change ownership to user/group "nagios" and fix up the permissions:

$ chown nagios:nagios /usr/local/nagios/libexec/check_nrpe
$ chmod u+rwx /usr/local/nagios/libexec/check_nrpe
$ chmod u+rx /usr/local/nagios/libexec/check_nrpe

Read More


Googlebot cannot access CSS and JS files – Resolve crawl errors ?

This guide covers website crawl errors, Googlebot cannot access CSS and JS files. Google bot and other search spiders will visit the robots.txt file of your website immediately after they hit the htaccess file.

Htaccess has rules to block ip addresses, redirect URLs, enable gzip compression, etc. The robots.txt will have a set of rules for the search engines too. 

They are the reason you received "Googlebot Cannot Access CSS and JS files". 

Robots.txt has few lines that will either block or allow crawling of files and directories. Google has started penalizing websites that block the crawling of js and css files.

The JavaScript and cascading style sheets are responsible for rendering your website and they handle forms, fire events, and so on.

If the JS is blocked, Google bot will not be able to crawl the code and it will consider the code as a spam or violation of link schemes. 

The same logic applies for the CSS files.


To resolve "Googlebot Cannot Access CSS And JS Files" Warning:

1. You need to remove following line: Disallow: /wp-includes/

Depending upon how you have configured your robots.txt file, it will fix most of the warnings. 

You will most likely see that your site has disallowed access to some WordPress directories like this:

User-agent: *

Disallow: /wp-admin/
Disallow: /wp-includes/
Disallow: /wp-content/plugins/
Disallow: /wp-content/themes/

2. You can override this in robots.txt by allowing access to blocked folders:

User-agent: *
Allow: /wp-includes/js/

Read More


Cloud SQL Proxy error – An attempt was made to access a socket

This article covers methods to resolve Cloud SQL Proxy error. 

The Cloud SQL Proxy error looks like this:

An attempt was made to access a socket in a way forbidden by its access permissions


Therefore you cannot bind to it while it's running:

The SQL Server engages the 3306 port locally. 

1. Stop the SQL Server to bind the CloudSQL Proxy to it.

2. Incase of Windows 10: Go to Task Manager -> Services -> MySQL57

3. Right click and stop that task. 

4. Once you have done that try running the same command again. 

It'll work and show as output:

Listening on 127.0.0.1:3306 for <instance-name>


Requirements for using the Cloud SQL Auth proxy.

To use the Cloud SQL Auth proxy, you must meet the following requirements:

1. The Cloud SQL Admin API must be enabled.

2. You must provide the Cloud SQL Auth proxy with Google Cloud authentication credentials.

3. You must provide the Cloud SQL Auth proxy with a valid database user account and password.

4. The instance must either have a public IPv4 address, or be configured to use private IP.

The public IP address does not need to be accessible to any external address (it does not need to be added as an authorized network address).

Read More


Plesk error Access to the path is denied - Fix it Now

This article covers Plesk Access to the path is denied error. For instance, while trying to access http://example.com/testfolder/test.aspx, it produces the error:

Access to the path %plesk_vhosts%example.com\httpdocs\testfolder is denied

This signifies that the Required system user and/or permissions are not configured properly for the directory %plesk_vhosts%example.com\httpdocs\testfolder in Plesk.


To fix this Plesk error:

1. Connect to the server via RDP.

2. When default permissions on the domain folder are lost, the following actions can be performed to restore them:

i. For Plesk 12.5, Onyx and Obsidian:

"%plesk_cli%\repair.exe" --repair-webspace-security -webspace-name example.com

If it is necessary to repair permissions for all domains, the following command should be used:

"%plesk_cli%\repair.exe" --repair-all-webspaces-security

Also, Plesk Reconfigurator could be used: in the Windows Start menu, select All Programs > Plesk > Plesk Reconfigurator and select Repair Plesk installation > Plesk Virtual Hosts Security > Check .

ii. For Plesk before 12.5:

Go to the Domains page, mark the required domains, and click on the Check permissions button.

Then uncheck the Check-only mode checkbox and click OK .

Read More


Plesk error PHP has encountered an Access Violation - Fix it now

This article covers how to fix PHP has encountered an Access Violation which occurs in the Windows server with the Plesk control panel. 

Do a copy libmysql.dll from C:\Program Files (x86)\SWsoft\Plesk\Additional\PleskPHP5 to C:\WINDOWS\system32

Wait for few minutes and it should fix the issue.


To fix PHP has encountered an Access Violation at XXXXX in Plesk:

1. Connect to the server via SSH.

2. Create a backup of the psa database:

plesk db dump psa > /root/psa_backup.sql

3. Download the attached script:

$ wget https://plesk.zendesk.com/hc/article_attachments/115001860533/script_kb213376309

4. Make the script executable:

$ chmod +x script_kb213376309

5. Launch the script for the affected subscription:

Note: change the "example.com" website in the command below to the correct one.

$ ./script_kb213376309 example.com

6. If an error like below appears:

ERROR 1062 (23000) at line 5: Duplicate entry '123-789' for key 'PRIMARY' exit status 1

find the duplicate record in the database:

Note: change the "123" ipCollectionId in the command below to the correct one based on the error message regarding the duplicate entry.

plesk db "select * from IpAddressesCollections where ipCollectionId=123;"

7. Remove the duplicate record from the database:

Note: change the "123" ipCollectionId in the command below to the correct one based on the error message regarding the duplicate entry

Change the "456" ipAddressId in the command below to the correct one based on the output from the previous step.

$ plesk db "delete from IpAddressesCollections where ipCollectionId=123 and ipAddressId=456;"

Read More


Nagios error Service check timed out after n Seconds

This article covers how to resolve 'Service check timed out after n Seconds' error for our customers.

You can increase the timeout on the check, though you will have to alter the check in XI and the plugin timeout in the ncpa.cfg file on the remote host.


If it is related to Nagios XI check_xi_ncpa Timeout:

This timeout is how long the check_xi_ncpa command on the Nagios XI server will wait for a response from the NCPA agent. 

By default the timeout is not set, thereby defaulting to the plugin timeout or the global timeout.

1. In the Nagios XI web interface navigate to Configure > Core Config Manager > Commands. 

2. This brings up the Commands page, use the Search field to search for ncpa and click Search.

3. Click the check_xi_ncpa command.

4. You can change the timeout in Nagios XI with the switch -T in the check_xi_ncpa command.

5. In the Command Line, add -T <time value in seconds> after $HOSTADDRESS$. Ex. -T 120

6. Save your changes and then click the Apply Configuration button.

Read More


Nagios NDOUtils Message Queue Exceeded – Fix it Now

This article covers how to resolve the Nagios error, NDOUtils: Message Queue Exceeded error occurs when the amount of messages increases.

NDOUtils uses the operating system kernel message queue. As the amount of messages increases the kernel settings need to be tuned to allow more messages to be queued and processed.

A flood of messages in the /var/log/messages related to ndo2db like:

ndo2db: Error: max retries exceeded sending message to queue. Kernel queue parameters may neeed to be tuned. See README.
ndo2db: Warning: queue send error, retrying... 


Nature of this Nagios error:

In Nagios you experience the following symptoms:

1. Missing hosts or services or status data

2. Takes a very long time to restart the Nagios process

3. Unusually high CPU load



How to fix Nagios error, NDOUtils: Message Queue Exceeded ?

The following commands are for the msgmni option. 

