Search related to

SolusVM: Cannot Allocate Memory Error – Best fix ?

This article covers the best way to tackle SolusVM: Cannot Allocate Memory Error. In fact, this error happens while booting KVM VPS in SolusVM. This error signifies that there is not enough free memory on the node.

Read More


"Undefined" error in elementor - How to Fix this WordPress error ?

This article covers tips to fix "Undefined" error in elementor for WordPress users. In fact, this is the most common issues faced by Elementor users when trying to import a Custom  saved template or one of the Elementor’s default Templates.

To resolve the issue you need to click on the Sync Library button on the Template Import section.

Once you refresh the Library, try importing the templates again and it should work perfectly fine.

Read More


AWS RDS parameter group max_allowed_packet - How to Modify the parameter ?

This article covers how to create and modify the AWS RDS parameter. 


What is max_connect_errors parameter ?

This parameter indicates how many connection errors are possible before the server blocks a host. If more than max_connect_errors successive connection requests from a host are interrupted without a successful connection, the server blocks that host from further connections. The default value is 100 and can be tuned to your security requirements and environment.

For example, if max_connect_errors=5000, after 5,000 connection requests from Host X are interrupted you get an error like the following:

Host X is blocked because of many connection errors ()

You can simply Unblock the host using the following command:

mysql> flush hosts;
mysql> show global variables like 'max_connect_errors';

+| Variable_name      | Value |
+--------------------+-------+
| max_connect_errors | 5000|
+--------------------+-------+

1 row in set (0.00 sec)

Read More


Google Cloud Error Code 4033 - Fix it Now ?

This article covers methods to resolve Google Cloud Error Code 4033. Virtual Private Cloud (VPC) firewall rules apply to a given project and network. If you want to apply firewall rules to multiple VPC networks in an organization. 

VPC firewall rules let you allow or deny connections to or from your virtual machine (VM) instances based on a configuration that you specify. Enabled VPC firewall rules are always enforced, protecting your instances regardless of their configuration and operating system, even if they have not started up.

Read More


Plesk error pool seems busy - Fix it Now ?

This article covers methods to resolve Plesk error pool seems busy. This error happens when the PHP-FPM pm.max_children has been reached by the website(s). 


To Increasing pm.max_children for one domain via a command-line interface:

1. Create a php.ini file in domain's system directory /var/www/vhosts/system/example.com/conf/:

$ touch /var/www/vhosts/system/example.com/conf/php.ini

2. Open the php.ini file in any text editor (for example, vi editor) and add the following records:

[php-fpm-pool-settings]
pm.max_children = 20

3. Save the changes and close the file.

4. Run the following command to apply the changes:

/usr/local/psa/bin/php_settings -u

Read More


PostgreSQL backup failed in Web help desk - Fix it Now ?

This article covers methods to resolve PostgreSQL database and fix PostgreSQL error. It may be necessary to create a backup and restore your Web Help Desk database.

This is how to back up and restore the Web Help Desk 12.x PostgreSQL embedded database. The process involves creating a backup from the web interface and restore using the embedded pgAdmin application on the Web Help Desk.

Read More


PostgreSQL Error code 23505 - Fix it Now ?

This article covers methods to fix PostgreSQL Error code 23505 for our customers. This issue happens when you are trying to insert a value in a column that already exists there. If you have a sequencer on the field (like with a serial column type), it is likely out of sync with the table because you have done an insert and supplied a value (rather than letting the "default" mechanism handle it by getting the nextval from the sequencer). If this is the case, reset the sequencer with a setval statement to the max value of the field.

Read More


PostgreSQL Error code 42703 - Fix it Now ?

This article covers steps to resolve PostgreSQL Error code 42703 for our customers. PostgreSQL database 42703 error triggers an error message "column does not exist" which indicates either that the requested column does not it exist, or that the query is not correct.

There are many possible reasons for this issue.

To get started, check your query for any mistakes. Often, the error is caused by a lack of quotes.

If this is the case, add double quotes to the column name, then try again. 

Read More


AWS RDS MySQL Error 1227 - Fix it Now ?

This article covers how to fix AWS RDS MySQL Error 1227 for our customers. In order to fix this issue, you’ll need to leverage DB parameter groups. To modify parameter values in a customer-created DB parameter group, you can’t change the parameter values in a default DB parameter group. Changes to parameters in a customer-created DB parameter group are applied to all DB instances that are associated with the DB parameter group.

To modify a DB parameter group, use the AWS CLI modify-db-parameter-group command with the following required parameters:

--db-parameter-group-name
--parameters

Read More


Google Cloud Error code 4003 - Fix it Now ?

This article covers methods to resolve the Google Cloud Error code 4003 for our customers. This issue can cause the start-up connectivity test to the VM instance to fail.

Therefore, Ensure that the listening process on the VM is running and listening on the correct port. Also, verify that your Google Cloud firewall is configured correctly and open on the port you're connecting to.

Read More


AWS ERROR 2003 (HY000): Can't connect to MySQL server - Fix it Now ?

This article covers methods to tackle AWS "ERROR 2003 (HY000): Can't connect to MySQL server" for our customers.

You can easily fix this issue by adding the public ip address of my EC2 server to the DB security group default policy.

You can create a new security group with the corresponding IP range/subnet of your EC2 instances(s). You can use the exact IP(s), or use your VPC's subnet(s) as the range.

Once created, you can right click your RDS instance in the management console and select 'Modify'. From there, you can change the associated security groups.

Read More


Openvz "Failed to mount image" - Fix it Now ?

This article covers methods to tackle Openvz "Failed to mount image" error for our customers. 

To fix this error after the hardware reboot,

# ploop check -F /vz/private/139/root.hdd/root.hdd
# ploop mount /vz/private/139/root.hdd/DiskDescriptor.xml
# fdisk -l /dev/ploop56824
# e2fsck /dev/ploop56824p1
# vzctl start 139

Read More


SolusVM error Unable to find ostemplate - Best Fixes ?

This article covers methods to resolve SolusVM errors for our customers. 

To fix Unable to find ostemplate error:

Simply Re-install OS

$ vzctl reinstall <CTID> --ostemplate <template_name>

where <CTID> should be replaced with actual VPS CT ID and <template_name> should be replaced with the template name without ".tar.gz" part.

Read More


Error: EACCES: permission denied with npm - Best Fixes ?

This article covers methods to resolve "Error: EACCES: permission denied with npm" for our customers. If you see an EACCES error when you try to install a package globally, you can either:

  • Reinstall npm with a node version manager (recommended).
  • Manually change npm's default directory.


To download the latest version of npm, on the command line, run the following command:

$ npm install -g npm

Read More


mysqldump error 1194 table is marked as crashed - Best Fixes ?

This article covers methods to resolve the mysqldump error 1194 for our customers. Generally database administrators use MySQL tables to store some important files along with their professional data or records. Though users store their important data but they are unaware of the situation that they can also lose their important data some day when the database gets corrupt or damaged. 

When MySQL database gets corrupted then it displays several error messages, one such error is "ERROR 1194 (HY000): Table 'table_name' is marked as crashed and should be repaired". And this error is very annoying so its very important to fix MySQL error 1194 as soon as you can.


Main causes of MySQL Error 1194:

  • Due to sudden system shutdown.
  • Virus/malware infection.
  • File system corruption after the newly installed program like hardware or software.

Read More


VMware error, Missing credentials for vCenter server - Fix it Now ?

This article covers methods to fix VMware errors for our customers. Basically, this guide provides information on troubleshooting common issues with logging in to the vSphere Web Client when using the Use Windows Session Credentials feature.

Read More


VMware error "Failed to build vmmon" - Fix it Now ?

This article covers method to resolve VMware error "Failed to build vmmon" for our customers. Linux for Workstation requires additional packages and steps in order to complete installation. The following steps have been tested on Fedora 28 and Fedora 29 but otherwise would be generally applicable to other Linux distributions. Please adjust for your specific version.

Read More


MySQL dump error 'illegal mix of collations' - Fix it Now ?

This article covers methods to resolve MySQL dump error 'illegal mix of collations'. 

You should set both your table encoding and connection encoding to UTF-8:

ALTER TABLE keywords CHARACTER SET UTF8; -- run once

and

SET NAMES 'UTF8';
SET CHARACTER SET 'UTF8';

You can try to run SHOW CREATE TABLE my_table; and see which column was not converted or just fix incorrect character set on problematic column with query below (change varchar length and CHARSET and COLLATE according to your needs):

ALTER TABLE `my_table` CHANGE `my_column` `my_column` VARCHAR(10) CHARSET utf8 
COLLATE utf8_general_ci NULL;

Read More


AWS s3 lambda 500 Internal Service Error - Fix it Now ?

This article covers methods to resolve AWS s3 lambda 500 Internal Service Error.

Basically,  this error occurs if Lambda function's resource-based policy doesn’t include permission for your API to invoke the function.

This error occurs if your Lambda function's resource-based policy doesn't include permission for your API to invoke the function.

When you build an API Gateway API with standard Lambda integration using the API Gateway console, the console automatically adds the required permissions. However, when you set up a stage variable to call a Lambda function through your API, you must manually add these permissions.

Finally, To verify that the error is caused by missing permissions, review your API's logs.

Read More


Enable Git on Virtualmin - Best way to do it ?

This article covers steps to enable Git on Virtualmin. 

To do this:

  • Go to Webmin -> Webmin Configuration -> Webmin Modules.
  • In the From ftp or http URL field, enter the URL .http://download.webmin.com/download/plugins/virtualmin-git.wbm.gz .
  • Click the Install Module button.


Once the plugin is installed, you can enable it in Virtualmin as follows :

  • Go to System Settings -> Features and Plugins.
  • Check the box in the left hand column next to Git repositories.
  • Click Save.

Read More


Webmin "Error code ssl_error_rx_record_too_long" - Fix it Now ?

This article covers how to troubleshoot "Error code ssl_error_rx_record_too_long" in Webmin. Usually the ssl_error_rx_record_too_long error means that the service is not speaking in SSL - for example, if you try to access an http-only service via https. 

Are you sure that webmin is set up to talk in ssl on port :10000?

Read More


AWS S3 403 Forbidden Error - Fix it Now ?

This article covers methods to fix HTTP 403 Forbidden error for our customers. 

To troubleshoot the HTTP 403 Forbidden error from the Amazon S3 console, check the following:

  • Missing permissions to s3:PutObject or s3:PutObjectAcl.
  • Missing permissions to use an AWS Key Management Service (AWS KMS) key.
  • Explicit deny statement in the bucket policy.
  • Bucket access control list (ACL) doesn't allow the AWS account root user to write objects.
  • AWS Organizations service control policy doesn't allow access to Amazon S3.

Read More


Plesk error AH01075: Error dispatching request to - Fix it Now ?

This article covers methods to resolve 504 Gateway Time-out Plesk error which happens when there is an Execution of the PHP code of the website which takes longer than the specified timeout.

Read More


Postfix address already in use Plesk error - Fix it Now ?

This article covers methods to resolve Postfix address already in use error in Plesk. To fix this error, simply Edit file /etc/postfix/master.cf and comment out all duplicate lines in the configuration, for example:

203.0.113.2- unix - n n - - smtp -o smtp_bind_address=203.0.113.2 -o
smtp_bind_address6= -o smtp_address_preference=ipv4

Note: The line with the IP address should exist only once in the /etc/postfix/master.cf configuration file.

Read More


AWS MySQL error 1419 - Fix it Now ?

This article covers methods to resolve AWS MySQL error 1419. When automated backup is enabled for a MySQL DB instance, it also enables binary logging.

You might receive the following error message when creating a trigger: "ERROR 1419 (HY000): You do not have the SUPER privilege and binary logging is enabled (you might want to use the less safe log_bin_trust_function_creators variable)".

Read More


AWS MySQL error 10060 – Can't connect to MySQL server ?

This article covers methods to resolve AWS MySQL error 10060. This error is a result of the inbound connection rule set on your DB instance.

For each RDS database instance we create, there are Inbound & Outbound connection-security groups.

In AWS RDS console, under 'Databases', click on the 'DB Identifier' of your RDS instance. Then in the 'Security group rules' section, click on 'Inbound' type security group and edit the inbound rule to allow appropriate inbound connections.

You get 3 options here, under 'source' column:

  • Custom.
  • Anywhere (Allows connections from any IP. Not recommended for production.).
  • My IP (Automatically detects your machine's IP).

Read More


sec_error_ocsp_try_server_later in cPanel - Fix it Now ?

This article covers methods to resolve cPanel: Firefox users see "sec_error_ocsp_try_server_later". 

To fix this cPanel error:

  • Log in to your server's WHM interface as root or a priveledged user.
  • Go to Service Configuration, then Apache Configuration.
  • Choose Include Editor, then from the drop down for Pre Main Include select All Versions.

Once you see the text editor for the include file of All Versions, there may already be some configuration lines in there. If there are, simply scroll to the bottom of the window, then paste in the following:

SSLUseStapling on
SSLStaplingCache shmcb:/tmp/stapling_cache(32768)

Read More


Autossl 403 (Forbidden) error – Fix it Now ?

This article covers AutoSSL not working on cPanel / WHM.

To fix it, just try to assign 755 permissions and the correct owner to your public_html directory:

$ chmod 755 /home/user/public_html -v
$ chown user.user /home/user/public_html/ -R

Make sure you change user.user with your real cPanel user for that website.

Read More


Troubleshoot kubernetes error with linode – Fix it Now ?

This article covers how to troubleshoot Kubernetes error with linode.