For the grep command you executed previously:

i. If it did not return output, this command will add the setting to the /etc/sysctl.conf file:

$ echo 'kernel.msgmni = 512000' >> /etc/sysctl.conf

2. If it did return output, this command will update the setting in the /etc/sysctl.conf file:

$ sed -i 's/^kernel\.msgmni.*/kernel\.msgmni = 512000/g' /etc/sysctl.conf

3. After making those changes, execute the following command:

$ sysctl -p

4. You need to restart services using the commands below:

$ systemctl stop nagios.service
$ systemctl restart ndo2db.service
$ systemctl start nagios.service

Read More


Manage Transaction Log File during Data Load - Do it Now

This article covers how to manage transaction log files in SQL Server for our customers. A transaction log is a file – integral part of every SQL Server database. It contains log records produced during the logging process in a SQL Server database.

The transaction log is the most important component of a SQL Server database when it comes to the disaster recovery – however, it must be uncorrupted.

The only way to truncate the log, so the space can be reused, is to perform a SQL transaction log backup. Therefore the most common reason for a transaction log file to have grown extremely large is because the database is in the FULL recovery model and LOG backups haven't been taken for a long time.


How do I stop a transaction log from filling up?

1. To keep the log from filling up again, schedule log backups frequently. 

2. When the recovery mode for a database is set to Full, then a transaction log backup job must be created in addition to backing up the database itself.


To fix a transaction log for a database is full:

1. Backing up the log.

2. Freeing disk space so that the log can automatically grow.

3. Moving the log file to a disk drive with sufficient space.

4. Increasing the size of a log file.

5. Adding a log file on a different disk.

Read More


Set Up Amazon WorkSpaces - Step by Step Process

This article covers how to set up Amazon WorkSpaces for our customers. Amazon WorkSpaces is a managed, secure Desktop-as-a-Service (DaaS) solution. With Amazon WorkSpaces, your users get a fast, responsive desktop of their choice that they can access anywhere, anytime, from any supported device.

With Amazon WorkSpaces, you can provision virtual, cloud-based Microsoft Windows or Amazon Linux desktops for your users, known as WorkSpaces.

Generally, Workspaces are meant to reduce clutter and make the desktop easier to navigate. Workspaces can be used to organize your work. For example, you could have all your communication windows, such as e-mail and your chat program, on one workspace, and the work you are doing on a different workspace.

The Amazon WorkSpaces Free Tier provides two Standard bundle WorkSpaces with 80 GB Root and 50 GB User volumes, running in AutoStop mode, for up to 40 hours of combined use per month, for two calendar months, from the time you create your first WorkSpace.


Key Features of Amazon WorkSpaces:

1. The end-users can access the documents, applications, and resources using devices of their choice such as laptops, iPad, Kindle.

2. Network Health Check-Up verifies if the network and Internet connections are working. Also, checks if  WorkSpaces and their associated registration services are accessible, and checks if port 4172 is open for UDP and TCP access or not.

3. Client Reconnect feature allows the users to access their WorkSpace without entering their credentials every time when they disconnect.

4. Auto Resume Session feature allows the client to resume a session that gets disconnected due to any reason in network connectivity within 20 minutes by default. This can be extended for 4 hours. However, the users can disable this feature any time in the group policy section.

5. Console Search feature allows Administrators to search for WorkSpaces by their user name, bundle type, or directory.


Some AWS Limitations:

1. AWS service limits. AWS service limits are set by the platform.

2. Technology limitations. An exceptional characteristic of this limiting factor is that it can be applied to all Cloud services, not just on AWS.

3. Lack of relevant knowledge by your team.

4. Technical support fee.

5. General Cloud Computing issues.

Read More


Setup and Configure tmpmail - Step by Step Process

This article covers method to Setup and Configure tmpmail.

Basically, tmpmail is a handy utility for CLI warriors within the command line. 

By default, email addresses are created at random unless a specific email address follows the --generate flag.

Currently, w3m renders the emails in an HTML format within the terminal. If preferred, a user can use a GUI or text-based browser to view the email by passing the --browser flag followed by the command needed to launch the web browser of your choice.

TEMP-MAIL does not store your IP-address. This means you are reliably protected from all unauthorized actions that may endanger your information and compromise your privacy. All emails and data temporarily stored on our service are permanently deleted after the time expired.


How to install tmpmail ?

1. To install tmpmail, we can use the wget command or curl command to download the script from GitHub. 

Next, open a terminal and then copy or type in the following command:

# wget https://raw.githubusercontent.com/sdushantha/tmpmail/master/tmpmail

2. Now, run the chmod command against the script to modify the permissions, so the file is executable.

[root@host2 ~]# chmod -v +x tmpmail

3. Next, we will move the file to a location somewhere in our $PATH. Use the following command to accomplish this.

# mv tmpmail /bin/
# which tmpmail
/usr/bin/tmpmail


To Generate a New tmpmail Address:

To create a new temporary email address, run the following command.

# tmpmail --generate

Read More


WDS deployment in Virtual machines – Few test cases

This article covers some methods to test Windows deployment in virtual machines. Windows Deployment Services (WDS) enables you to deploy Windows operating systems over the network, which means that you do not have to install each operating system directly from a CD or DVD.


To install Windows Deployment Services:

Windows Deployment Services ships as an innate role of Windows Server. I will be demonstrating on WS2016. All currently-supported versions provide it and you follow nearly the same process on each of them.

1. Start in Server Manager. Use the Add roles and features link on the main page (Dashboard) or on the Manage drop-down.

2. Click Next on the introductory page.

3. Choose Role-based or feature-based installation.

4. On the assumption that you're running locally, you'll only have a single server to choose from. If you've added others, choose accordingly.

5. Check Windows Deployment Services.

6. Immediately upon selecting Windows Deployment Services, you’ll be asked if you’d like to include the management tools. Unless you will always manage from another server, leave the box checked and click Add Features.

7. Click Next on the Select server roles page and then click Next on the Select server features page (unless you wish to pick other things; no others are needed for this walkthrough).

8. You'll receive another informational screen explaining that WDS requires further configuration for successful operation. Read through for your own edification. You can use the mentioned command line tools if you like, but that won't be necessary.

9. You will be asked to select the components to install. Leave both Deployment Server and Transport Server checked.

10. Click Install on the final screen and wait for the installation to finish.


To create WDS Boot Images:

When a system starts up and PXE directs it to the WDS server, it first receives a boot image. The boot image should match the operating system it will deploy.

You can obtain one easily.

1. Find the DVD or ISO for the operating system that you want to install. Look in its Sources folder for a file named boot.wim. 

2. On your WDS server, right-click the Boot Images node and click Add Boot Image.

3. On the first page of the wizard, browse to the image file. You can load it right off the DVD as it will be copied to the local storage that you picked when you configured WDS.

4. You’re given an opportunity to change the boot image’s name and description. I would take that opportunity, because the default Microsoft Windows Setup (x##) won’t tell you much when you have multiples.

5. You will then be presented with a confirmation screen. Clicking Next starts the file copy to the local source directory. After that completes, just click Finish.

Read More


Disable NetBIOS and LLMNR Protocols in Windows Using GPO - How to do it

This article covers how to disable NetBIOS and LLMNR Protocols for our customers. The broadcast protocols NetBIOS over TCP/IP and LLMNR are used in most modern networks only for compatibility with legacy Windows versions. Both protocols are susceptible to spoofing and MITM attacks. 

In the Metasploit there are ready-made modules that allow you to easily exploit vulnerabilities in the broadcasting NetBIOS and LLMNR protocols to intercept user credentials in the local network (including NTLMv2 hashes). 