  • To troubleshoot issues with the applications running on your cluster, you can rely on the kubectl command to gather debugging information. kubectl includes a set of subcommands that can be used to research issues with your cluster.
  • To troubleshoot issues with your cluster, you may need to directly view the logs that are generated by Kubernetes' components.

Read More


Error accessing file for config file ///etc/yum.conf – Fix it Now ?

This article covers methods to resolve the error, "CRITICAL:yum.cli: Config Error: Error accessing file for config file:///etc/yum.conf" occurs while performing certain actions with yum. 

The replacement of the source-compiled version of curl is to use the rpms instead, eg:

$ yum install libcurl-devel

As the libcurl and curl rpms should already be there by default, as yum needs them.

Read More


HTTP error 403: forbidden yum – Fix this error Now ?

This article covers methods to resolve HTTP error 403 which happens as a result of issues with files in repos.d, permissions or SELinux. 

To fix this error:

Grant read permission for other users inside CentOS/RHEL/OL 6 latest channel directory on local yum server.

Read More


Drupal 7 "website encountered an unexpected error" - Fix it Now ?

This article covers method to resolve Drupal 7 "website encountered an unexpected error" ?


To find out what the real problem is,

  1. Add to settings.php: $config['system.logging']['error_level']='verbose';
  2. Also, In phpMyAdmin,delete some respective config files in the database.
  3. Just click on "config" and look for the reported files.

Read More


Install pgAdmin with Docker - Step by Step Process ?

This article covers how to go about installing pgAdmin with Docker. By using Docker, we don’t have to worry about the installation of the PostgreSQL or pgAdmin. Moreover, you can use Docker to run this project on macOS, Windows, and Linux distributions.

Database management via a command-line interface can be nerve-racking. To solve this issue, we can use a tool with an interface. The pgAdmin solves this problem. Moreover, Docker makes the entire process smoother. 


To fix pgAdmin using Docker Installation issues:

Issue with following command,

$ docker run -p 80:80 \
    -e PGADMIN_DEFAULT_EMAIL="atinesh.s@gmail.com" \
    -e PGADMIN_DEFAULT_PASSWORD="admin" \
    -d dpage/pgadmin4

Read More


pgAdmin "connection to the server has been lost" - Fix it Now ?

This article covers methods to resolve pgAdmin "connection to the server has been lost" error for our customers. When connecting to a PostgreSQL server, you may get this error message. From the error message you will be able to resolve the problem. 


If pgAdmin displays this message, there are two possible reasons for this:

  • the database server isn't running - simply start it.
  • the server isn't configured to accept TCP/IP requests on the address shown.


For security reasons, a PostgreSQL server "out of the box" doesn't listen on TCP/IP ports. Instead, it must be enabled to listen for TCP/IP requests. This can be done by adding listen_addresses=’*’; this will make the server accept connections on any IP interface.

Read More


"FATAL: no pg_hba.conf entry" – How to fix the PostgreSQL error ?

This article covers methods to resolve "FATAL: no pg_hba.conf entry" error. Basically, the "no pg_hba.conf entry" can happen due to missing entries in the configuration file. 


A quick way to fix this PostgreSQL server error is to do the following steps:

1. Add or edit the following line in your postgresql.conf :

listen_addresses = '*'

2. Add the following line as the first line of pg_hba.conf. It allows access to all databases for all users with an encrypted password:

# TYPE DATABASE USER CIDR-ADDRESS  METHOD
host  all  all 0.0.0.0/0 md5

3. Restart Postgresql after adding this with service postgresql restart or the equivalent command for your setup.

Read More


OnApp Boot from ISO

This article covers how to boot from ISO on Onapp. OnApp allows uploading your custom bootable ISOs for recovery purposes. These could be different images for Windows/Linux/FreeBSD or any additional software. As a cloud administrator, you can limit user's ability to upload and manage ISOs by permissions and in buckets. You can boot virtual servers from your own ISOs or the ISOs that are uploaded and made publicly available by other users. 


If your cloud deployment is not a fresh installation, make sure to enable the following permissions for your Admin and other roles as appropriate:

  • Any action on ISOs - the user can take any action on ISOs.
  • Create a new ISO - the user can create a new ISO.
  • Destroy any ISO - the user can delete any ISO (own, user, and public).
  • Destroy own ISO - the user can only delete own ISO .
  • Destroy user ISO - the user can delete ISOs created by any user, but not public ISOs .
  • Make any ISO public - the user can make public any ISO available to all users.
  • Make own ISO public - the user can make public own ISOs only.
  • Make user ISO public - the user can make public ISOs created by any user .
  • Create and manage own ISOs - the user can create and edit/delete/view own ISOs.
  • Manage all ISOs - the user can manage own/user/public ISOs.
  • Create and manage user ISOs - the user can view/create/edit/delete ISOs created by any user.
  • See all ISOs - the user can view all ISOs in the cloud.
  • See own ISOs - the user can only view the ISOs created by themselves.
  • See all public ISOs - the user can view all public ISOs.
  • See user ISOs - the user can view the ISOs created by any user in the cloud.
  • Update any ISO - the user can edit any ISO in the cloud.
  • Update own ISO - the user can only edit own ISO.
  • Update user ISO - the user can edit  the ISOs created by any user in the cloud.


By default ISOs are available only to those users who uploaded them. These ISO images are available in the My ISOs tab. 

To make your ISO public and accessible for all users:

  • Go to your Control Panel > Cloud > Templates > ISO List menu.
  • Click My ISOs tab.
  • Click the Actions button next to the ISO you want to make public, then select Make public.
  • Confirm the window that pops up.
  • When you make a user ISO public, it is moved to the System ISOs tab.

Read More


"psql :could not connect to server: no route to host" - Fix it Now ?

This article covers how to fix the "could not connect to server: No route to host" PostgreSQL error. Basically, the "could not connect to server: No route to host" triggers while connecting to PostgreSQL due to a number of reasons.

Make the Iptables rules different in Master and Slave.

iptables -L INPUT
iptables -P INPUT ACCEPT
iptables -P OUTPUT ACCEPT
iptables -P FORWARD ACCEPT
iptables -F INPUT 
iptables -F OUTPUT
iptables  -F FORWARD

Read More


"SR BACKEND FAILURE 181" error - Fix it Now ?

This article covers how to fix "SR BACKEND FAILURE 181" error. Generally, user experiences issues with any storage related operations after installation or upgrade to XenServer 6.x. 

As a workaround, you can remove all special characters from the virtual machine name-label and description fields.  Contact our Technical Support to assist you in resolving the issue. 

Note: Special character should not be used for the storage repository and description field.

Read More


Plesk git authentication failed - Fix it Now ?

This article covers how to authenticate via HTTP when connecting to a remote Git repository in Plesk. HTTP/HTTPS authentication is not supported.

Authentication should be performed with an SSH key generated by Plesk (refer to Use SSH Connection for details).

It is possible to use HTTP/HTTPS protocol only if a repository does not require authentication.

Read More


Citrix XenServer internal error - Fix it Now ?

This article covers methods to fix Citrix XenServer internal error for our customers. This error occurs because the Control Domain (Dom0) on the XenServer which runs the VM, attaches the Virtual Disk Image (VDI) of the VM to Control Domain. 

This attached disk is then operated by the Control Domain to perform the operations which has been initiated on the VM. As the operation fails, the VDI is still attached to the control domain through a Virtual Block Device (VBD) connection that needs to be destroyed. 

Read More


XenApp Error 10060 - Fix it Now ?

This article covers method to fix XenApp Error 10060 for our customers. Users trying to launch the desktop enabling the "HDX Adaptive Transport" policy set to Diagnostic and it fails with an error: 'Unable to connect to the server. Contact your system administrator with the following error: There is no Citrix XenApp server configured on the specified address. (Socket Error 10060)'.

To fix this error, Ensure UDP 1494 and 2598 ports open on the VDA I connect back to the Citrix desktop, run CtxSession /v and receive confirmation that we are now using UDP 2598. This means that HDX Enlightened Data Transport is being used with Session Reliability. You can also check Director and note the protocol will be set as UDP.

Read More


OnApp "Error unable to connect to node rabbit"

This article covers method to fix OnApp error  'unable to connect to node rabbit' for our customers. This issue can happen on power outages or just because a Control Panel server was restarted by Reset button.

Read More


SolusVM 'No bootable device' error - Fix it Now ?

This article covers methods to fix SolusVM 'No bootable device' error for our customers.

To fix this error:

  • Log into SolusVM Master interface.
  • Open Virtual Server and remove created VPS.
  • Create a new VPS via SolusVM > Virtual Servers > Add Virtual Servers > KVM with HDD Space bigger than the size of the sum of the main partition and SWAP and SWAP bigger than the default value of the template - from the example above - HDD Space should be 22 GB and SWAP - 2000 MB.

Read More


Allow remote access to phppgadmin - The easy way

This article covers how to Install, configure and enable remote access to phpPgAdmin. Here you will learn how to enable remote access to PostgreSQL server on a Plesk server.


To Access PhpPgAdmin On Linux And MacOS:

1. Open a new terminal window on your local system (for example, using “Finder -> Applications -> Utilities -> Terminal” in macOS or the Dash in Ubuntu).

2. Make sure that you have your SSH credentials (.pem key file) in hand.

3. un the following command to configure the SSH tunnel using the SSH key file. Remember to replace KEYFILE with the path to your private key and SERVER-IP with the public IP address or hostname of your server:

$ ssh -N -L 8888:127.0.0.1:80 -i KEYFILE bitnami@SERVER-IP

Remember that if you are redirecting HTTP requests to the HTTPS port, you must use destination port 443 instead of 80.

4. Access the phpPgAdmin console through the secure SSH tunnel you created, by browsing to http://127.0.0.1:8888/phppgadmin.

5. Log in to phpPgAdmin by using the following credentials:

Username: postgres.
Password: application password.

Read More


SolusVM slave connection error - Fix it Now ?

This article covers how to fix solusVM connection error. Basically, while accessing SolusVM Admin control panel users often receive different connection errors related to solusVM slave.


To fix Master SolusVM error:

1. Install repository:

$ yum install solusvm-release

2. shutdown lighttpd service:

$ service lighttpd stop
$ chkconfig lighttpd off

3. install nginx and legacy configuration file

$ yum install svmstack-nginx svmstack-nginx-legacy-slave-config

4. start new service

$ service svmstack-nginx restart
$ service svmstack-fpm restart

Read More


Exim message is frozen – Clear frozen emails Now?

This article covers fix the Exim error for our customers. While the mail server doesn't require much interaction for sending or receiving average volumes of email, there may be times when you need to manage Exim's settings.

To Remove all frozen messages, run the command:

# exiqgrep -z -i | xargs exim -Mrm

To Remove all messages older than a defined number of seconds:

# exiqgrep -o seconds -i | xargs exim -Mrm

Read More


Migrate solusvm to proxmox – easy steps to implement this task ?

This article covers how to Migrate solusvm to proxmox.

To Migrate KVM VM's from SolusVM to Promox:

  • Take LVM snapshot of currently running SolusVM KVM CentOS7 instance.
  • dd the snapshot and copy it to the Proxmox Hypverisor.
  • Create a new KVM on the Proxmox server with LVM disks the same size as the source.
  • dd the raw snapshot image to the LVM device ie vm-VMID-disk-0.
  • Boot the new VM with CentOS 7 rescue CD and fix device names, update initramfs, etc and reboot.

Read More


"no input file specified" error in Joomla – Fix it Now ?

This article covers how to resolve Joomla error "no input file specified" which occurs due to issues with the installation.

To fix this error:

  • You can login to back-end and check the "Global configuration -> SEO Settings". 
  • Switch off Search Friendly URLs. 
  • Now all menu links should work fine.

Read More


Magento 2: Error during compilation after upgrading to version 2.2.3

This article covers methods to fix Magento error which happens during compilation on upgrading to version 2.2.3. 

If you upgrade Magento older version to Magento 2.2.3 and you fetching same error in compile then below step you should follow to resolve this error.

Magento older version have 2 directories and 2 files in this path:

vendor\magento\module-backend\Model\View\Layout
  • Filter
  • Reader
  • Builder.php
  • GeneratorPool.php

And Magento version 2.2.3 have 1 directory and 2 files:

  • Reader
  • Builder.php file
  • StructureManager.php

So after merge files and folder, you should delete "filter" folder and "GeneratorPool.php" from Magento version 2.2.3 on this path:

vendor/magento/module-backend/Model/View/Layout/GeneratorPool.php

Then run the compile command

Read More


Roundcube SMTP Error (454) Authentication Failed - Fix it Now ?

This article covers how to fix Roundcube 'SMTP error (454) authentication failed' issue for our customers. 

To fix this SMTP error:

via Command Line Interface (CLI):

1. Connect to the server via SSH;

2. Execute the following commands:

plesk installer --select-release-current --install-component qmail
# plesk installer --select-release-current --install-component postfix

Read More


ec2 key permission denied – "Authentication failed, permission denied"

This article covers method to fix the error, ec2 key permission denied. 

"Permission denied (publickey)" and "Authentication failed, permission denied" errors occur if:

  • You're trying to connect using the wrong user name for your AMI.
  • The permissions are incorrect on the instance.
  • The incorrect SSH public key (.pub) file is in the authorized_keys file.


To fix this error, simply:

  • Verify that you're using the correct user name for your AMI.
  • Also Verify that the instance's permissions are correct and that the correct SSH public key is in the authorized_keys file.

Read More


mysqldump error 1146 table doesn't exist – Fix it Now ?

This article covers methods to resolve mysqldump: Got error: 1146: Table doesn't exist. To fix this error, you can simply save the database and dump it with innodb_force_recovery option. Most InnoDB corruptions are hardware-related. Corrupted page writes can be caused by power failures or bad memory. The issue also can be caused by using network-attached storage (NAS) and allocating InnoDB databases on it.

Read More


'http error 401.3 – unauthorized' in IIS - Fix it Now ?

This article covers methods to fix 'http error 401.3 – unauthorized' in IIS. This error appears when the user account under which the IIS service runs does not have the required permissions to access and serve web server content.

Assuming Anonymous Authentication is Enabled and the error message persists, edit the Anonymous Authentication setting. 

Read More


mysqldump error "can't create/write to file" - Fix it Now ?

This article covers to fix mysqldump error "can't create/write to file" for our customers. This error can be as a result of lack of space in your /tmp keeping the file from being created. It may also be the result of a permissions error or configuration error.


We recommend restarting the service to clear any excessive temporary files:

$ /etc/init.d/mysqld restart

If that doesn't improve the situation, we recommend reviewing your configuration file and permissions, particularly if you are using SE Linux:

$ cat /etc/my.cnf | grep tmpdir
$ ls /var/tmp

Read More


Apache Error 'Failed to read FastCGI header' - Fix it Now ?

This article covers methods to resolve Apache Error 'Failed to read FastCGI header'. When this error occurs, the response sent to the browser will be "503 Service Unavailable". Basically, the error message "Failed to read FastCGI header" indicates that when Apache was communicating with PHP-FPM, the PHP process did not respond properly.

Read More


WHMCS error code 1013 - Fix it Now ?

This article covers WHMCS error code 1013. Basically, this error happens when the external_id entry is missing in psa.clients MySQL table. If the issue appears on WHMCS integrated with Plesk Multi Server, this database update should be done on the management node side.

Read More


Windows server 2016 vss error 12347 - Fix it Now ?

This article covers methods to resolve Windows server 2016 vss error 12347. Basically, 'Windows server 2016 vss error 12347' occurs when the Backup of Shadow Copy Component Fails. This usually happens when the registry Volume Shadow Copy Service (VSS) writer did not respond to a query from the VSS service.

To resolve this Windows error, simply Reboot the Server where the problem exists.

Read More


Plesk : error reading data from FastCGI server - Fix it Now ?

This article covers methods to resolve Plesk: Error reading data from fastcgi server. Basically, in most cases, this plesk error occurs when there are Corrupted WordPress plugins.

To fix Plesk error,  Connection reset by peer: mod_fcgid: error reading data from FastCGI server,

  • Log in to Plesk.
  • Deactivate one by one all plugins for the website at Domains > example.com > WordPress > Plugins until the issue is fixed.
  • Re-install or delete the plugin.

Read More


DirectAdmin error "can't connect to ssl" - Fix it Now ?

This article covers methods to fix DirectAdmin error "can't connect to ssl" for our customers. Every SSL/TLS connection begins with a "handshake" – the negotiation between two parties that nails down the details of how they’ll proceed. The handshake determines what cipher suite will be used to encrypt their communications, verifies the server, and establishes that a secure connection is in place before beginning the actual transfer of data. This all happens in the background, thankfully – every time you direct your browser to a secure site a complex interaction takes place to make sure that your data is safe.

Read More


cPanel Error: rpmdb open failed – Fix it Now ?

This article covers methods to resolve cPanel Error: rpmdb open failed. In conclusion, we run into the cPanel Error while updating yum on VPS with cPanel on it.

In order to resolve this issue you would want to attempt a rebuild of the RPM database using the following commands on the system:

$ mkdir /root/old_rpm_dbs/
$ mv /var/lib/rpm/__db* /root/old_rpm_dbs/
$ rpm --rebuilddb -vv
$ yum clean all

If that works well, the "yum update" command will now work properly on your machine.

Read More


Run cron job manually in Magento 2 - Do it Now ?

This article covers how to run cron job manually in Magento 2. Basically, Cron Job is one of the important features of Magento.


Generally, the syntax to write a cron is:

* * * * * /etc/cron.daily/script.sh

Here,

# ┌───────────── minute (0 - 59)
# │ ┌───────────── hour (0 - 23)
# │ │ ┌───────────── day of the month (1 - 31)
# │ │ │ ┌───────────── month (1 - 12)
# │ │ │ │ ┌───────────── day of the week (0 - 6) (Sunday to Saturday;
# │ │ │ │ │                                   7 is also Sunday on some systems)
# │ │ │ │ │
# │ │ │ │ │


#  * *  *  * * command to execute

/etc/cron.daily/script.sh – file to be executed.

This job will run every minute.


To run cron manually:

1. To run all crons:

$ php bin/magento cron:run

2. To run crons added under a group:

$ php bin/magento cron:run --group="your_group_id"

In our case, group id is default. 

So, command will be:

$ php bin/magento cron:run --group="default"

Read More


Drupal notice unserialize() error at offset - Fix it Now ?

This article covers method to fix 'drupal notice unserialize() error at offset'. Basically, this error happens when loading an improperly serialized array from the variables table. 

Read More


'Error InvalidArgumentException wrong file' in Magento 2 - fix it Now ?

This article covers methods to resolve 'Error InvalidArgumentException wrong file' in Magento 2 for our customers. 

You can resolve this error by applying the following changes in your php.ini file.

In your php.ini file increase values of below parameters:

max_execution_time = 18000
max_input_time = 1800
memory_limit = 1024M

Note : Make sure you increase max_input_time value to at least 1800 and it will works.

Read More


Setup Rate Limit for IP Addresses in DigitalOcean Account

This article covers how to set up rate limit for IP Addresses in DigitalOcean for our customers. 

Basically, limit standard ssh like this:

$ sudo ufw limit ssh/tcp

or

$ sudo ufw limit 22/tcp

Both will limit port 22.

The /tcp allows only a tcp connection to allow only udp you simply add /udp and to allow it on both you simply leave off the /* example: ufw limit ssh.

Read More


Prestashop error err_too_many_redirects - Fix it Now ?

This article covers methods to tackle 'err_too_many_redirects' Prestashop error which generally affects certain pages in Prestashop admin panel. The ERR_TOO_MANY_REDIRECTS in your Chrome browser indicates that the page you're attempting to visit is caught in a "redirect loop". The phrase "redirect loop" simply means that the site you're visiting can't stop trying to send your browser to a different location.

Read More


Smartermail 601 error - Ways to fix it ?

This article covers methods to fix the Smartermail 601 error. This can arise as a result to DNS lookup failure. You can try to contact your ISP and ask them to active PTR record on your ip and domain name.

Also, you can try the following fix:

  • check your domain or IP to be unblocked by spam checking website, the powerful website in this range is Barracuda'.
  • Try to test SMTP OUT by Telnet command by type: telnet IP port ( mostly 25 or 2525).
  • Get details about your PTR on the main domain you defined on Smartermail or etc mail server software.
  • Contact to your ISP to check to open the specific port 25).

Read More


Updating Group Policy Settings on Windows Domain Computers - How to do it?

This article covers how to update Group Policy Settings on Windows Domain Computers. Group Policy provides centralized management and configuration of operating systems, applications, and users' settings in an Active Directory environment. A set of Group Policy configurations is called a Group Policy Object (GPO).


To force a group policy update on a domain:

1. Right-click the selected OU, and click Group Policy Update.

2. Click Yes in the Force Group Policy update dialog box. This is the equivalent to running GPUpdate.exe /force from the command line.

Read More


Enable private networking Vultr - Step by Step Process ?

This article covers how to enable private networking vultr for our customers. Vultr provides many flexible networking options for your cloud servers. Private networks do not have DHCP. When deploying a Vultr cloud server with private networking, you must manually configure the private adapters or supply your own DHCP server. 


To setup a private IP address:

  • Allocate an IP range.
  • Go to the VPC networks page in the Cloud Console. Open the VPC networks page.
  • Under Name, click the VPC network in which you want to create a private Cloud Data Fusion instance.
  • On the VPC network details page, click the Private service connection tab.
  • Click Allocate IP range.

Read More


Install DirectAdmin on AlmaLinux - Step by Step Process ?

This article covers how to install Directadmin on Almalinux. AlmaLinux OS is an open-source, community-driven project that intends to fill the gap left by the demise of the CentOS stable release. AlmaLinux OS is a 1:1 binary compatible fork of RHEL 8 guided and built by the community. 


Operating systems supported by DirectAdmin:

  • CloudLinux - 6.x 64-bit, 7.x 64-bit, 8.x 64-bit.
  • AlmaLinux / RHEL / CentOS - 7.x 64-bit, 8.x 64-bit.
  • Debian - 8.x 64-bit, 9.x 64-bit, 10.x 64-bit, 11.x 64-bit ALPHA.
  • Ubuntu - 16.04 64-bit, 18.04 64-bit, 20.04 64-bit.
  • FreeBSD - 11.x 64-bit, 12.x 64-bit.


To Install Directadmin on Almalinux:

Login as root to your server, download the installation script, and run it.

bash <(curl -Ss https://www.directadmin.com/setup.sh || wget -O - https://www.directadmin.com/setup.sh) auto


Main Features of AlmaLinux:

1. Stable, production-ready, RHEL-based

AlmaLinux is an enterprise-grade server Operating System and a stable Linux distribution with normal releases. AlmaLinux is able to run critical workloads. 

2. Easy to switch from CentOS

AlmaLinux will be a 1:1 binary compatible fork of RHEL, which implies that the applications and administrations will stay viable, so switching is simple from CentOS to AlmaLinux. 

3. Free Operating System, and supported by Cloudlinux

CloudLinux offers a support commitment with Patches and maintenance through 2029 for AlmaLinux with a great investment. They also deliver AlmaLinux free of limitations, fees, and charges.

Read More


WordPress Error Establishing a Database Connection: Fix this Vultr error

This article covers how to resolve Vultr database error. This condition can happen for a variety of reasons: low RAM or disk space, database corruption, plugin errors, misbehaving themes, incorrect password, MySQL errors, and more. 


To fix Vultr Error establishing a database connection (WordPress):

1. Free up some RAM or upgrade the VPS to have more RAM, around 1GB or so should work.

2. Create a cron job in /etc/crontab which checks on the status on the database and restarts it if the process dies. Have the job run every few minutes. If your site runs into heavy traffic, the cron job will restart the database and connections to Wordpress will work again.

3. Also, you could try tweaking the following variables in the "/etc/my.cnf" file:

innodb_buffer_pool_size
table_open_cache

4. You can try to rebuild Nginx PHP-FPM MariaDB.

5. You can restart mysql:

/etc/init.d/mysqld start

Read More


Configure Proxy Settings on Windows Using Group Policy

This article covers how to configure Proxy Settings on Windows using Group Policy. In earlier versions of Microsoft Windows, Internet Explorer Maintenance (IEM) could be used to configure a subset of Internet Explorer settings in an environment using Group Policy. In Windows 8, the IEM settings were deprecated in favor of Group Policy Preferences, Administrative Templates (.admx), and the Internet Explorer Administration Kit 10 (IEAK 10). 


To Configure proxy settings using Group Policy Management (To Create an Internet Explorer item):

  • Open the Group Policy Management Console. Right-click the Group Policy object (GPO) that should contain the new preference item, and then click Edit.
  • In the console tree under User Configuration, expand the Preferences folder, and then expand the Control Panel Settings folder.
  • Right-click the Internet Settings node, point to New, and select Internet Explorer 10.
  • In the New Internet Explorer 10 Properties dialog box, enter the Internet options for Group Policy to configure.
  • Click the Common tab, configure any options, and then type your comments in the Description box.
  • Click OK.
  • The new preference item appears in the details pane.

Read More


Securing RDP Connections with Trusted SSL/TLS Certificates

This article covers how to secure RDP Connections with Trusted SSL/TLS Certificates. 


To Check What Certificate RDP Is Using

You can check the thumbprint of the certificate the server is using. Windows Key+R > Regedit {Enter} > Navigate to:

HKEY_LOCAL_MACHINE
> SYSTEM > CurrentControlSet > Control > Terminal Server > WinStations > TemplateCertificate

You can check this with the actual Certificate> Windows Key+R > mmc {enter} > File > Add/Remove Snap-in > Certificates > Local Computer > Open Certificates > Personal > Certificates > Locate the certificate you ‘Think’ RDP is using and you can compare its thumbprint with the registry key.

Read More


Install and Configure SNMP on RHEL/CentOS/Fedora - How to do it ?

This article covers how to install and configure SNMP on RHEL. SNMP (Simple Network Management Protocol) is widely used for monitoring and central management purposes. 


To Install SNMPd Agent on Ubuntu Server:

1. Type the following commands as root, then click Enter:

$ sudo apt-get update
$ sudo apt-get install snmp snmp-mibs-downloader
$ sudo apt-get update
$ sudo apt-get install snmpd

2. You might also need to execute:

$ sudo download-mibs


SNMPd Configuration

The snmpd daemon must be configured to work with Atera. The configuration file is located at "/etc/snmp/snmpd.conf". 

Make sure you are editing the snmpd.conf file and not the snmp.conf file.

Read More


Time Based Temporary Group Membership in Active Directory on Windows

Basically, Temporary Group Membership (Time Based) is the version of Active Directory in Windows Server 2016 introduces an interesting feature that allows you to temporarily add a user to an AD security group. In order to use the Temporary Group Membership, you need to enable the Privileged Access Management Feature in your Active Directory forest. Like with AD Recycle Bin (which allows you to recover deleted objects), you cannot disable PAM after it has been enabled.