To improve your network security, you need to disable these protocols on the domain network. 


In the domain environment, LLMNR broadcasts can be disabled on computers and servers using Group Policy. 

To do it:

1. Open the gpmc.msc, create a new GPO or edit an existing one that is applied to all workstations and servers;

2. Go to Computer Configuration -> Administrative Templates -> Network -> DNS Client;

3. Enable Turn off smart multi-homed name resolution policy by changing its value to Enabled;

4. Wait while the GPO settings on clients are updated, or manually update them using the command: gpupdate /force.


To manually disable NetBIOS on Windows as follows:

1. Open network connection properties

2. Select TCP/IPv4 and open its properties

3. Click Advanced, then go to WINS tab and select Disable NetBIOS over TCP

4. Save the changes.

Read More


SQL Server Error 9002 - Fix it now

This article covers methods to resolve SQL Server Error 9002 for our customers. SQL Server Error 9002 happens when the SQL Transaction Log file becomes full or indicated the database is running out of space. A transaction log file increases until the log file utilizes all the available space in disk. A quick fix is to create more space for log file.


To Fix SQL Server Error 9002:


1. Backup Transaction Log File

Incase, SQL database that you are using is full or out of space, you should free the space. For this purpose, it is needed to create a backup of transaction log file immediately. Once the backup is created, the transaction log is truncated. If you do not take back up of log files, you can also use full or Bulk-Logged Recovery model to simple recovery model.


2. Free Disk Space

Generally, the transaction Log file is saved on the disk drive. So, you can free the disk space which contains Log file by deleting or moving other files on order to create some new space in the drive. The free space on disk will allow users to perform other task and resolve SQL Error Log 9002 The Transaction Log for Database is Full.


3. Move Log File to a Different Disk

If you are not able to free the space on a disk drive, then another option is to transfer the log file into a different disk. Make sure another disk in which you are going to transfer your log file, has enough space.

i. Execute sp_detach_db command to detach the database.

ii. Transfer the transaction log files to another disk.

iii. Now, attach the SQL database by running sp_attach_db command.


4. Enlarge Log File

If the sufficient space is available on the disk then you should increase the size of your log file. Because, the maximum size for a log file is considered as 2 TB per .ldf file.


To enlarge log file, there is an Autogrow option but if it is disabled, then you need to manually increase the log file size.

i. To increase log file size, you need to use the MODIFY FILE clause in ALTER DATABASE statement. Then define the particular SIZE and MAXSIZE.

ii. You can also add the log file to the specific SQL database. For this, use ADD FILE clause in ALTER DATABASE statement.

Then, add an additional .ldf file which allows to increase the log file.

Read More


DirectAdmin Email page failed to load - Fix it Now

This article covers how to fix the issue regarding the email page not loading in the DirectAdmin panel.


To fix this DirectAdmin error:

1. Edit DirectAdmin.conf

$ vi /usr/local/directadmin/conf/directadmin.conf

2. Add below line into the file to enable disk usage cache:

pop_disk_usage_cache=1

3. Edit /etc/cron.d/directadmin_cron

$ vi /etc/cron.d/directadmin_cron

and add below line

*/15 * * * * root echo "action=cache&type=popquota" >> /usr/local/directadmin/data/task.queue

4. Restart crond service

$ service crond restart

Read More


Nagios Network Analyzer - My New Source Wont Start - Best Fix

This article covers method to resolve Source Not Starting in Nagios for our customers. Generally, it happens when you added a new source, but it did not automatically start.

When creating a new Source in Network Analyzer it creates the directory structure - the folders where it will store flow data, the RRD data file, and the processes pid file. It also starts the Source (nfcapd or sfcapd) automatically once it's finished creating the new directories. Here's a couple reasons why it may not be starting.


This problem can be resolved by installing the rrdtool-python module the following command:

$ yum install -y rrdtool-python

Once installed restart the nagiosna service:

$ systemctl restart nagiosna

The Source should now start

Read More


SQL Error 17051 – Server Evaluation Edition to Enterprise Edition

This article covers method to resolve SQL Error 17051.

This SQL error  sometimes happens when the SQL Server Evaluation period has expired.

To fix Microsoft SQL Server Management Studio error:
1. Now as per the error message you open the Event Viewer and see that the Event with ID 17051, which shows SQL Server Evaluation period has expired under Details section.
2. Now, you recall that the Instance that you had installed was under Evaluation of 180 days, because you didn’t applied any Product Key. So, now how can you make it live again? All you need is a Product key of SQL Server and some clicks.
3. Open the SQL Server Installation Center and click on Maintenance link, and then click on Edition Upgrade.
4. Now on the Upgrade window Click Next and you will reach the Product Key page, apply the Key and click Next.
5. On the Select Instance page, select the SQL Instance that you want to fix and Click next. It will take some time and finally you will see a final window and click Upgrade.
6. Finally you will see the successful window, click on Close button.

Also, you can use following command line installation option to skip this specific rule to allow the upgrade process to complete successfully:
a) Open Command Prompt (CMD)
b) Go to the folder where SQL Server Setup, setup.exe file is located (like C:\Program Files\Microsoft SQL Server\110\Setup Bootstrap\SQLServer2012\)
c) Apply following command:

setup.exe /q /ACTION=editionupgrade /InstanceName=MSSQLSERVER /PID=<appropriatePid> /SkipRules= Engine_SqlEngineHealthCheck

The <appropriatePid> should be the 25 digit Key.
The above command line runs SQL Server setup in silent mode.
Now Restart the SQL Server Service for this Instance, and you will see it running fine.
Finally, go back to SSMS and now you can connect to the SQL Instance.

Read More


Unable to find the User entry – Fix Apache Web Agent Installation Error

This article covers how to fix Unable to find the User entry Apache Web Agent Installation Error.

This arror happens when we fail to set the user and group in the Apache httpd.conf file. Also, You will see "Unable to find the "User" entry in the httpd.conf file, will try APACHE_RUN_USER environment variable" and/or "Unable to find the "Group" entry in the httpd.conf file, will try APACHE_RUN_GROUP environment variable" errors.

To resolve this Apache error:
1. Check whether the user and group are set; you can do this via the httpd.conf file or equivalent file (such as envvars). For example:
a. Review the httpd.conf file and check whether the user and group are set. By default, they are set to apache, for example:

$ cat httpd.conf | grep 'User\|Group'
...
User apache
Group apache
..

If they are not set, you should set them; you can set them to apache or nobody.
b. Review the envvars file to ensure the user and group are set in the APACHE_RUN_USER and APACHE_RUN_GROUP environment variables. For example:

$ cat envvars | grep 'APACHE_RUN_USER\|APACHE_RUN_GROUP'
export APACHE_RUN_USER=apache
export APACHE_RUN_GROUP=apacheIf they are not set, you should set them; you can set them to apache or nobody.

2.     Review the passwd and group files to check whether the user and group match what is set in your httpd.conf file or equivalent. For example:

$ cat /etc/passwd | grep apache
apache:x:48:48:apache:/usr/share/httpd:/sbin/nologin
$ cat /etc/group | grep apache
apache:x:48:


If they are not set, you should set them to match what is in the httpd.conf file or equivalent.

Read More


Microsoft SQL Server Error 916 - Fix it now

This article covers method to resolve Microsoft SQL Server Error 916 for our customers.

The main problem is due to bugs present in SQL Server Management Studio that prevents the user to connect to the database and refuses to display the database list.