Read More


Create New Destinations for JetBackup

This article covers how to create New Destinations for JetBackup. Basically, clients choose to store at least one copy of backups locally and additional copies in at least one or more remote destinations. Remote destinations are usually slower than local destinations to backup and restore from due to bandwidth requirements. With this in consideration, many clients choose to store at least one copy of backups locally and additional copies in at least one or more remote destinations.

Whatever backup destination option(s) you choose, please make sure that your destination path is secure and has the appropriate privileges.


How To Secure Local Backup Storage ?

Prior to adding a destination to JetBackup, we advise securing the backup directory, so that only the allowed users can access that folder.

In order to do that, please connect to the destination via console/GUI, and make the directory in which you want to store your backups.

For example:

$ mkdir [-p] /mnt/backup_vol/jetbackup

Then we advise securing that destination so only one user can access it's content (except root):

$ useradd <jetbackup>
$ chown jetbackup:jetbackup /mnt/backup_vol/jetbackup
$ chmod 700 /mnt/backup_vol/jetbackup

Right now only two users that can access this directory are root and jetbackup.

Please search online, how to secure a backup folder for your particular file system (EXT, NTFS, FAT, etc..) on your system (Windows, Linux, macOS, BSD, etc..)

Read More


Enable Firewall On AlmaLinux - How to implement this ?

This article covers how to enable Firewall On AlmaLinux. Basically, we can allow certain ports through the firewall, which lets incoming connections reach our services.


To open the port for HTTP to the public zone, run the command:

# firewall-cmd --zone=public --add-service=http --permanent

To Allow DNS through firewall, run the command:

# firewall-cmd --zone=public --add-service=dns --permanent

Allow PostgreSQL through firewall, run the command:

# firewall-cmd --zone=public --add-service=postgresql --permanent

Allow telnet through firewall, run the command:

# firewall-cmd --zone=public --add-service=telnet --permanent

Read More


"403 forbidden" error in phppgadmin - Fix it Now ?

This article covers methods to tackle "403 forbidden" error messages in phpPgAdmin. Basically, the "Forbidden" error happens while accessing phpPgAdmin when permissions in the phpPgAdmin configuration file are not intact. 


To resolve 403 forbidden error, In the Apache configuration, simply replace:

<Directory /usr/share/phppgadmin>
    DirectoryIndex index.php
    Order deny,allow
    Allow from all
</Directory>

With:

<Directory /usr/share/phppgadmin>
   Require all granted
</Directory>

Read More


Add Windows Disk Usage Checks In Nagios

This article covers how to monitor additional drives on a Windows client. To install Nagios monitoring agent, NSClient++, on a target Microsoft Windows desktop or server for the purposes of monitoring that machine with Nagios XI. This allows organizations to monitor vital metrics and ensure that a specific Windows desktop machine or server is functioning properly.


To access CCM:

  • When hovering the Configure button in the top menu bar you can select Core Config Manager.
  • On the Configure tab you can select Core Config Manager from the left pane or from the main screen.

Read More


Migrate WordPress to Google Cloud - How to do it ?

This article covers how to Migrate WordPress to Google Cloud. If you have a WordPress website, and want to move it on google cloud platform, then WordPress migration  is the way of achieving it. You can move your WordPress manually or by using a free or paid WordPress plugin.


To migrate WordPress to google cloud you have to follow those basic steps below:

  • Compress (Zip) your WordPress files folders.
  • Create a copy of your MySQL database.
  • Upload WordPress .zip file and MySQL .sql file to google cloud server.
  • Point your DNS to google cloud.


To migrate WordPress to Google cloud  you have to export an exact copy of your database to google cloud. 

There are multiple ways to do that:

  • Export database using myPhpAdmin.
  • Export database using a free WordPress Plugin.
  • Export database using terminal (command line).

Read More


Saved RDP Credentials Didn't Work in Windows - Fix it Now ?

This article covers how to resolve Saved RDP Credentials Didn't Work in Windows. Using a saved RDP credentials, the user doesn't need to enter the password each time to connect to the Remote Desktop. Basically, despite the fact that the RDP connection password is saved in the Credentials Manager, the system will not use it requiring the user to prompt the password.


To fix remote desktop credentials:

The credentials for the Windows Remote Desktop connection do not change automatically. 

The Network Adapter Troubleshooter will help check the flaws with the network (if any) and correct the same. 

  • Go to Start > Settings > Updates & Security > Troubleshoot. 
  • Select the Network Adapter Troubleshooter from the list.


To fix your credentials could not be verified on Windows:

  • Disable Microsoft Hello in Start->Settings->Accounts->Sign-in option or in local group policy.
  • Then restart the machine.
  • Log on with local admin account.
  • Re-enable the Windows Hello feature.
  • Configure the Pin as you need.

Read More


Reserve Google Cloud Static IP Address - How to do it ?

This article covers how to reserve static IP for our customers. In Compute Engine, each VM instance can have multiple network interfaces. Each interface can have both internal and external IP addresses. Forwarding rules can have external IP addresses for external load balancing or internal addresses for internal load balancing.


If a virtual machine (VM) instance requires a fixed external IP address that does not change, you can obtain a static external IP address for that instance by using one of the following options:

  • Reserve a new static external IP address and then assign the address to a new VM instance.
  • Promote an existing ephemeral external IP address to become a static external IP address.

Read More


Setup CloudFlare CDN for WordPress on Google Cloud

This article covers how to setup Cloudflare CDN for WordPress on Google Cloud. Google Cloud CDN (Content Delivery Network) uses Google's globally distributed edge caches to cache HTTP(S) Load Balanced content close to your website visitors or users. Basically, Google Cloud CDN leverages Google's globally distributed edge points of presence to accelerate content delivery for websites and applications served out of Google Compute Engine and Google Cloud Storage. Cloud CDN lowers network latency, offloads origins, and reduces serving costs.


How to Activate Google Cloud CDN on Google Cloud Platform ?

  • Login to Google Cloud platform (GCP).
  • Under Network services select Cloud CDN.
  • Click on Add origin.
  • Next, just select the load balancer from origin drop-down and click add.
  • At this point you will see the new CDN created.

Read More


"Login disallowed for security reasons" phppgadmin error – Fix it Now ?

This article covers how to resolve "Login disallowed for security reasons" phppgadmin error. Basically, the "Login disallowed for security reasons" error can happen when extra login security is enabled in the phpPgAdmin configuration file.


To fix this issue, You will need to edit the phppgadmin config file from following directory /etc/phppgadmin/config.inc.php.

Finally modify the line $conf['extra_login_security'] = true; to $conf['extra_login_security'] = false;

Read More


Use gMSA in Active Directory to launch services and tasks

This article covers how to use gMSA in Active Directory. When a gMSA is used as service principals, the Windows operating system manages the password for the account instead of relying on the administrator to manage the password. Group Managed Service Accounts (gMSAs) provide a higher security option for non-interactive applications/services/processes/tasks that run automatically but need a security credential.


The Install-ADServiceAccount cmdlet installs an existing Active Directory managed service account on the computer on which the cmdlet is run. The cmdlet also makes the required changes locally so that the managed service account password can be managed without requiring any user action.

Read More


Monitor MongoDB with Nagios XI - How to perform this ?

This article covers  how to monitor a MongoDB server with Nagios XI using the MongoDB Server Configuration Wizard in order to monitor the health of your server. The

wizard supplies checks to monitor the following: number of queries per second, memory usage, the number of databases on the server, and percentage of free connections available.


To Connect to MongoDB with the appropriate privileges:

Connect to mongod or mongos with the privileges specified in the Prerequisites section.

The following procedure uses the myUserAdmin created in Enable Access Control:

mongo --port 27017 -u myUserAdmin -p 'abc123' --authenticationDatabase 'admin'

The myUserAdmin has privileges to create roles in the admin as well as other databases.


To Modify Access for an Existing User in MongoDB:

  • You must have the grantRole action on a database to grant a role on that database.
  • You must have the revokeRole action on a database to revoke a role on that database.
  • To view a role's information, you must be either explicitly granted the role or must have the viewRole action on the role's database.

Read More


Setting remote desktop drain mode on a Windows Server RDS host

This article covers how to set remote desktop drain mode on a Windows Server RDS host. Basically, setting remote desktop drain mode on a Windows Server RDS host can be easily performed with PowerShell. The Drain Mode is used when a server administrator needs to maintain a server (install Windows updates, configure or update apps) without affecting the availability of the entire RDS farm. 

When you set the RDS host in drain mode state, the RDS host can no longer accept new connections but existing sessions continue working until users log out. You can monitor the status of the RDS host in Horizon Administrator.


To remove a Remote Desktop Session Host (Uninstall the RD Session Host Role Service) :

  • Open Server Manager.
  • In the left pane, expand Roles.
  • Right-click Remote Desktop Services, and then click Remove Role Services.
  • On the Select Role Services page, clear the Remote Desktop Session Host check box, and then click Next.
  • On the Confirm Removal Selections page, click Remove.

Read More


FTP permission denied errors on Google Cloud - Fix it Now ?

This article covers methods to fix Permission denied errors.  Basically, with chmod 777, we should be able to avoid Permission denied errors when uploading files via FTP. 

In Linux OS system every file or folder belong to some user and groups. This type of system is there for better security. Unauthorized users and groups can not modify or ever read  a file or directory. Only the ROOT user have the privilege to access any file or folder in the systems,  other user cannot access root user’s files or folders. But root user can access any other users file or folders.


If you are seeing this error below,

Error /...  : open for write:permission denied
Error File transfer failed

It means that you don't have a proper permission to modify or upload that files.

To fix this issue, Upload and move files to desire location and change file or directory(folder) permission, you can easily fix you permission denied problem.

Read More


Export config database in Nagios - How to do it ?

This article covers how to export config database in Nagios. Basically, Manual exports are useful when debugging configuration problems, including failures of Nagios XI to apply new configuration changes.

Read More


Qualities of customer service agents – What to look out for ?

This article covers the Qualities of customer service agents. Customer Service Agents and Representatives (CSR) interact with customers and provide information about products or services as well as handling and resolving customer complaints. They communicate in a variety of ways – by telephone; by e-mail, fax, regular mail; or in person. Multi-channel support is providing different methods of communication for your customers to reach you. This can include (but is not limited to) email, phone, chat, social media, knowledge base, etc.

Read More


Monitor Website Defacement With Nagios XI - How to do it ?

This article covers how to Monitor Website Defacement With Nagios. Basically, Nagios XI can monitor for potential Website defacement using the Website Defacement monitoring wizard. 


Benefits of Website Defacement Detection:

  • Fast detection of security breaches.
  • Fast detection of outages and website hijacking.
  • Increased website and web application availability.
  • Capacity planning information for future web server and application upgrades.

Read More


IIS Manager: Could not connect to the specified computer - Fix it Now ?

This article covers methods to resolve the IIS Manager error "Could not connect to the specified computer". 


To install and configure Microsoft Windows Internet Information Services:

  • Select: Manage / Add Roles and Features.
  • Select "Next" until you get to Server Roles. Scroll down and open Web Server (IIS) / Management Tools.
  • Select "Management Service".
  • Select "Next" and "Install".
  • Once installation completes, open services. If you already had services open, use refresh to add it to your list. Scroll down to Web Management Service. You will notice it is installed, but not started. It is also set to manual, so it will not start on reboot either. You need to change both of these so the service will run now and will run anytime the server is rebooted. Open the properties.
  • Change the Startup type to "Automatic". Do not start the service yet as you will not be able to configure the service while it is running.
  • Launch IIS, open Management Service.
  • Configure the Web Management Service, then apply your changes and start the service.


How to configure Microsoft IIS ?

  • Enable remote management.
  • Use windows credentials only.
  • Deny access to all except your approved IP addresses.  Use IP address ranges only when you control the entire range.
  • Use your server’s certificate if you have one configured. (Optional).
  • Change the port from the default to something else if the server is accessible from the Internet. (Optional).
  • Now you will be able to remotely manage IIS from any IP address you granted access.

Read More


Windows Cannot Find Microsoft Software License Terms - Fix it Now ?

This article covers methods to fix Windows error, Cannot Find Microsoft Software License Terms. Basically, this error happens when trying to perform a clean install of Windows Server 2016 on a new Hyper-V virtual machine. A common cause for Windows cannot find the Microsoft license software terms can be your BIOS. Sometimes certain BIOS settings can interfere with your system and prevent Windows from installing.


To fix this Windows issue, users are suggesting entering BIOS and restore the default settings.

This is fairly simple to do, but if you don't know how to do it properly, we advise you to check your motherboard manual for detailed instructions. 

After restoring the default settings, try to install Windows again.


Another method to fix Windows cannot find the Microsoft license software terms message, is to,

Disconnect the installation media during the installation:

Follow the installation steps until you reach the Install Now screen.

Disconnect your installation media and click the Install Now button.

Continue the installation as you would do normally.

Once the setup is ready to start copying files, it will ask you to reconnect your installation media, so be sure to do so.

After you connect the installation media, follow the instructions on the screen to complete the installation.

Read More


Install Docker Swarm Cluster on Debian 10 -Step by Step Process ?

This article covers how to install Docker Swarm Cluster on Debian 10. Docker Swarm is a tool used to orchestrate docker hosts. We can create a high availability and a high performance Docker cluster with applications distributed among the hosts. Docker swam uses a manager host and worker nodes architecture. You can have one or several manager nodes in your docker swarm cluster. The manager nodes uses the native Docker API and share the database of the Docker Swarm cluster with the worker nodes. The manager hosts maintain the cluster state, schedule tasks and handle the HTTP API endpoints.