How to solve Microsoft SQL server error 916:
If you receive the following error while using Microsoft SQL Server Management Studio 2008:
The server principal "username" is not able to access the database "dbname" under the current security context. (Microsoft SQL Server, Error: 916).

Causes of SQL Server Error 916:
1. The user is not permitted to view the data of selected column within the database.
2. The database is currently not available.
3. There are multiple columns such as Size, Space available, Data Space Used, Default file group, Index Space Used, Mail host, Primary file path and user has added at least one of them to the list of Object Explorer Details.
4. If the Auto Close option for the database is enabled, then Collation column cannot be retrieved by SQL Server Management Studio (SSMS).
5. For a database, Collation column contains NULL.

In order to view the granted permissions for the guest-user, the following command is helpful if run by a member of a Sysadmin fixed server.
The query is as follows:

USE msdb;
 SELECT prins.name AS grantee_name, perms.*
 FROM sys.database_permissions AS perms
 JOIN sys.database_principals AS prins
 ON perms.grantee_principal_id = prins.principal_id
 WHERE prins.name = ‘guest’ AND perms.permission_name = ‘CONNECT’;
 GO

On running the above command, a table is presented to the user containing all the attributes of guest user.
However, an empty result shows that guest user is disabled in the database and again the SQL Server error 916 will be displayed.
To overcome the error you may perform the following available solutions.

To fix this SQL server error 916:
1. In Object Explorer, click databases.
2. Display "Object Explorer Details" (F7) or "View –> Object Explorer Details".
3. Right-click the column headers and deselect "collation".
4. Refresh the databases.

Read More


Nagios Failed to Parse Date Error - Fix it now

This article covers Nagios Failed to Parse Date Error.

Basically, the logs coming in on the same input need to use the same formatting.
To fix this Nagios error,  make sure that all devices use the same date format or configure another input for these devices.
For example:

syslog {
    port => xxxx
    type => 'alternative-syslog'
    tags => 'alternative Linux-Max'
}

Read More


GUI testing for Web Applications and Smart devices – An overview

This article covers GUI testing which refers to testing the functions of an application that are visible to a user. In the example of a calculator application, this would include verifying that the application responds correctly to events such as clicking on the number and function buttons.
Basically, the web UI testing revolves around the graphical user interface (GUI) testing that includes testing of both the functionality and usability of the website or the web app. By specifically using web UI testing, it refers to testing GUI elements like fonts, layouts, buttons, checkboxes, images, colours, and so on.

What we check in GUI Testing?
1. Testing the size, position, height, width of the visual elements.
2. Verifying and testing the error messages are displayed or not.
3. Testing different sections of the display screen.
4. Verifying the usability of carousel arrows.
5. Checking the navigation elements at the top of the page.

GUI Testing is a software testing type that checks the Graphical User Interface of the Software.

The purpose of Graphical User Interface (GUI) Testing is to ensure the functionalities of software application work as per specifications by checking screens and controls like menus, buttons, icons, and so on.

Benefits of GUI Testing:
1. Tests the user interface from the users perspective.
2. Efficiently reduces the number of risks towards the end of development life cycle.
3. Offers developers and testers ease of use and learning.
4. Helps validate the compliance of various icons and elements with their design specifications.

Read More


Attributes do not match - Fix this SQL Server Installation Error

This article covers how to resolve the error, SQL Attributes do not match. Basically, the error, Attributes do not match occurs during SQL Server installation or during SQL Server patching activity.
Once you get this issue, you can check all drives available on your database server whether they are compressed or not. If any drive is compressed and SQL Server is using that drive during installation then that might be the reason for getting issue Attributes do not match.
You need to uncompress all such drives and then start the installation.

To uncompress the drive we need to launch property window of that drive:
1. We just need to right click on the identified drive and choose Properties to see the status of compression.
2. You can see compress this drive to save disk space option is ticked.
3. Uncheck this option and click on OK button to apply the change.
4. Once you validated all drives that none of the drives are compressed then you can start SQL Server installation and this time SQL Server installation will be successful.

When installing SQL server and running into an error "Attributes do not match.
Present attributes (Directory, Compressed) , included attributes (0), excluded attributes (Compressed, Encrypted)".
This is because you are trying to install SQL into a folder that is compressed which is not supported.
To fix this;
1. Navigate to C:\Program Files\Microsoft SQL server folder
2. Right click on properties on SQL Server folder.  
3. Under advanced option in general tab, look for compress contents to save disk space, uncheck it.
4. Also, uncheck "encrypt contents to secure data"
5. Re-run the SQL install

Read More


Nagios No lock file found - Fix this error now

This article covers different methods to resolve the error, Nagios: No lock file found.  Basically, "No lock file found in /usr/local/nagios/var/nagios.lock" means that the service isn't running.

To fix this Nagios error:
Execute the command:

$ /usr/local/nagios/bin/nagios -d /usr/local/nagios/etc/nagios.cfg

Running the command above simply starts the nagios daemon and points it to a specific config file.
The advantage to running this command manually over systemd is that when you run "service nagios start" this typically calls the /etc/rc.d/init.d/nagios script which contains a line with parametrized environment variables:

$NagiosBin -d $NagiosCfgFile

Because every system is different, not specifying either the bin nor config directories could lead to nagios breaking (stopping) when it tries to start using the default installation directory paths

Read More


Administration Page Fails To Display in Nagios Log Server

This article covers how to resolve the 'Administration Page Fails To Display' in the Nagios Log Server issue for our customers.


To fix this Nagios error, all you need to do is to:
1. Increase the PHP  memory_limit in php.ini file.
You can execute the following command:

$ find /etc -name php.ini

2. Then make the necessary changes.
3. After which you should restart Apache for the changes to take effect using one of the commands below:

$ systemctl restart apache2.service

4. Once the service has restarted, the Administration page will be accessible.

If the problem persists, please increase the value again.


When using the vi editor in Linux:
1. To make changes press i on the keyboard first to enter insert mode
2. Press Esc to exit insert mode
3. When you have finished, save the changes in vi by typing :wq and press Enter

Read More


No SSL library support - How to fix this Web Agent installation error

This article covers methods of resolving No SSL/library support: Web Agent installation error. This issue arises when you are trying to install a 32bit version of the agent on a 64bit system; the 32bit version of the agentadmin tool cannot open the 64bit SSL libraries.
Therefore, If your operating system does not include native openssl packages, you must install OpenSSL.

To fix this Web Agent installation error on Linux:
1. Ensure you are installing the appropriate version of the agent; if you have a 64bit operating system, you must install the 64bit agent.
2. Ensure either the operating system provides native openssl packages or OpenSSL is installed. If you are using OpenSSL, you can check that the OpenSSL libraries are in the correct location as follows and add them if they are missing:
a. Check that the LD_LIBRARY_PATH environment variable is set. For example: $ echo $LD_LIBRARY_PATH
b. Check that the OpenSSL libraries (libcrypto.so and libssl.so) are available in the path specified in this environment variable (LD_LIBRARY_PATH).

Read More


Configure Multi-Tenancy in Nagios Log Server - How to perform it

This article covers how to configure multi-tenancy in Nagios log server.
Multi-Tenancy works by assigning which hosts a user is allowed to see in the Nagios Log Server interface.
Hosts can also be placed in a host list and then applied to the users who will be allowed access.
NOTE: API users and administrators will be able to work around any restrictions placed on them, this
functionality only applies for regular users.

Read More


SQL Error 50000 - Best method to fix

This article covers method to fix SQL Error 50000.

This SQL error happens in the process of installing SQL Server Management Studio on one of the client machines.
If you receive SQL Server 50000 error on a SQL Agent Job, you need to Quit the job reporting failure.