Read More


Digitalocean err_connection_refused - Fix it Now ?

This article covers methods to resolve DigitalOcean error. SSH service uses sshd daemon to listen to the incoming connections and handles user authentication, terminal connections, and many more. If this service crashes, the connection fails, and results in SSH Connection refused error in DigitalOcean servers.

To fix this error, start by identifying and researching on the root cause of service failures. 

The reasons can be traffic impales, disk errors, resource breakdowns, DDoS attacks, and many more.

Sometimes the backend service fails or doesn't respond. 

In this case, we kill the dead process and restart the service. 

For example, In CentOS 7 droplet, we restart the SSH service using the below command:

$ systemctl restart sshd

Read More


Enable Memcached Support In Nagios - How to do it ?

This article covers how to enable Memcached for our customers. You can setup one or more memcached servers (hosts) for use by Nagios XI.

Each memcached host must have its firewall configured to allow traffic on TCP port 11211 to allow Nagios

XI to contact the memcached server. 


To create the firewall rules, run the commands:

$ ufw allow proto tcp from any to any port 11211
$ ufw reload

Read More


Enable ABE on Windows Server - How to do it ?

This article covers how to Enable ABE on Windows Server. By default, when a user opens some shared network folder, SMB displays a full list of files and folders on it. Of course, it happens only if the user has permission to access the share. Access Based Enumeration (ABE) allows hiding the specific files and folders for a user who don’t have access permission.

Access Based Enumeration is available on the Windows platform since Windows Server 2003 SP1, and helps to prevent users from seeing files and folders.

ABE is enabled for each folder individually. To configure ABE, open Server Manager console, and select role File and Storage Services.


Main ABE features:

1. ABE controls only the list of the contents in a shared folder. It does not hide the list of shared folders from the users. Therefore, when a user connects to the server, he will see all shared folders. If you need to create a hidden share, you can simply add the character $ to its name, for example, ShareName$;

2. ABE doesn't work when the user logged locally or when connecting via RDP;

3. Members of the local Administrators group always see the full list of the folder contents.

Read More


Google Cloud SDK error "Unzip Failed: Error opening zip file" - Fix it Now ?

This article covers how to fix Google Cloud error, "Unzip Failed: Error opening zip file". Basically, the Google Cloud SDK setup wizard triggers the "Unzip Failed: Error opening zip file" error mainly due to firewall restrictions.

To fix this error, do the following:

  • close your proxy.
  • add a new env: CLOUDSDK_PYTHON=\your Python27 path\python.exe

Read More


.env file not showing in cPanel – Fix it Now ?

This article covers methods to resolve .env file not showing in cPanel. Basically, the '.env' file not showing in cPanel can happen when the "show hidden files" option is turned off in the File Manager. 


To Show .env hidden files in File Manager:

  • Log in to your cPanel.
  • Under Files click File Manager.
  • Slick Settings in the upper right corner.
  • Select your Document Root and check the box for Show hidden files and click Save.


To display .htaccess file:

  • Login to your cPanel.
  • Under the Files section, click on File Manager.
  • Locate your .htaccess file, you may have to show hidden files.

Read More


How FCR improves Customer Satisfaction

This article covers how to use First contact resolution to increase customer satisfaction. Basically, The role of First contact resolution or FCR is important in improving customer service satisfaction. First Call Resolution (FCR) is a term used in call and contact centres to measure the number of customer support queries successfully resolved first time.


Best Practices to increase your first call resolution rate in no time:

  • Create an informative knowledge base.
  • Require minimal customer effort.
  • Get clear on the issue.
  • Be precise and don't overwhelm.
  • Anticipate customer needs.
  • Empower your customers.
  • Answer all of their questions.
  • Provide your team with quality training.

Read More


NCPA For Passive Checks – Using Nagios Remote Data Processor

This article covers how to configure NCPA For Passive Checks.

This guide will help you to configure the Nagios Cross Platform Agent (NCPA) to send passive check results to Nagios XI or Nagios Core using Nagios Remote Data Processor (NRDP).


Check results received from external devices / applications is what defines a Passive check. It's the responsibility of the external devices / applications to send the check results through, all Nagios [XI / Core] does is wait for the results (as opposed to Active checks where Nagios [XI / Core] is responsible for performing the check on a schedule).

Passive checks reduce the load on your Nagios [XI / Core] server by reducing the number of active checks run. Passive checks are also useful for security-related and asynchronous events you wish to monitor. 

Read More


WMI Error: Login to remote object in Nagios - Fix it Now ?

This article covers how to fix the WMI error for our customers. 

Sometimes the standard permission levels defined in the Monitoring Windows Using WMI documentation do not expose all the monitoring capabilities of the WMI plugin. 

In these cases you can elevate permissions by adding the WMI user to one of the two local groups:

  • Performance Monitor Users
  • Administrators

Read More


Need at least 2 WMI samples% - Fix it Now ?

This article covers how to tackle the error, Need at least 2 WMI samples%. The reason for the message is that the WMI user account does not have sufficient permissions. This can be resolved by adding the user account to the Performance Log Users security group on the windows computer. 

  • This can be performed by opening the Computer Management console (located in Administrative tools). 
  • Expand System Tools > Local Users and Groups > Groups. 
  • Edit the Performance Log Users security group and add the user account (wmiagent) to this group.

Read More


Restrict su access to Privileged Accounts in Linux - Steps to do it ?

This article covers how to restrict the su access in Linux. 

Important things to note:

  • Create a Linux group call sysadmins.
  • Configure PAM to permit users from a group permission to use su.
  • Switching as any other user with su will fail.

Read More


WMI ERROR: Retrieve result data - Fix it Now ?

This article covers process to fix WMI ERROR for our Customers. Due to a memory leak in the WMI functions in Windows 2008 and Windows 7, the system resources may be exhausted in the Windows system, resulting in the error message found above.

It has been seen that systeminfo and wmic commands executed via the command prompt fails in case this issue is present, displaying error messages such as:

The paging file is too small for this operation to complete.

Looking at the process list in the Windows system, it can be determined that the WmiPrvSE.exe process has allocated unusually large amounts of memory.

Read More


Workgroup Failover Cluster without Active Directory in Windows

This article covers how to go about Workgroup Failover Cluster. While Availability Group was a viable replacement for Database Mirroring, there were a couple of blocking issues that prevented customers from upgrading. In older Windows Server versions prior to Windows Server 2016, you could create a failover cluster only between the servers in the same Active Directory domain. The new version allows to create two- (or more) nodes failover cluster between servers joined to different domains, and even between workgroup servers (not AD domain joined) – a so-called Workgroup Cluster.

Read More


Service Not Listed in WMI Wizard in Nagios - Fix it Now ?

This article covers methods to tackle Service Not Listed in WMI Wizard in Nagios. Basically, Service may not get listed in WMI Wizard in Nagios due to reasons like lower value of Truncate Output Length or insufficient permission of the user account. Windows Management Instrumentation (WMI) is a part of Windows operating systems and can provide management data and operational information about those system. WMI can be used to automate administrative tasks on remote Windows-based computers. Nagios Core and Nagios XI are capable of monitoring Windows machines via WMI. .


To Check the permissions of the files, use this command:

ls -ls /tmp/*.state

Here you can see that the root user/group is the owner of the file:

-rw-r--r-- 1 root root 91 Apr 24 16:10 /tmp/cwpss_checkcpu__1025143___.state

The simplest option is to delete the files with this command:

rm -rf /tmp/*.state

Read More


Permission denied WMI error in Nagios - Fix it Now ?

This article covers methods to fix Nagios error WMI Remote "Access Denied". Basically, Nagios supports WMI monitoring, which provides admins with a simple method of monitoring their Windows servers and workstations without having to install or configure agents. 


How to fix DCOM permission ?

  • Open Dcomcnfg.
  • Expand Component Service -> Computers -> My computer.
  • Go to the properties of My Computer.
  • Select the COM Security Tab.
  • Click on "Edit Limits" under Access Permissions, and ensure "Everyone" user group has "Local Access" and "Remote Access" permission.
  • Click on the "Edit Limit" for the launch and activation permissions, and ensure "Everyone" user group has "Local Activation" and "Local Launch" permission.
  • Highlight "DCOM Config" node, and right click "Windows Management and Instruments", and click Properties.
  • <Please add the steps to check Launch and Activation Permissions, Access Permissions, Configuration Permissions based on the default of Windows Server 2008>.


How to fix Permission for the user to the WMI namespace ?

  • Open WMImgmt.msc.
  • Go to the Properties of WMI Control.
  • Go to the Security Tab.
  • Select "Root" and open "Security".
  • Ensure "Authenticated Users" has "Execute Methods", "Provider Right" and "Enable Account" right; ensure Administrators has all permission.


How to Verify WMI Impersonation Rights?

  • Click Start, click Run, type gpedit.msc, and then click OK.
  • Under Local Computer Policy, expand Computer Configuration, and then expand Windows Settings.
  • Expand Security Settings, expand Local Policies, and then click User Rights Assignment.
  • Verify that the SERVICE account is specifically granted Impersonate a client after authentication rights. 

Read More


Windows Update Stuck At "Downloading 0%" On Server 2016 – Fix it Now ?

This article covers different methods of fixing Windows 10 Update not working, stuck at downloading 0%. 


To fix this Windows stuck at downloading 0% error:

  • Delete the deployment package.
  • Delete the software update group if exists.
  • Download once again the update and create a new software update group.
  • Create a new deployment package and distribute the content.
  • Refresh the SCCM policy on your SCCM clients.
  • Wait a few minutes and confirm if the Windows Update is installed.

Read More


Create Private Network Bridge on Proxmox VE 6 with NAT

This article covers how to create a Private Network Bridge on Proxmox. 

To do this:

1. Enable paket forwarding in /etc/sysctl.conf on the Proxmox host

2. Edit /etc/network/interfaces on the ProxMox host, to get 10.10.10.0/24 for your containers, that route through eth0 of the ProxMox host

Code:
# network interface settings; autogenerated# Please do NOT modify this file directly, unless you know what
# you're doing.
#
# If you want to manage parts of the network configuration manually,
# please utilize the 'source' or 'source-directory' directives to do
# so.
# PVE will preserve these directives, but will NOT read its network
# configuration from sourced files, so do not attempt to move any of
# the PVE managed interfaces into external files!
auto lo
iface lo inet loopback
auto eth0
iface eth0 inet static
address YOUR-PUBLIC-STATIC-IP/YOUR-PUBLIC-MASK
gateway YOUR-STATIC-GATEWAY
auto vmbr1
iface vmbr1 inet static
address 10.10.10.1
netmask 255.255.255.0
bridge_ports none
bridge_stp off
bridge_fd 0
post-up iptables -t nat -A POSTROUTING -s '10.10.10.0/24' -o eth0 -j MASQUERADE
post-down iptables -t nat -D POSTROUTING -s '10.10.10.0/24' -o eth0 -j MASQUERADE


3. Configure a container inside 10.10.10.0/24 - as an example using 10.10.10.2 .

Read More


Install NRDP From Source - On different Linux Distribution

This article covers how to install NRDP from the source. NRDP is a simple, PHP-based passive result collector for use with Nagios. It is designed to be a flexible data transport mechanism and processor, with a simple and powerful architecture that allows for it to be easily extended and customized to fit individual users' needs.

Read More


Let's Encrypt with Cloudflare - How to Configure ?

This article covers how to set up Let's Encrypt and Cloudflare Universal SSL for end-to-end encryption. Basically, Improper configuration settings while using Let's Encrypt, could cause connection errors.

Cloudflare will act as the CDN while Let's Encrypt performs the SSL (HTTPS) encryption (in lieu of Cloudflare's Universal SSL).


Let's Encrypt is great, but it's not really a comparison with Cloudflare, you can use them both. I use Lets Encrypt on my server with Cloudflare. What we suggest is that you should first get Lets Encrypt installed on your domain and make sure it works.



To add lets encrypt to Cloudflare:

1. Set up the domain.

2. Verify the Let's Encrypt certificate has been issued.

3. Sign up for Cloudflare.

4. Update nameservers and verify.

Read More


Install Nagios NCPA on Linux and Windows - Step by Step Process ?

This article covers how to Install Nagios NCPA on Linux and Windows. Basically, NCPA simplifies monitoring configurations and maintenance by allowing Nagios to monitor servers using the same agent regardless of platform. NCPA is intended to simplify and universalize agent-based monitoring

across different operating systems.


To monitor Windows Machines you will need to follow several steps and they are:

  • Install NSClient++ addon on the Windows Machine.
  • Configure Nagios Server for monitoring Windows Machine.
  • Add new host and service definitions for Windows machine monitoring.
  • Restart the Nagios Service.


Why do we need Nagios?

Here, are the important reasons to use Nagios monitoring tool: 

  • Detects all types of network or server issues. 
  • Helps you to find the root cause of the problem which allows you to get the permanent solution to the problem. 
  • Active monitoring of your entire infrastructure and business processes.

Read More


SQL Server Error 19471: Create failed for Availability Group Listener

This article covers methods to fix SQL Server Error 19471. Basically,  "SQL Server Error 19471" can happen while configuring Always On Availability Group again on the database server.


To fix SQL Server Error 19471:

  • Create a Client Access Point (CAP) for the AOAG listener in Failover Cluster Manager.
  • Bring CAP Online.
  • Repair the CAP, if it is not coming ONLINE.
  • Once CAP comes online, remove it from failover cluster manager.
  • Add listener to AOAG in SSMS.

Read More


CDPUserSvc has stopped working – Fix it Now ?

This article covers different methods to fix CDPUserSvc has stopped working error. Basically, The function of the service as its description suggests is to make the connection with Bluetooth devices easier.

You can fix CDPUserSvc has Stopped Working in Windows 10 by isolating the process too.


1. Type cmd Cortana text field and from the suggestion, put a right-click on Command Prompt.

From the options that pop-up, click "Run as administrator".

2. Run the following command:

sc config cdpusersvc type=own

With this command, Windows will isolate this module forcibly. We know that isolation of any process is a default activity for that service.

As a result, Microsoft will find another correct way to run CDPuserSvc service in another mode by default.

Read More


MySQLdump: Got error: 1044 when selecting the database - Fix it Now ?

This article covers methods to resolve MySQLdump: Got error: 1044 when selecting the database. 

When this error happens, you will get an error message such as this:

mysqldump: Got error: 1044: Access denied for user ‘root’@’localhost’ to database ‘information_schema’ when using LOCK TABLES


To fix this MySQLdump error: 

1. You can pass the –single-transaction option to mysqldump command:

$ mysqldump --single-transaction -u user -p DBNAME > backup.sql

2. Also, you can simply grant LOCK TABLES to your user:

$ mysql -u root -p

And type:

mysql> GRANT SELECT,LOCK TABLES ON DBNAME.* TO 'username'@'localhost';

Read More


WMI Monitoring With Nagios - How to do it ?

This article covers how to monitor Windows machines with Nagios XI using WMI.

Basically, to set up WMI monitoring with Nagios, we need to configure A WMI User Account On The Windows Machine and then set up the WMI permissions. Windows Management Instrumentation (WMI) is a technology that allows for agentless monitoring of Windows servers and workstations.


Benefits of WMI Monitoring With Nagios:

  • Increased server, services, and application availability.
  • Fast detection of server and operating system failures.
  • Fast detection of service and application failures.
  • Agentless monitoring.

Read More


Install WMI Client in Nagios XI Server for Windows monitoring

This article covers how to perform the installation of the WMI Client in Nagios. Nagios provides complete monitoring of Windows operating systems via WMI – including operating system metrics, service state, process state, file system usage, and more. 

Windows Management Instrumentation (WMI) is a technology that allows for agentless monitoring of Windows servers and workstations.

Agentless technologies like WMI and SNMP allow IT administrator to deploy monitoring solutions without having to install agent software on each monitored system.

Read More


Configure inbound checks with Nagios – How to do it ?

This article covers how to easily configure inbound checks using both these APIs. Basically, there are two APIs available to handle inbound check transfers in Nagios XI:

  • NRDP - This api works on port 80 (HTTP) or 443 (HTTPS).
  • NSCA - This api works on TCP port 5667.


This will guide Nagios Administrators that needs to configure inbound checks.

Read More


Configure outbound checks in Nagios - How to do it ?

This article covers how to effectively Configure outbound checks with Nagios. Outbound checks are used in federated and distributed monitoring environments, as well as environments where the monitoring server sends passive check results to external applications. 


What is a distributed monitoring in Nagios ?

This is a method of scaling Nagios Xi and Nagios Core to monitor a lot of devices / machines - sometimes across different networks. Large organizations often want distributed monitoring, as do MSPs. Nagios Fusion's central dashboard can be ideal for distributed monitoring solutions. Both Nagios XI and Nagios Core can be configured for distributed monitoring.


What is a server ?

This is a dedicated computer system that generally runs databases, websites, etc. Servers are not used by people on a regular basis (as compared to workstations), but are rather used to run batch jobs, applications, and services.


What is passive check in Nagios ?

This is a check that is performed by an external application, operating system, or device and is submitted to Nagios Core or Nagios XI for processing.

Some monitoring agents - including NSCA, NCPA, and NRDP can be used to send passive checks to Nagios.

An SNMP trap is also considered a passive check.

Read More


Install Python 3.9 on Debian 10 - Step by Step Process ?

This article covers Python installation on Debian Linux System. Basically, Python is a programming and scripting language developed under open source license, making it freely usable and distributable, even for commercial use. 

Python 3.9 is the latest major release of the Python language. It includes many new features such as new dict operators, new str functions, support for IANA time zone, and more.


After Python 3.9 installation on your Linux System, you can verify it easily by running the command:

python3.9 --version

The output should show the Python version installed.

Read More


MySQLdump: got error :1049 :unknown database - Fix it Now ?

This article covers the best method to fix the MySQL database error, "MySQLdump: got error :1049 :unknown database".

Generally, this error happens while performing cPanel backups and it simply indicates that the database does not exist in MySQL.


How to fix mysqldump unknown database when selecting the database?

In cases where this error occurs when you specify the password on the command line with -p flag and there is a space between -p and password.

For example, if you want to dump the database named wpdb using the user "root" and password "your-password".

Fix this error, by specifying the password with no space after -p switch as shown below:

mysqldump -u root -pyour-password wpdb > wpdb_backup.sql

Read More


Install Joomla in CloudPanel - Step by Step Process ?

This article covers how to Install Joomla in CloudPanel control Panel. Basically, Joomla  is a free and open-source content management system for publishing web content on websites.


Step by Step how to setup Joomla 3.9 with CloudPanel:

1. Login via SSH to the server e.g. with john-ssh and go to the users tmp directory:

$ cd ~/tmp

2. Download and extract the latest Joomla 3.9 version.

$ mkdir ~/tmp/joomla-3.9 && curl -sL https://downloads.joomla.org/cms/joomla3/3-9-25/Joomla_3-9-25-Stable-Full_Package.tar.gz | tar xfz - -C ~/tmp/joomla-3.9/

3. Move files to the htdocs directory of the domain:

$ cp -R joomla-3.9/* /home/cloudpanel/htdocs/www.domain.com/

4. Reset permissions.

$ cd /home/cloudpanel/htdocs/
$ clpctl system:permissions:reset www.domain.com 775

5. Clean up the tmp directory.

rm -rf ~/tmp/*

6. Open your domain in the browser and go through the installation wizard.

7. Done! Joomla 3.9 is now installed.

Read More


Install Proxmox VE 6 on Debian Buster (Debian 10) - Step by Step Process ?

This article covers the installation of Proxmox VE 6 server on Debian 10 (Buster) Linux system. Please note that you need a 64-bit processor with support for the Intel 64 or AMD64 CPU extensions.

Visit Proxmox Documentation website  for advanced configurations and to master Proxmox VE Administration.


To Access Proxmox VE web interface:

1. Connect to the Proxmox VE admin web interface on (https://youripaddress:8006).

2. Select "PAM Authentication" and authenticate with server's root user password.

3. And add your first network interface to it.

Read More


Install the Acronis BackUp Plugin on cPanel - Step by Step Process ?

This article covers method to install the Acronis BackUp Plugin on cPanel.


To install the Acronis Backup plugin for WHM and cPanel, run the following command:

sh <(curl -L https://download.acronis.com/ci/cpanel/stable/install_acronis_cpanel.sh || wget -O -https://download.acronis.com/ci/cpanel/stable/install_acronis_cpanel.sh)

This command runs the installation script.


How to Install the backup agent ?

To back up the Virtuozzo container, the backup agent must be installed on its host as described in the Installing the backup agent on Virtuozzo host section.

1.Log into WHM UI.

2.Click Plugins> AcronisBackup.

3. Specify the credentials of the account to which the machine should be assigned. Make sure that you specify the credentials of an account created within the customer group (Customer administrator, Unit administrator, or User). Do not specify partner administrator credentials.

4. Follow the installation wizard. During the installation, the software checks if the ports required for communication with the cloud are open. 

If some of the ports are closed, the software shows numbers of these ports and the hostnames for which a port should be open. 

Open the ports, close the wizard, and restart the installation. 

Completing the installation may take several minutes. You can leave the page during this process. 

The backup agent can also be installed by using the command line.


To uninstall the Acronis Backup plugin for WHM and cPanel, run the following command:

$ yum remove acronis-backup-cpanel

Removing the extension will also uninstall the backup agent from the cPanel server.

The backup accounts you created and the backed-up data will be left intact.

Read More


Dnsmasq DHCP Server in Proxmox – How to use for VMs IP ?

This article covers methods to install, configure and resolve matters relating to Dnsmasq DHCP Server in Proxmox. When creating the VM we just need to specify the MAC address for specific IP and than just use DHCP to get the assigned IP.


To Install the DHCP server, run the command:

$ apt install isc-dhcp-server

Read More


Apache Error: "semget: No space left on device" - Fix it Now ?

This article covers methods to resolve Apache Error: "semget: No space left on device". This error indicates that apache failed and will not start again, so check the error log If you see an error similar to the following, it could indicate that your server has run out of semaphores and apache cannot be started:

[emerg] (12)Cannot allocate memory: mod_fcgid: Create process manager error
[error] (28)No space left on device: Cannot create SSLMutex Configuration Failed


To solve this problem you can restart Apache, Postgres and other services that consumer many IPC resources or increase limit of the resources in the system using 'sysctl'. When you stop all services the semaphores and shared memory segments have to be removed, if not, and you still able to see them using 'ipcs' command, try to remove them manually using 'ipcrm' command. 

1. For example to remove semaphore:

# ipcs -a

2. If this is a common problem for you, you may want to increase the semaphore limits on your VPS server. You can do that by adding the following to the /etc/sysctl.conf file:

# Increases the semaphore limits & extend Apache's uptime.

kernel.msgmni = 512
kernel.sem = 250 128000 32 512

3. Then load the new settings into the kernel:

sysctl -p

Read More


Exclude Files from Backups in cPanel - How to do it ?

This article covers how to set up both global and local exclude files. Basically, we would require to exclude certain files from backups in cPanel either for security purposes or to reduce the size of the backup file. 

When backing up large accounts, it can be desirable to skip certain large directories or exclude files for security reasons. Whatever the reason, cPanel offers two methods for excluding files from the standard backup process.


To exclude files or directories from your user backups, perform either of the following actions:

  • Exclude the files from all user's backups.
  • Exclude the files from an individual user's backups.


For one cPanel user

Users or administrators can modify the user-level exclude file. /home/username/cpbackup-exclude.conf excludes files from a specific user's home directory.

$ nano /home/username/cpbackup-exclude.conf

# add new entries here

example/
dir/example.php

Read More


Exclude Files from Backups in DirectAdmin - How to do it ?

This article covers how to Exclude Files from Backups in DirectAdmin. 


User ability to skip paths from their tar.gz backup files in DirectAdmin.

i. New optional file:

/home/username/.backup_exclude_paths

where User can add paths to this file that they wish to have skipped from their backup.

The format of the file must be relative to /home/user and should not include a "/home/user" prefix.

2. New default internal directadmin.conf setting:

allow_backup_exclude_path=1

can be disabled by setting it to 0 and restarting DA.

A sample line in the .backup_exclude_paths would look like:

domains/domain.com/awstats

so that the path:

/home/username/domains/domain.com/awstats

is skipped from the backup.

This will add:

--exclude-from=/home/username/.backup_exclude_paths

Just after the -C /home/username option in the creation of BOTH the home.tar.gz and the user's backup tar.gz.

So using the feature will truly exclude the path, regardless of if it's in /home/user/domains, or /home/user/*.

As you may have noticed, the option uses tar's exclude-file option.

This supports patterns, eg:

*.gz

So you have skip those types of files, regardless of what path they're under.

Read More


Monitoring Linux Using NCPA

This article covers how to go about setting up monitoring in Linux using NCPA. You will learn how to configure NCPA to monitor Linux.

NCPA is a cross-platform monitoring agent for Nagios Core and Nagios XI that runs on Windows, Linux/Unix, and Mac OS/X machines. Its features include both active and passive checks, remote management, and a local monitoring interface.


In Nagios XI wizards can be used to to perform configuration of hosts and services through the Web UI. Wizards take the complicated matter of creating hosts and services, defining configuration parameters, assigning contacts, contact groups, hostgroups, servicegroups, etc, into a easy steps form in the Nagios XI UI. 

Wizards can also be easily added to Nagios XI through the Admin -> Manage Wizards menu to expand the capabilities of Nagios XI.

Read More


Active Directory Temporary Group Membership on Windows Server 2016

This article covers how to implement  Active Directory Temporary Group Membership on Windows Server 2016. Temporary Group Membership is a new feature that appeared in Windows Server 2016 and is a part of the Privileged Access Management (PAM) functionality.


By default, PAM is not active and the first thing you need to do is turn it on. You can do this with the PowerShell cmdlet Enable-ADOptionalFeature. For example, to enable PAM in domain contoso.com, run the following command with domain administrator privileges:

Enable-ADOptionalFeature -Identity ″Privileged Access Management Feature″ -Scope ForestOrConfigurationSet -Target ″contoso.com″

Read More


WHM Internal server error 500 - Fix it Now ?

This article covers different ways to troubleshoot and resolve WHM / cPanel Internal server error 500.

Basically, the "Internal server error 500" message happens while accessing WHM panel or cPanel and one of the cPanel process failing to load or still running in the background.


Other causes of 500 Internal Server Error in WHM?

  • Incorrect permissions settings, usually due to having a file as "world" writeable.
  • Incorrect permissions settings for use by another script (this is common with manual installs of forums or blogs).
  • Incorrect coding in the .htaccess file.