To fix this SQL error, you can try the following queries:
1. Enable the SQL Broker on the Site database:

USE master; 
GO 
ALTER DATABASE CM_PR1 SET ENABLE_BROKER 
GO

2. SET the Site Database as trustworthy:
USE master;

GO 
ALTER DATABASE CM_PR1 SET TRUSTWORTHY ON 
GO

3. SET the Database to honor the HONOR_BROKER_PRIORITY:

USE master; 
GO 
ALTER DATABASE CM_PR1 SET HONOR_BROKER_PRIORITY ON; 
GO

Read More


JFTP Bad response error in Joomla - Best Method to resolve

This article covers how to fix JFTP bad response error in Joomla for our customers.
When trying to install new extensions in Joomla, some users might come across some errors indicating a “Bad Response”, where the extensions are not successfully installed.

These errors include:

-JFTP::mkdir: Bad response
-JFTP::chmod: Bad response
-JFTP::store: Bad response

To fix this error, You could try to change the chmod permission to 777 (755 the default chmod) of your configuration.php file, and also the corresponding directory recursively.
To do this, modify the configuration.php file.
Simply search for the FTP settings within this file and input the FTP login details in the following fields:
public $ftp_host = '';
public $ftp_port = ’21’;
public $ftp_user = ”;
public $ftp_pass = ”;
public $ftp_root = ”;
public $ftp_enable = ‘1’;

Read More


SQL Server Error 5009 – Different scenarios and fixes

This article covers how to fix SQL Server Error 5009 error which occurs while adding or removing a database file or extending the database file size.
 
To fix Microsoft SQL Server Error 5009 While Adding Database File:
1. Set the Operating system permission on the mentioned .ldf file to full permission for your login account and SQL Server service account.
2. Change the location to the path where you have enough permission to create or add database files.

Read More


Manage Scheduled Tasks with PowerShell - How to do it

This article covers how to use the PowerShell features to create scheduled tasks. The Get-ScheduledTask cmdlet gets the task definition object of a scheduled task that is registered on a computer. You can use PowerShell to create and manage scheduled tasks. Managing scheduled tasks with PowerShell is made possible with the use of the ScheduledTasks module that’s built-in to Windows.
With the PowerShell Scheduled Tasks module, setting up scheduled tasks using PowerShell commands is made possible. This module provides the opportunity and means to create and deploy scheduled tasks programmatically on the local and remote computers.

Important scheduled task component:
1. Action – the action that is executed by the scheduled task. An action is typically to run a program or a script. A scheduled task can have more than one actions.
2. Trigger – controls when the scheduled task runs. Triggers can be time-based, like, setting a schedule for daily or hourly recurrence. Triggers can also be activity-based, which runs a task based on detected activities like computer startup, a user logs in, or logged events.
3. Principal – controls the security context used to run the scheduled task. Among other things, a principal includes the user account and the required privilege used by the scheduled task.
4. Settings – is a set of options and conditions that controls how the scheduled task behavior. As an example, you can customize a task to get removed after a consecutive number of days that the task is unused.

To add a Trigger for a scheduled task using PowerShell:
The cmdlet to use for creating a trigger is the New-ScheduledTaskTrigger cmdlet.
The command below creates a trigger to run daily at 3 PM.

Copy and run the code in PowerShell:

# Create a new trigger (Daily at 3 AM)
$taskTrigger = New-ScheduledTaskTrigger -Daily -At 3PM
$tasktrigger

This will Create a Trigger (Daily at 3 AM)

Read More


Enable Windows Lock Screen after Inactivity via GPO - How to do it

This article covers how to Enable Windows Lock Screen on domain computers or servers using Group Policy. Locking the computer screen when the user is inactive (idle) is an important information security element.
The user may forget to lock his desktop (with the keyboard shortcut Win + L) when he needs to leave the workplace for a short time.
If any other employee or client who is nearby can access his data. The auto-lock screen policy will fix this flaw.
After some time of inactivity (idle), the user's desktop will be automatically locked, and the user will need to re-enter their domain password to return to the session.

To enable lock screen with group policy:
1. Create a new GPO then edit it and go to:
Computer Config>Policies>Windows Settings>Security Settings>Local Policies>Security Options.
2. Find Interactive logon: Machine inactivity limit .
3. Set that to whatever time you want and it will lock the PC after it hits that timer.

To change my lock screen wallpaper using group policy:
1. Run GPEDIT. MSC.
2. Go this path "Computer Configuration\Policies\Administrative Templates\Control Panel\Personalization".
3. Enable the GP "Force a specific default lock screen image".
4. Specify the path to the image file.
5. Click OK.

To Find Windows 10's Spotlight Lock Screen Pictures:
1. Click View in File Explorer.
2. Click Options.
3. Click the View tab.
4. Select "Show hidden files, folders and drives" and click Apply.
5. Go to This PC > Local Disk (C:) > Users > [YOUR USERNAME] > AppData > Local > Packages > Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy > LocalState > Assets.

Read More


SQL error 300 - Fix it Now

This article covers tips to resolve SQL error 300. The reason of the error is related with user permission on VIEW SERVER STATE. You can upgrade SQL Server Management studio with the same version like SQL Instance or higher. 


Also, To mitigate this error, give the following GRANT and the error message will disappear:

USE master
GO
GRANT VIEW SERVER STATE TO "LoginName"

Read More


Boot an EC2 Windows instance into DSRM - How to perform this task

This article covers how to boot an EC2 Windows instance into DSRM. If an instance running Microsoft Active Directory experiences a system failure or other critical issues you can troubleshoot the instance by booting into a special version of Safe Mode called Directory Services Restore Mode (DSRM). In DSRM you can repair or recover Active Directory.


How to Configure an Instance to Boot into DSRM?

1. To boot an online instance into DSRM using the System Configuration dialog box

i. In the Run dialog box, type msconfig and press Enter.

ii. Choose the Boot tab.

iii. Under Boot options choose Safe boot.

iv. Choose Active Directory repair and then choose OK. The system prompts you to reboot the server.


2. To boot an online instance into DSRM using the command line

From a Command Prompt window, run the following command:

$ bcdedit /set safeboot dsrepair

If an instance is offline and unreachable, you must detach the root volume and attach it to another instance to enable DSRM mode.

Read More


Cannot download Docker images behind a proxy - Fix it Now

This article covers the error, Cannot download Docker images behind a proxy. 

You can fix this docker issue by doing the following:

1. In the file /etc/default/docker, add the line:

export http_proxy='http://<host>:<port>'

2. Restart Docker:

$ sudo service docker restart


Also, you can Follow the steps given below to fix this docker error:

1. Create a systemd drop-in directory for the docker service:

$ mkdir /etc/systemd/system/docker.service.d

2. Create a file called /etc/systemd/system/docker.service.d/http-proxy.conf and add the HTTP_PROXY env variable:

[Service]
Environment="HTTP_PROXY=http://proxy.example.com:80/"

3. If you have internal Docker registries that you need to contact without proxying you can specify them via the NO_PROXY environment variable:

Environment="HTTP_PROXY=http://proxy.example.com:80/"
Environment="NO_PROXY=localhost,127.0.0.0/8,docker-registry.somecorporation.com"

4. Flush changes:

$ sudo systemctl daemon-reload

5. Verify that the configuration has been loaded:

$ sudo systemctl show --property Environment docker
Environment=HTTP_PROXY=http://proxy.example.com:80/

6. Restart Docker:

$ sudo systemctl restart docker

Read More


Using WebMatrix – Create and publish websites with ease

This article covers WebMatrix which is a simple and free development tool to create, customize, publish and maintain websites with ease. WebMatrix is basically a free, lightweight, cloud-connected web development tool that enables you to create, publish and maintain your websites with ease. You can use it to create HTML5/CSS3 compliant websites, with LESS and Sass support, and code completion for JavaScript and jQuery.

Also, You can develop using ASP.net, PHP and Node.js with context sensitive code completion.

WebMatrix lets you work seemlessly with various databases, viz. SQL CE, Sql Server and MySQL. Creation of databases and modification of schema and data are as simple as it gets. 

Also, WebMatrix provides a straightforward path to migrate databases, for example, migrating a SQL CE database to a SQL Server database.

Publishing these databases is also handled for you by the product so long as you use a WebDeploy publish profile to publish your website.

Read More


Define Global Environment Variables in Nagios - Fix it Now

This article covers how to define Global Environment Variables in Nagios. In some environments, when the plugin is executed by the monitoring engine, these environment variables are not loaded and hence the plugin does not know where to find them and fails.

Therefore, when the plugin is executed, environment variables may not load.


To Define Global Environment Variables in Nagios:

Here, you will define variables required for you plugins globally.

a. Add the path /usr/local/important_application to the PATH environment

b. Add the variable ORACLE_HOME=/usr/lib/oracle/11.2/client64

1. To do this, edit a specific file that nagios checks when it starts:

$ vi /etc/sysconfig/nagios

2. Add the following lines to the file and then save:

export PATH=$PATH:/usr/local/important_application
export ORACLE_HOME=/usr/lib/oracle/11.2/client64

3. Finally, restart Nagios:

$ systemctl restart nagios.service


If you have Mod-Gearman, 

The following is being applied:

a. Re-define the PATH environment to include /usr/local/important_application

b. Add the variable ORACLE_HOME=/usr/lib/oracle/11.2/client64

1. This is performed by editing a specific file that mod-gearman2-worker checks when the service starts:

/etc/sysconfig/mod-gearman2-worker

2. Open an SSH session to your Mod-Gearman worker.

Type:

$ vi /etc/sysconfig/mod-gearman2-worker

3. Add the following lines to the end of the file and save:

PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/usr/local/important_application
ORACLE_HOME=/usr/lib/oracle/11.2/client64

4. Now reload the daemons and restart the Mod-Gearman worker:

$ systemctl daemon-reload
$ systemctl restart mod-gearman2-worker.service

Read More


Bad interpreter No such file or directory error in Nagios

This article covers Nagios error, 'bad interpreter no such file or directory'. Nagios bad interpreter: No such file or directory error occurs after uploading a plugin which is in a "Windows" format instead of a "Unix" format. It has to do with the line endings / carriage returns.

To fix this error, you will convert the file to a Unix format:

$ yum install -y dos2unix
$ dos2unix /usr/local/nagios/libexec/check_apc_pdu_load.sh

Read More


Nagios error Could not bind to the LDAP server - Fix it now

This article covers tips to resolve 'could not bind to the LDAP server. Nagios error. This cause secure lookup on 636 or using TLS to fail.

The check_ldap plugin makes use of OpenLDAP, the OpenLDAP package is installed as part of the NagiosXI installation because the plugins have dependencies on it but it is left in a non-configured state.

To resolve the problem on each node (wtgc-nagios-01 and wtgc-nagios-02) the following is required, firstly edit the file: /etc/openldap/ldap.conf and at the bottom of the file add the following line:

TLS_REQCERT allow

Read More


330 Content Decoding Failed - Nagios Web browser error

This article covers how to fix 330 Content Decoding Failed Nagios browser error. Basically, this error occurs when an HTTP request's headers claim that the content is gzip encoded, but it is not. 

To fix this error:

The Apache web server requires zlib.output_compression to be configured to On in the /etc/php.ini file.

Execute the following command to open the file in vi:

vi /etc/php.ini

When using the vi editor, to make changes press i on the keyboard first to enter insert mode.

Press Esc to exit insert mode.

To locate the line zlib.output_compression = type the following:

/output_compression =

This should take you directly to the line. Change the setting to On:

zlib.output_compression = On

When you have finished, save the changes in vi by typing:

:wq

and press Enter.

The last step is to restart the Apache service using one of the commands below:

RHEL 7 + | CentOS 7 + | Oracle Linux 7 +

$ systemctl restart httpd.service

 Debian | Ubuntu 16/18/20

$ systemctl restart apache2.service

After the service has restarted the problem should no longer occur.

Read More


Clear Solaris Service Maintenance Status in Nagios - Troubleshoot and Resolve

This article covers how to fix Clear Solaris Service Maintenance Status Nagios issue. Basically, When the Nagios Core service finds an invalid configuration, the core service will not start. 

To fix the problem you must fix the problem Nagios Core is complaining about.

This is normal behavior of Nagios Core, it is not specific to Solaris.

However on Solaris, after a service has failed to start several times, Solaris will put the service into what is called a Maintenance State. This state prevents a small problem from becoming a bigger problem. 

Even after fixing the problem Nagios Core is complaining about, you must also clear the maintenance state on the service before Solaris allows a service to be started again.

This means that the service is in a maintenance state, however there is not a lot of detail as to the cause of the issue except that the Start method failed repeatedly. 

It does however provide the name of a log file /var/svc/log/application-nagios:default.log.

Execute the following command to perform further troubleshooting:

tail -20 /var/svc/log/application-nagios:default.log


To Clear Maintenance State on Nagios:

1. Run the following command to clear the maintenance state:

$ svcadm clear nagios

2. Execute the following command to start Nagios:

$ svcadm enable nagios

3. Now check the state of the service:

$ svcs -xv nagios

Read More


Failed to register iobroker in Nagios - Solved

This article covers how to resolve Nagios error, Failed to register iobroker. This problem can occur when custom operating system limits restrict the max number of processes that can be executed.


Custom limits are defined in the /etc/security/limits.conf file

You will need to increase the hard and soft values to resolve the problems you are experiencing, for example:

# harden against fork-bombs
*               hard    nproc           10000
*               soft    nproc           10000
root            hard    nproc           10000
root            soft    nproc           10000

 After making the changes it is recommended to reboot the operating system to ensure the limits are applied.

If the change does not fix the problem then you should increase the values again.

Read More


Secure osTicket with Lets Encrypt SSL Certificates - Do it Now

This article covers how secure osTicket with Let’s Encrypt SSL Certificates. You can use the Certbot to request for SSL certificates from Let's Encrypt Certificate Authority. The tool is not available by default and will need to be installed manually.


To Install certbot certificate generation tool:

1. Install certbot on Ubuntu /Debian:

# Install certbot on Ubuntu /Debian

$ sudo apt update

# Apache

$ sudo apt-get install python-certbot-apache

# Nginx

$ sudo apt-get install python-certbot-nginx


2. Install certbot on CentOS 8 / CentOS 7:

On a CentOS system run either of the following commands:

# CentOS 8

## For Apache

$ sudo yum -y install python3-certbot-apache

## For Nginx

$ sudo yum -y install python3-certbot-nginx

# CentOS 7

## For Apache

$ sudo yum -y install python2-certbot-apache

## For Nginx

$ sudo yum -y install python2-certbot-nginx

Read More


Updating Windows VM Templates on VMWare with PowerShell - How to do it

This article covers how to update Windows VM Templates on VMWare. 