Read More


Managing Snapshots and Maintenance in Nagios Log Server

This article covers how to manage Snapshots and Maintenance in Nagios Log Server. Here, You will learn method to create and manage backups and Repositories and how to manage your Nagios Log Server Maintenance.

Read More


Import Config Files From Nagios Core into Nagios XI

This article covers method to Import Config Files From Nagios Core into Nagios XI.

Importing configuration files automates setting up your existing Hosts, Services, Hostgroups, Servicegroups, and Host/Service Templates in your Nagios XI installation.


To Import Configuration Files Into Nagios XI:

1. In CCM expand Tools and select Config File Management. 

2. Click the Write Configs button to create / update the config files on the Nagios XI server. 

3. You can see in the screenshot to the right that the host and service config files were created and the existing hostgroups and commands config files were updated.

Read More


Sending ESXi logs to Nagios log server - How to set it up ?

This article covers how to go about Sending ESXi logs to Nagios log server. 

To Send ESXi Logs To Nagios Log Server:

1. Login to Nagios Log Server and navigate to Configure > Global (All Instances) > Global Config. 

2. Click the + Add Input button and select Custom. 

3. A new block will appear at the bottom of the list of Inputs. 

4. Type a unique name for the input which will be Syslog (ESXi).

Read More


Nagios – Monitor hosts using SSH: How to use the plugin ?

This article covers how to monitor Nagios using SSH. 

In order to monitor Linux hosts using the Nagios check_by_ssh plugin, there are a few prerequisites that must be met:

  • Create a Nagios user for monitoring on the host to be monitored.
  • Configure passwordless SSH authentication as nagios user on host to monitor.
  • Install Nagios plugins on the host to monitor.


To Create a Nagios user:

Login to the host to monitor and create a user called nagios and set the login password.

useradd -m nagios
passwd nagios

Read More


Remove Instance From Nagios Log Server Cluster

This article covers method to remove an instance from a Nagios Log Server cluster. Removing an instance from a Nagios Log Server cluster is as simple as updating the cluster_hosts configuration file and restarting the Elasticsearch database service on each node.

You can easily isolate an instance from the cluster for testing purposes. The instance that you want to isolate simply has it's own IP address in the cluster_hosts configuration file and none of the other instances. This means you will have two clusters that exist with the same cluster ID but they do not talk to each other. You

don't need to physically isolate this instance from the other instances on your network, the configuration file dictates who participates in the cluster.


To An Instance From A Nagios Log Server Cluster:

  • Open the Nagios Log Server web interface and navigate to Admin > System > Instance Status. 
  • In the Instances table click the trashcan icon to delete the removed instance. 
  • This completes the steps required to remove an instance from a Nagios Log Server cluster.

Read More


Configure Windows Firewall Rule using Group Policy

This article covers methods to Configure Windows Firewall Rule using Group Policy. Most of the procedures in this guide instruct you to use Group Policy settings for Windows Firewall with Advanced Security.


To open a GPO to Windows Firewall with Advanced Security:

1. Open the Group Policy Management console.

2. In the navigation pane, expand Forest: YourForestName, expand Domains, expand YourDomainName, expand Group Policy Objects, right-click the GPO you want to modify, and then click Edit.

3. In the navigation pane of the Group Policy Management Editor, navigate to Computer Configuration > Policies > Windows Settings > Security Settings > Windows Firewall with Advanced Security > Windows Firewall with Advanced Security - LDAP://cn={GUID},cn=

Read More


Restart Linux Services With NCPA in Nagios - How to do it Now ?

This article covers how to go about Restarting Linux Services With NCPA. In the configuration section you'll find that you will need to restart the services each time configuration changes are made. You can also view the services in the windows services administration panel, but you can also do it easily from the command line. This is an example for CentOS.


NCPA is an advanced, cross-platform agent that can be installed on Windows / Linux / AIX / Mac OS X machines. Target Audience. This document is intended for use by both Nagios administrators and users who wish to use NCPA. Installing NCPA.


How do I know if Nagios is installed?

Easiest way to check the Nagios Core version is using the Nagios GUI.

# /usr/local/nagios/bin/nagios –help

Read More


Munin plugin fails to install due to missing dependencies - Fix it Now ?

This article covers methods to resolve Munin installation error.

A quick fix to this error is to run the following commands as root should allow the installation of Munin to complete:

yum-complete-transaction --cleanup-only
yum install pango cairo pixman
/scripts/check_cpanel_rpms --targets munin

Read More


Package conflict errors with ea-nginx on CloudLinux - Fix it Now ?

This article covers how to resolve Package conflict errors with ea-nginx on CloudLinux. Basically, Cloudlinux servers with ea-nginx, yum or cPanel updates tend to fall with this error. 


On Cloudlinux servers where already packages for ModSecurity2 are installed (ea-modsec-sdbm-util & ea-apache24-mod_security2), trying to install ea-nginx or run a yum update/cPanel update fails because as a part of ea-nginx dependencies, some of ModSecurity3 packages (ea-modsec30 & ea-modsec30-connector-nginx) will also be attempted to be installed, and that causes a conflict between the packages belonging to ModSecuirty2 and Modsecurity3, which in turn causes yum and UPCP to fail. 


To resolve systems that are currently experiencing this error, update EA packages to the beta branch:

$ yum update ea-* --enablerepo=cl-ea4-testing

 

To install ea-nginx on affected systems using the beta repository, install it with the following command:

$ yum install ea-nginx --enablerepo=cl-ea4-testing

Read More


PHPMyAdmin import database timeout - Fix it Now ?

This article covers methods to fix PHPMyAdmin import database timeout error. This error happens because of a huge file and the restoration process fails with timeout.


To resolve this error, 

1. Login to the server over SSH.

2. Create the file config.inc.php.

For Plesk Onyx and Plesk Obsidian below 18.0.30:

# cp -p /usr/local/psa/admin/htdocs/domains/databases/phpMyAdmin/libraries/config.default.php /usr/local/psa/admin/htdocs/domains/databases/phpMyAdmin/config.inc.php

For Plesk Obsidian 18.0.30 and above:

# cp -p /usr/local/psa/phpMyAdmin/libraries/config.default.php /usr/local/psa/phpMyAdmin/config.inc.php

3. Increase the value of $cfg['ExecTimeLimit'] in config.inc.php created on step 2:

$cfg['ExecTimeLimit'] = 3600;

4. Increase the settings in /etc/sw-cp-server/config to avoid '504 Gateway Timeout' error:

fastcgi_read_timeout 3600;
fastcgi_send_timeout 3600;

5. Restart sw-cp-server:

$ service sw-cp-server restart

Read More


Error – Cannot find a valid baseurl for repo: base - Fix it Now ?

This article covers methods to resolve Error – Cannot find a valid baseurl for repo: base. 

To get rid of these error messages and make it possible to update OP5 Monitor you need to change your Centos Base repos in /etc/yum.repos.d/CentOS-Base.repo as follows:

#mirrorlist=http://mirrorlist.centos.org/?release=$releasever&arch=$basearch&repo=os&infra=$infra
baseurl=http://vault.centos.org/centos/$releasever/os/$basearch/

Comment out all mirrorlist lines, remove the comment from baseurl and change it to "vault.centos.org". 

This way yum will stop complaining and you will be able to use the OP5 repos.

Read More


Modify the Default SSH Port on any Linux Distribution - Step by Step Process ?

This article covers how to change the default SSH port on your Linux machine.

To change the default port the SSHD daemon is listening on.

We can edit the configuration file using a nano editor:

$ sudo nano /etc/ssh/sshd_config

Once you make a change to the SSHD daemon configuration file, you should restart the services to reload the new changes.

$ sudo service sshd restart

Read More


Docker error "bind: address already in use" - Fix it Now ?

This article covers the best method to resolve Docker error "bind: address already in use".

Sometimes, when trying to start your docker instance, it's possible to be stunted by another process using the same port. 

Also, this docker error can happen when for any reason your host reboots. 

In this instance, try restarting your apache server. 

Stopping apache2 service in the host can solve it:

$ sudo /etc/init.d/apache2 restart 

If nginx is running globally this could be the reason too. 

Run the command:

$ sudo nginx -s stop

Read More


Database import hangs in Plesk - Fix it Now ?

This article covers methods to resolve Database importing hangs in Plesk with error reading communication packets. Generally, the database import task in Plesk fails due to non-optimized client databases.

The solution to this Plesk error is to simply optimize the databases.

Read More


Configure Windows Firewall Rules with PowerShell

This article covers method to Configure Windows Firewall Rules with PowerShell. The New-NetFirewallRule cmdlet creates an inbound or outbound firewall rule and adds the rule to the target computer.

Some parameters are used to specify the conditions that must be matched for the rule to apply, such as the LocalAddress and RemoteAddress parameters. Other parameters specify the way that the connection should be secured, like the Authentication and Encryption parameters. Rules that already exist can be managed with the Get-NetFirewallRule and Set-NetFirewallRule cmdlets.

Filter objects, such as NetFirewallAddressFilter or NetFirewallApplicationFilter, are created with each firewall rule. The filter objects and rules are always one-to-one and are managed automatically.


To enable all three network profiles. Domain, Public and Private, use this command:

Set-NetFirewallProfile -All -Enabled True

Or set the specific profile instead All:

Set-NetFirewallProfile -Profile Public -Enabled True

To disable the firewall for all three network location, use the command:

Set-NetFirewallProfile -All -Enabled False

Read More


The RPC server is unavailable – Fix it Now ?

This article covers methods to resolve RPC server error. To prevent the problem from reoccurring, check your firewall settings to see whether RPC data traffic is being blocked. If you use a third-party firewall, check the appropriate settings. If you use the Windows firewall, open the Control Panel and search for 'Windows Firewall". In the "Remote" tab, under "Remote Assistance", all of the boxes should be checked.


How to fix the RPC server error ?

Fortunately, the error can be resolved easily and quickly. You just need to restart the service.

  • From the Start menu (Windows symbol) open the Control Panel.
  • Select "Administrative Tools" and then "Services". Alternatively, you can enter "Services" in the search bar.
  • Find "DCOM Server Process Launcher" in the list and double-click to open it.
  • You are now in the configuration menu for the RPC server. Ideally, the "Startup type" should be set to "Automatic" and the "Service status" should show "Running". If this is not the case, set the "Startup type" to "Automatic" and click the "Start" button under "Service status". Click "OK" to confirm.
  • Now close any programs you have running and restart your computer.

Read More


Install Wazuh Server on Ubuntu 20.04 - Step by Step Process ?

This article covers how to go about to install Wazuh Server on Ubuntu 20.04. Wazuh is a free and open source solution for security monitoring.

It monitors hosts at an application and operating system levels and offers  threat detection, incident response, integrity monitoring, and compliance. 


To restart Kibana, Elasticsearch and Wazuh-manager with the below commands:

$ sudo systemctl restart kibana
$ sudo systemctl restart elasticsearch
$ sudo systemctl restart wazuh-manager

Read More


Configure filters in Nagios log server - Do it Now ?

This article covers method to customize Nagios Log Server Filters. Basically, to configure filters in Nagios log server, one needs to be familiar with the Filter Configuration options available within the log server.

Filters can be applied to messages before they are sent to Elasticsearch for indexing. They perform actions such as breaking apart messages into fields for easy searching, adding geo location information, resolving IP to DNS names and dropping messages you do not want indexed.

Read More


Adding Additional Instances To Nagios Log Server Cluster

This article covers method to add instances to Nagios Log Server Cluster. You will need to have an existing Nagios Log Server cluster before following the steps in this guide. An existing cluster is one or more instances of Nagios Log server.

Read More


Manage Clusters In Nagios Log Server - Fix it Now ?

This article covers how to manage and identify key information on your Nagios Log. Nagios Log Server is a clustered application, it consists of one or more instances of Nagios Log Server. An instance is an installation of Nagios Log Server, it participates in the cluster and acts as a location for the received log data to reside. The log data is spread across the instances using the Elasticsearch database, a special database used by Nagios Log Server.

Read More


Pluggable.php File Errors in WordPress – Fix it Now ?

This article covers methods to fix Pluggable.php File Errors in WordPress. Basically, this WordPress error triggers when we add a code snippet on our site or activate a new plugin.

This means that Pluggable.php file errors takes place as a result of a poorly coded theme or plugin. It could also be a result of code errors in your WP files. 


The first option when troubleshooting the Warning: cannot modify header information pluggable.php error is to manually edit the faulty file. You are already supplied with the necessary information to locate the problem in the error message (remember, it's the first file in the message). 

All you need to do is open up this file, either through an FTP client like FileZilla, or through File Manager.

Make sure to pay special attention to the starting and ending PHP tags. 

There should not be spaces before or after the <?php tag, as well as the ?> tag. 

Also, the last line of code should not be followed with a blank line or extra space.

Read More


cPanel reported error number 1 when it ended - Fix it Now ?

This article covers methods to resolve cPanel reported error number 1 when it ended. This error makes cPanel copy action on an account from another server to fail.

The error means that the destination server isn't able to login into the source server to fetch files .


To fix this error, do the following:

1) Recheck your username and password used along with the IP too.

2) Firewall, the source firewall is blocking your destination server IP. 

You would need to login into the WHM of the source server and goto "ConfigServer Security & Firewall".

Retry you transfer and it should be working.

Read More


Import Nagios Log Server Into Microsoft Hyper-V - How to Do it?

This article covers how to easily Import Nagios Log Server Into Microsoft Hyper-V. Basically, to Import Nagios Log Server Into Microsoft Hyper-V we need to follow a series of steps outlined in this guide. 