The update process of a VM template on VMWare consists of the following stages:

1. A template from the Content Library is converted to a virtual machine.;

2. After starting it, an administrator logs on, installs approved Windows updates using WSUS, updates the required software;

3. After the updates have been installed, the VM is restarted, then turned of and converted back to the template.

Read More


DirectAdmin error Headers and client library minor version mismatch

This article covers how to resolve DirectAdmin: Headers and client library minor version mismatch error. Basically, this error can come up even after MySQL update and PHP rebuild via custombuild.

To resolve this error:

Perform a cleanup in custombuild and rebuild PHP

$ cd /usr/local/DirectAdmin/custombuild

$ ./build clean

$ ./build php n


Alternatively you can set it like this:

cd /usr/local/directadmin/custombuild

./build set php5_ver 5.3

./build set mysql 5.1

./build update

./build clean

./build apache d

./build php d

./build mysql d


To rebuild zend:

cd /usr/local/directadmin/custombuild

./build zend

Read More


WordPress error Class wp_theme not found - Fix it now

This article covers method to resolve 'WordPress: Class wp_theme not found' error for our customers.


To perform a manual WordPress upgrade:

1. Get the latest WordPress zip (or tar.gz) file.

2. Unpack the zip file that you downloaded.

3. Deactivate plugins.

4. Delete the old wp-includes and wp-admin directories on your web host (through your FTP or shell access).

5. Using FTP or your shell access, upload the new wp-includes and wp-admin directories to your web host, overwriting old files.

6. Upload the individual files from the new wp-content folder to your existing wp-content folder, overwriting existing files. Do NOT delete your existing wp-content folder. Do NOT delete any files or folders in your existing wp-content directory (except for the one being overwritten by new files).

7. Upload all new loose files from the root directory of the new version to your existing WordPress root directory.

However, if you did not perform step 7, you would see this error message when trying to complete your upgrade:

Class WP_Theme not found in theme.php on line 106


Hence, to avoid this issue, or to fix this issue, make sure you perform step 7 and continue on the remaining steps for the manual WordPress updating process.

Read More


Virtualization Restrictions in RedHat Linux with KVM

This article covers Virtualization Restrictions in RedHat Linux which are additional support and product restrictions of the virtualization packages.


The following notes apply to all versions of Red Hat Virtualization:

1. Supported limits reflect the current state of system testing by Red Hat and its partners. Systems exceeding these supported limits may be included in the Hardware Catalog after joint testing between Red Hat and its partners. If they exceed the supported limits posted here, entries in the Hardware Catalog are fully supported. In addition to supported limits reflecting hardware capability, there may be additional limits under the Red Hat Enterprise Linux subscription terms. Supported limits are subject to change based on ongoing testing activities.


2. These limits do not apply to Red Hat Enterprise Linux (RHEL) with KVM virtualization, which offers virtualization for low-density environments.


3. Guest operating systems have different minimum memory requirements. Virtual machine memory can be allocated as small as required.

Read More


USB device passthrough to Hyper-V - How to get this done

This article covers how to perform Hyper-V USB Passthrough. A USB passthrough is referenced when a keyboard has female USB ports for other devices to be plugged into the keyboard. USB passthroughs requires more than one USB port to be used by the keyboard in order to pass the USB through to the PC, often requiring an additional connection to the host system for powered ports.


What does Hyper-V USB passthrough Mean?

Hyper-V USB passthrough functionality allows you to access the USB device from within a virtual machine. There is a way to enable USB passthrough on Hyper-V for a memory stick, but you’ll have to use Windows storage subsystem.


Known issues with Hyper-V USB device passthrough organized with native methods:

1. Platform restrictions: said methods rely upon Windows storage subsystem so using them to set up Hyper-V USB passthrough on Linux (or any other OS that’s not Windows) is out of question, sadly.

2. An extremely limited list of supported devices: for the native methods to work, your USB peripheral must be recognized as a “Mass Storage Device”. No exceptions.

3. No sharing: once your device is set in passthrough mode, you can access it only from the guest OS. That’s why using these methods to permanently connect a USB to Hyper-V is definitely not the best idea.

4. Poor choice for a cloud: with these methods, the USB device is always locked to a specific host PC while there's no way to anchor a cloud-based Hyper-V guest system or preestimate where it's going to run for your next session.


Advantages of using RDP for Hyper-V USB passthrough:

1. Works for literally any hypervisor you can name;

2. Instant access to USB devices, once RDP connection is up;

3. Group Policy feature for overall control;

4. All USB devices plugged into your host PC are accessible from a virtual machine.


To enable USB device in Hyper-V with the Enhanced Session Mode:

1. On a host computer, you go to the Hyper-V Manager, right-click the name of the host and choose Hyper-V Settings.

2. In the Setting window, you will see the Server and User sections. Select Enhanced Session Mode Policy in the Server section and allow the enhanced session mode by checking the corresponding box.

3. Now, choose "Enhanced Session Mode" in the User section and check the “Use enhanced session mode” box.

4. Click OK and the changes will be saved.


To allow Hyper-V access to attached USB devices:

1. Start the Hyper-V Manager and double-click the name of your virtual machine.

2. In the pop-up window, click “Show Options” to configure your VM’s future connections.

3. After that, go to the tab “Local resources” and click “More” in the section “Local devices and resources”.

4. Then, check the boxes “Other supported Plug and Play devices” and “Devices that I plug in later”. Hit OK.

5. If you want this configuration to be saved for all future connections, check the corresponding box in the “Display” tab. Click “Connect” to implement the changes.

Read More


Recover orphan innodb database from ibd file - How to perform this task

This article covers how to recover the orphan InnoDB database from the ibd file. 


Orphan InnoDB database incident mostly happened when:

1 – user accidentally remove ibdata1 file. (mostly in /var/lib/mysql/ibdata1).

2 – ibdata file courrupted.


To Recover Orphaned InnoDB Tables:

1. Restart the MySQL service to recreate ibdata1, then take a backup of your database folder.

2. Login to MySQL.

3. Create a dummy database with the same name. Then, create a dummy table with the same name as the corrupted one (don’t mind the table structure for now).

4. Stop the MySQL service, copy the .frm file from the backup you took to replace the .frm file.

5. Start MySQL and have a look at the structure of your table - it should now be in place! However, don’t get too happy yet.

6. Issue a SHOW CREATE TABLE statement and copy its contents, then create the table with them.

7. Stop MySQL, copy the .ibd file from the backup directory to /var/lib/database_name and replace the existing .ibd file from the dummy table.

8. Now it’s time for Percona’s tools to shine - download and install the Percona Data Recovery Tool for InnoDB , then run the following (here -o represents the full location of your ibdata1 file, -f represents the full location of your .ibd file, -d represents the database name and -t represents your table name):

ibdconnect -o /var/lib/mysql/ibdata1 -f /var/lib/mysql/database_name/table_name.ibd -d database_name -t table_name

9. Now, run a checksum check against InnoDB - make sure you get no error messages (you might need to run this tool several times):

innochecksum /var/lib/mysql/ibdata1

10. Finally, you should be good to go - simply start MySQL.

Read More


Remove Nginx on linux in Vesta control panel - Step by Step process to do it

This article covers how to remove Nginx on Linux in the Vesta control panel. 

Vesta control panel (VestaCP) is an open source hosting control panel, which can be used to manage multiple websites, create and manage email accounts, FTP accounts, and MySQL databases, manage DNS records and more.


To uninstall VestaCP on CentOS, follow the steps below:

1. Connect to your server via SSH as root

2. Stop the Vesta service with service vesta stop:

$ service vesta stop 

3. Delete Vesta packages/software repository:

# yum remove vesta*

and

# rm -f /etc/yum.repos.d/vesta.repo

4. You may also want to remove /usr/local/vesta folder:

# rm -rf vesta

5. Now we have to remove the cron jobs for the user admin.

Let's list first the cron jobs:

# crontab -u admin -l
MAILTO=admin@ibmimedia.com
CONTENT_TYPE="text/plain; charset=utf-8"
15 02 * * * sudo /usr/local/vesta/bin/v-update-sys-queue disk
10 00 * * * sudo /usr/local/vesta/bin/v-update-sys-queue traffic
30 03 * * * sudo /usr/local/vesta/bin/v-update-sys-queue webstats
*/5 * * * * sudo /usr/local/vesta/bin/v-update-sys-queue backup
10 05 * * * sudo /usr/local/vesta/bin/v-backup-users
20 00 * * * sudo /usr/local/vesta/bin/v-update-user-stats
*/5 * * * * sudo /usr/local/vesta/bin/v-update-sys-rrd
40 2 * * * sudo /usr/local/vesta/bin/v-update-sys-vesta-all
03 3 * * * sudo /usr/local/vesta/bin/v-update-letsencrypt-ssl

6. Remove the cron jobs via crontab -u admin -e:

# crontab -u admin -e

7. Save and exit:


Read More


DirectAdmin User too large delete on background - Methods to resolve this error

This article covers method to fix the error, DirectAdmin: User too large delete on background. Basically, this error occurs when the sum of the disk usage of any user exceeds a certain threshold.

To prevent time-outs in your browser when deleting excessively large accounts, DirectAdmin will execute the deletion by adding the command to the background’s task.queue, instead of performing the execution on the foreground.


To fix DirectAdmin: User too large delete on background error, you can connect to the server through SSH using root access, then go to DirectAdmin's installed directory as below:

cd /usr/local/directadmin/conf/

Then edit the directadmin.conf file in the directory by running

vi directadmin.conf

If the variable "get_background_delete_size" value exists in the directadmin.conf file, it will be set to 10 GB by default (get_background_delete_size=10240). 

If the variable cannot be found in the file, simply add it in. 

You can modify the value of 10240 to define the value that you wish to set.

Read More


Best Ubuntu APT Repository Mirror - How to get it

This article covers methods to find the best APT mirror on the Ubuntu server. 


To Find Best Ubuntu APT Repository Mirror Using Apt-smart:

Apt-smart is yet another command line tool written in Python. It helps you to find APT mirrors that provides best download rate for your location. It can smartly retrieve the mirrors by querying the Debian mirror list, Ubuntu mirror list and Linux mint mirror list and choose best mirror based on the country in which the user lives in. The discovered mirrors are ranked by bandwidth and their status (like up-to-date, 3-hours-behind, one-week-behind etc).

Another notable feature of Apt-smart is it will automatically switch to any other different mirrors when the current mirror is being updated. The new mirrors can be selected either automatically or manually by the user. Good thing is Apt-smart will backup the current sources.list before updating it with new mirrors.


To Install Apt-smart in Ubuntu:

Make sure you have installed Pip and run the following commands one by one to install Apt-smart:

$ pip3 install --user apt-smart
$ echo "export PATH=\$(python3 -c 'import site; print(site.USER_BASE + \"/bin\")'):\$PATH" >> ~/.bashrc
$ source ~/.bashrc


To List all mirrors based on rank:

To list all available ranked mirrors in the terminal, run:

$ apt-smart --list-mirrors

Or,

$ apt-smart -l


To Automatically update mirrors:

Instead of manually finding and updating the best mirror in Ubuntu, you can let Apt-smart to choose a best Apt mirror and automatically update the sources.list with new one like below:

$ apt-smart --auto-change-mirror

To get help, run:

$ apt-smart --help

Read More


Amazon Redshift - Its features and how to set it up

This article covers an effective method to set up Amazon Redshift. Amazon Redshift is a fully managed, petabyte-scale data warehouse service in the cloud. This enables you to use your data to acquire new insights for your business and customers. The first step to create a data warehouse is to launch a set of nodes, called an Amazon Redshift cluster.

Amazon Redshift is a relational database management system (RDBMS), so it is compatible with other RDBMS applications. Amazon Redshift and PostgreSQL have a number of very important differences that you need to take into account as you design and develop your data warehouse applications.

Amazon Redshift is based on PostgreSQL.

Amazon Redshift is specifically designed for online analytic processing (OLAP) and business intelligence (BI) applications, which require complex queries against large datasets.


What is the difference between Amazon Redshift and Amazon Redshift Spectrum and Amazon Aurora?

Amazon Simple Storage Service (Amazon S3) is a service for storing objects, and Amazon Redshift Spectrum enables you to run Amazon Redshift SQL queries against exabytes of data in Amazon S3.

Both Amazon Redshift and Amazon RDS enable you to run traditional relational databases in the cloud while offloading database administration. 

Customers use Amazon RDS databases primarily for online-transaction processing (OLTP) workload while Redshift is used primarily for reporting and analytics.

Read More


Boost performance of Websites using Cloudflare - Tips to implement it

This article covers how to improve the performance of Websites using Cloudflare. Website speed has a huge impact on user experience, SEO, and conversion rates. Improving website performance is essential for drawing traffic to a website and keeping site visitors engaged. 

Along with the caching and CDN, Cloudflare helps protect your site against brute-force attacks and threats against your website.

Cloudflare has the advantage of serving million of websites and so can identify malicious bots and users more easily than any operating system firewall.


CDNs boost the speed of websites by caching content in multiple locations around the world. CDN caching servers are typically located closer to end users than the host, or origin server. Requests for content go to a CDN server instead of all the way to the hosting server, which may be thousands of miles and across multiple autonomous networks from the user. Using a CDN can result in a massive decrease in page load times.


How to get started on optimizing website performance with Cloudfare CDN (content delivery network)?

1. Optimize images

Images comprise a large percentage of Internet traffic, and they often take the longest to load on a website since image files tend to be larger in size than HTML and CSS files. Luckily, image load time can be reduced via image optimization. Optimizing images typically involves reducing the resolution, compressing the files, and reducing their dimensions, and many image optimizers and image compressors are available for free online.

2. Minify CSS and JavaScript files

Minifying code means removing anything that a computer doesn't need in order to understand and carry out the code, including code comments, whitespace, and unnecessary semicolons. This makes CSS and JavaScript files slightly smaller so that they load faster in the browser and take up less bandwidth.

3. Reduce the number of HTTP requests if possible

Most webpages will require browsers to make multiple HTTP requests for various assets on the page, including images, scripts, and CSS files. In fact many webpages will require dozens of these requests. Each request results in a round trip to and from the server hosting the resource, which can add to the overall load time for a webpage. 

4. Use browser HTTP caching

The browser cache is a temporary storage location where browsers save copies of static files so that they can load recently visited webpages much more quickly, instead of needing to request the same content over and over. Developers can instruct browsers to cache elements of a webpage that will not change often. Instructions for browser caching go in the headers of HTTP responses from the hosting server.

5. Minimize the inclusion of external scripts

Any scripted webpage elements that are loaded from somewhere else, such as external commenting systems, CTA buttons, or lead-generation popups, need to be loaded each time a page loads.

6. Don't use redirects, if possible

A redirect is when visitors to one webpage get forwarded to a different page instead. Redirects add a few fractions of a second, or sometimes even whole seconds, to page load time