Read More


cPanel Error Iproute Conflicts With Kernel - Fix it Now ?

This article covers method to fix cPanel Error Iproute Conflicts With Kernel. Basically, this error happens when we have an outdated kernel on the server. 


Instead of deleting conflicting kernels, you can also add the iproute package to the excludes of yum in /etc/yum.conf file, then the iproute package won't be marked for the update.

It can be useful when you need to perform an update but can't reboot the server at the given moment. 

It can be excluded manually using a preferred text editor or using the following command:

$ sed -i 's/exclude=/exclude=iproute /' /etc/yum.conf

The change can be reverted using this command:

$ sed -i 's/exclude=iproute /exclude=/' /etc/yum.conf

Read More


Configure SSL / TLS in Nagios Log Server - How to do it ?

This article covers how to configure SSL/TLS in Nagios Log Server. SSL/TLS provides security between the end user's web browser and Nagios Log

Server by encrypting the traffic. This guide is intended for use by Nagios Log Server Administrators who require encrypted connections to their Nagios Log Server.

Read More


cPanel error networkmanager is installed and running

This article covers how to resolve the error, NetworkManager is installed and running. Basically, this error happens if cPanel does not support NetworkManager-enabled systems.


To fix this error, simply run the commands below and then restart the installation of cPANEL:

$ systemctl stop NetworkManager.service
$ systemctl disable NetworkManager.service

Read More


Managing Instances In Nagios Log Server

This article covers Instances in Nagios Log Server and how we can manage them. 

Nagios Log Server is a clustered application, it consists of one or more instances of Nagios Log Server. An

instance is an installation of Nagios Log Server, it participates in the cluster and acts as a location for the

received log data to reside. The log data is spread across the instances using the Elasticsearch database, a

special database used by Nagios Log Server.

Read More


Install Wazuh Server on CentOS 7 - Step by Step Process ?

This article covers the installation procedure of Wazuh Server on CentOS Linux System. Basically, Wazuh is a free, open-source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance. 


You can use Wazuh for the following applications:

  • Security analysis
  • Log analysis
  • Vulnerability detection
  • Container security
  • Cloud security


To Install Java on CentOS 8.

1. Run the command below to install JDK:

$ sudo dnf install java-11-openjdk-devel

2. Confirm that you have it installed

$ java -version

Read More


Alerting On Log Events With Nagios Log Server

This article covers Alerting On Log Events With Nagios Log Server. Basically, for alerting on Log Events with Nagios Log Server one needs to be familiar with the options available.

With this guide, you will learn how to create various alerts in Nagios Log Server, such as sending

them to a Nagios XI or Nagios Core monitoring server using Nagios Remote Data Processor

(NRDP), sending an email, sending SNMP traps and executing scripts.

Read More


Install Ajenti Control Panel on Debian 10 / Debian 9 - Step by Step Process ?

This article covers how to install Ajenti Control Panel on Debian system. Basically, Ajenti is a simple tool to manage your websites, Firewall, DNS, Cron, Logs, Files, Mail hosting services and so on.

Read More


Analyzing Logs With Nagios Log Server

This article covers how to analyze  logs with Nagios Log Server.  Basically, in order to analyze logs with Nagios Log Server one needs to be familiar with the options in the Dashboards menu. This guide is very essential to Nagios Log Server administrators and users looking for information on querying, filtering and drilling down the data in Nagios Log Server.

You can audit your IT infrastructure, maintain historical records of usage of IT infrastructure, create reports, and analyze logs using the Nagios Log Server.

Read More


Hardening Windows Using Microsoft Security Baseline

This article covers Hardening Windows Using Microsoft Security Baseline.

Every organization faces security threats. However, the types of security threats that are of most concern to one organization can be completely different from another organization. For example, an e-commerce company may focus on protecting its Internet-facing web apps, while a hospital may focus on protecting confidential patient information.

The one thing that all organizations have in common is a need to keep their apps and devices secure. These devices must be compliant with the security standards (or security baselines) defined by the organization.

A security baseline is a group of Microsoft-recommended configuration settings that explains their security impact. These settings are based on feedback from Microsoft security engineering teams, product groups, partners, and customers.


How can you use security baselines?

You can use security baselines to:

1. Ensure that user and device configuration settings are compliant with the baseline.

2. Set configuration settings. For example, you can use Group Policy, Microsoft Endpoint Configuration Manager, or Microsoft Intune to configure a device with the setting values specified in the baseline.

Read More


Access denied to VNC Server - How to fix this error ?

This article covers methods to fix the error, Access denied to VNC Server. Basically, this error occurs while trying to connect to a VNC server using a cloud connection. This message means that your RealVNC account has been signed out of VNC Viewer.

This will happen if you have recently changed the password for your RealVNC account, for example.


To resolve this VNC connection issue, click Sign in again and enter your RealVNC account credentials.

Once you see a green tick/check mark in the top right next to your name, try connecting to the VNC Server again.

Read More


Install Docker CE on AlmaLinux 8 - Step by Step Process ?

This article covers the process of installing Docker CE on AlmaLinux. Docker is a popular virtualization platform for running applications in Containers.

It allows us to build and communicate containers with one on another.


To install Docker CE on AlmaLinux 8:

1. Add official Docker CE repository on your AlmaLinux 8, so that we can install it without downloading its packages manually.

$ sudo dnf config-manager --add-repo=https://download.docker.com/linux/centos/docker-ce.repo

2. To let the system recognize the added Docker repository and the packages available in the same, run the system update that will force AlmaLinux to rebuild the system repo cache.

$ sudo dnf update

3. You can check the added repo including others of your system using the command.

$ sudo dnf repolist -v

4. Run the Command to Install Docker CE Engine.

$ sudo dnf install docker-ce docker-ce-cli containerd.io

5. Once the installation is completed, start the Docker service on your AlmaLinux and also enable it to run automatically with system boot.

$ sudo systemctl enable docker
$ sudo systemctl start docker

6. Check the Status of the Service to know it is working properly.

$ systemctl status docker

Read More


SNMP Trap Hardening in Nagios - How it Works ?

This article covers how to go about SNMP Trap Hardening in Nagios.


When using the vi editor:

1. To make changes press i on the keyboard first to enter insert mode

2. Press Esc to exit insert mode

3. When you have finished, save the changes in vi by typing :wq and press Enter

 

How to Send Test Trap ?

When working through this documentation you may want to test the changes by sending a test trap. The following KB article provides examples on how to send a test trap, which can be very helpful:


How To Send A SNMP Test Trap ?

When a test trap is received on the Nagios XI server it should be logged in the /var/log/snmptt/snmpttunknown.log file.

The default SNMP Trap configuration is stored in the /etc/snmp/snmptrapd.conf file and contains just two lines:

disableAuthorization yes
traphandle default /usr/sbin/snmptthandler

Read More


NRPE Command Plugin Not Defined - How to fix it ?

This article covers methods to resolve 'NRPE Command Plugin Not Defined' for our customers.

This error is very straight forward. Usually this is caused by a mismatch between the command name declared in Nagios XI to be check through NRPE and the actual command name of the command directive in the remote host's nrpe.cfg file.

This problem will occur in versions of check_nrpe before v3. 

What is happening here is that the initial -c check_users is being overwritten by the -a -w 5 -c 10, as check_nrpe thinks the -c 10 argument is the command argument, not one of the -a arguments.

Read More


SNMP Trap v3 Configuration in Nagios - How to get it done ?

This article covers How to configure SNMP Trap v3 on the Nagios XI server.

The main difference between v2 and v3 traps is the authentication mechanisms. v2 is much simpler by design whereas v3 has multiple layers of authentication to strengthen it. Probably the biggest difference is that the SNMP Trap Daemon (snmptrapd) is configured by default to accept v2 traps from any device regardless of what SNMP community is provided. 

However snmptrapd cannot be configured to accept traps v3 from any device, it must be configured before it can receive an SNMP v3 trap.


The default SNMP Trap configuration is stored in the /etc/snmp/snmptrapd.conf file and contains just two lines:

disableAuthorization yes
traphandle default /usr/sbin/snmptthandler

 

The disableAuthorization directive allows SNMP v2 traps from any device to be sent to Nagios XI. 

Even if this line exists the Nagios XI server will not be able to receive SNMP v3 traps unless the server has been specifically configured for SNMP v3 traps.

Read More


Install PHP 8 on CentOS 7 / CentOS 8 - Step by Step Process ?

This article covers how to install PHP 8.0 on CentOS 8/7 and RHEL 8/7.

PHP is the most used scripting language for web development, both websites and web applications.

This guide will show you how to install PHP 8.0 on CentOS 8 | CentOS 7. 

Please note the GA release is fit for running in Production if the application already supports it.


To install any additional PHP package use command syntax:

$ sudo yum install php-xxx

To Check PHP version:

$ php --version

Read More


Install PHP 8 on Ubuntu 20.04 or 18.04 - Step by Step Process ?

This article covers steps to install PHP 8 on Ubuntu. PHP is arguably one of the most widely used server-side programming languages. It's the language of choice when developing dynamic and responsive websites. Basically, popular CM platforms such as WordPress, Drupal, and Magento are based on PHP.


To Install PHP as Apache Module

Run the commands:

$ sudo apt update
$ sudo apt install php8.0 libapache2-mod-php8.0

Once the packages are installed, restart Apache for the PHP module to get loaded:

$ sudo systemctl restart apache2


To Configure Apache with PHP-FPM

Php-FPM is a FastCGI process manager for PHP. 

1. Run the following command to install the necessary packages:

$ sudo apt update
$ sudo apt install php8.0-fpm libapache2-mod-fcgid

2. By default PHP-FPM is not enabled in Apache. 

To enable it, run:

$ sudo a2enmod proxy_fcgi setenvif
$ sudo a2enconf php8.0-fpm

3. To activate the changes, restart Apache:

$ systemctl restart apache2 


To install PHP 8.0 with Nginx

Nginx doesn't have built-in support for processing PHP files. We'll use PHP-FPM ("fastCGI process manager") to handle the PHP files.

Run the following commands to install PHP and PHP FPM packages:

$ sudo apt update
$ sudo apt install php8.0-fpm

Once the installation is completed, the FPM service will start automatically. 

To check the status of the service, run

$ systemctl status php8.0-fpm

Do not forget to restart the Nginx service so that the new configuration takes effect:

$ sudo systemctl restart nginx

Read More


Configure RDS User Profile Disks on Windows

This article covers method to configure and use User Profile Disks on a server with Remote Desktop Services role running on Windows Server 2012 / 2012 R2 / 2016.

In a single RDS collection, there can exist only one VHDX profile file for one user. If a user connects to the resources from two different collections, a separate profile disk should be created for each of them.

Also note that the UPD drive is bound to the RDS server Windows OS version. You can’t transfer (use) an UPD user profile from an RDS server from one version of Windows Server to another.


To Setup & Enable RDS User Profile Disks:

1. Create a shared network location for the disks.

2. Launch SERVER MANAGER.

3. Expand REMOTE DESKTOP SERVICES > COLLECTIONS.

4. Click on your Collection.

5. Click TASKS > EDIT PROPERTIES (top right corner).

6. Click USER PROFILE DISKS (bottom of the menu on the left).

7. Click ENABLE USER PROFILE DISKS.

8. Set the location to what you created in step 1

i.e. \\YourServerNameHere\UserProfileDisks$

9. Set the maximum size of those disks.

10. Scroll down and set what you want to have stored on those VHD's.


How to Resize User Profile Disks Using PowerShell ?

You can extend the virtual vhdx drive with the user's UPD profile using the PowerShell cmdlet Resize-VirtualDisk from the Hyper-V module:

Net use U: \\rdvh1\DemoLabOficeApps
Resize-VHD -Path u:\UVHD-<SID>.vhdx -SizeBytes 40GB
Net use U: /delete

If you want to run the Resize-VHD cmdlet from a desktop with Windows 10, you must install the feature Hyper-V -> Hyper-V Platform -> Hyper-V Services.

Read More


Send test SNMP trap in Nagios - How does this work ?

This article covers how to send a trap to Nagios server to test SNMP Trap functionality.

Basically, when troubleshooting an SNMP Trap issue, it can be very helpful to remove the actual device that could be causing problems and use the snmptrap command instead.

So in this guide, you will learn all the methods of sending a trap to your Nagios server to test SNMP Trap functionality.


SNMP Trap Definition

The following trap definition can be placed in /etc/snmp/snmptt.conf which will allow the test traps sent above to be passed through to Nagios:

EVENT netSnmpExampleHeartbeatRate .1.3.6.1.4.1.8072.2.3.0.1 "netSnmpExampleHeartbeatRate" Normal
FORMAT SNMP netSnmpExampleHeartbeatRate
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "" "netSnmpExampleHeartbeatRate"


The default SNMP Trap configuration is stored in the /etc/snmp/snmptrapd.conf file and contains just two lines:

disableAuthorization yes
traphandle default /usr/sbin/snmptthandler

Read More


SMTP error no route to host - Fix it Now ?

This article covers methods to resolve SMTP error no route to host.

This error happens when the port is blocked at the hosting end or ISP.

In this guide we have outlined different methods to fix this SMTP error.

Read More


Install PHP 8 on Debian 10 / Debian 9 - Step by Step Process ?

This article covers how to install PHP 8 on any Linux distribution.


To install Apache with PHP 8 module:

$ sudo apt install apache2 libapache2-mod-php8.0 

After successful installation, restart Apache service to reload newly installed modules:

$ sudo systemctl restart apache2 


To check loaded PHP modules use the command:

$ php -m

Read More