question_id
int64
1
1.16M
title
stringlengths
10
191
question_body
stringlengths
6
2k
answer_body
stringlengths
0
2.5k
tags
stringclasses
73 values
question_score
int64
-15
1.65k
answer_score
int64
0
2.91k
view_count
int64
4
1.24M
creation_date
stringdate
2008-08-01 18:45:00
2025-06-19 04:44:02
category
stringclasses
12 values
source_site
stringclasses
8 values
914,627
Using UFW to completely block internet provider
I am facing a DDOS attack from a few hundred IP addresses, all of them coming from various cities in India and have the same organization: "................ for GPRS Service". (I'm not mentioning the whole name). The attack started around 5 hours ago and it consists on hundreds of IP addresses that open 1 to 5 connecti...
Finally, I have found a way to mitigate (and finally solve) the problem: After some investigation I found out that the attack was directed to my web server's IP address and not to a single website. Since that IP address was actually responding with the default apache page, I have replaced that page with a PHP 302 redir...
-1
1
885
2018-05-31T15:21:55.327
infrastructure
serverfault.com
654,649
Replacing a failed drive - RAID 1
I have a Dell PowerEdge r310, MS Server 2008, RAID 1 setup. I had a two drives fail in the RAID 1 - leaving only one drive in a healthy state. Picture of disk management: I changed the primary boot partition to the Windows Server 2008 Secondary Plex option and the server starts and runs fine, but now I need to replace ...
RAID1 usually implies 2 drives in the RAID. From the above picture, it's looking like one of the drives failed, or else you'd have nothing. Try looking at this technet article: http://technet.microsoft.com/en-us/library/cc787481(v=ws.10).aspx#BKMK_7 about working with dynamic disks...
2
2
2,095
2014-12-24T16:59:46.010
infrastructure
serverfault.com
294,340
Please confirm pre and post sql server instance migration steps
I would appreciate some help please. We are migrating a number of VMs with different versions of SQL instances from site A to site B, one instance per VM. Site A and B are in different domains. In Site B, the user ids are going to be different from what they are in Site A, so logins will need to change. I have the foll...
There are many ways to skin a cat. Your checklist looks fairly good but as you can imagine it implicates stress and an enormous amount of job. It also requires a huge downtime during the migration. Have you considered using Always On Distributed Availability Groups : If you go through this pattern your checklist might ...
0
1
144
2021-06-16T04:00:14.840
api_errors
dba.stackexchange.com
21,912
How load gets divide/handled in distributed jmeter testing?
I have 7 requests and 100 thread users in 1 Master and 3 Slave systems. I want to know how load gets handled in slave systems? What is response timeout in JMeter?
As per what I'm understanding is that you have set up below mentioned architecture for JMeter distributed testing, 1 Master: Controlling 3 Slaves. You have set up number of threads to 100 in the Thread Group. In your Thread Group you have 7 HTTP Requests. So now if you run your test with Remote Start All option, the Ma...
3
4
1,830
2016-08-05T04:23:59.923
data_quality
sqa.stackexchange.com
225,317
How to rebuild/restart kerberos server on Mac 10.6.5 Server
I had DNS trouble which was causing delays for Open Directory users logging in from the GUI on their macs. I've fixed the DNS problems and the delay still remains. Is there a way to restart, or start/stop, the Open Directory service (or just the Kerberos part) without restarting the server? Thanks!!
You need to check status of your OD using changeip command. [CODE] If it reports any problem, backup your OD using Server Admin and follow the result from the command above
2
2
7,447
2011-01-21T20:13:31.880
infrastructure
serverfault.com
960,798
Simple client / server with nc not working
Why is the following not working? I have a freshly installed Debian 9 system. [CODE] is wide-open: [CODE] I log in on two separate consoles (well, two separate ssh logins). In one of them, I run: [CODE] Then, I go to the other console, and run: [CODE] and I get a Connection refused error: [CODE] I also tried [CODE] , t...
There are actually four (or more?) distinct programs called [CODE] (netcat) which are forks or rewrites of the same basic program from long ago and far away. The default in Debian seems to be what it calls [CODE] , the ancient original version. I was able to reproduce this problem with netcat-traditional; listening see...
2
3
12,274
2019-03-31T00:41:31.140
api_errors
serverfault.com
409,385
Best way to store Session token on mobile App
Background Building a mobile App for product X which is currently hosted as a SaaS solution. The product X does not support OAuth currently, implements basic authentication and generates Session token after authentication. Product X also implements SSO supporting native SAML 2.0. Use Case Mobile App also implements SSO...
Store them as Shared preference . Those are by default private, and other apps cannot access them. On a rooted devices, if the user explicitly allows access to some app that is trying to read them, the app might be able to use them, but you cannot protect against that. As for encryption, you have to either require the ...
0
1
1,810
2020-04-28T06:10:23.257
api_errors
softwareengineering.stackexchange.com
678,575
SSH key authentication not working
I've a server running Ubuntu 10.04 (as a VM) to which I can't connect using ssh key authentication without being asked for the password. I've read a lot before posting but I really don't know what I'm missing. My .ssh folder in the server has 700 for permissions and the authorized keys file has 600 for permissions. The...
StrictModes checks the home directory permissions not just the .ssh directory. As the man pages say: This is normally desirable because novices sometimes accidentally leave their directory or files world-writable. [CODE] Says it has a problem with the home directory permissions.
2
4
357
2015-03-26T20:54:02.767
api_errors
serverfault.com
43,666
JDBC read-only connection pools on Glassfish
Is it possible to create a read-only connection pool in Glassfish, talking to MySql, so that no updates are allowed? I want to have people use a replicated MySql database and I want to make sure no one tries to do updates.
Just give select only privileges to the user your app server connects as, so mysql will enforce that you can only select from the database, not update or delete anything. You'd want to run something like this sql statement for that user, [CODE]
0
2
882
2009-07-21T17:51:13.630
database_errors
serverfault.com
449,825
Asking for Credentials, when requesting shared folders on the server, regularly for domain users?
In our network, single domain controller, when some users (members of the domain) request shared folders on the server they are required to enter their credentials, the server is Windows Server 2008 R2, even checking to remember my credentials doesn't work, sometimes it shows this message: "The system has detected a po...
well I solved it, the DNS of the clients was not set to the IP of the server, when I changed the IP of the DNS server in the client configuration the problem has gone.
2
1
10,602
2012-11-18T08:25:17.787
infrastructure
serverfault.com
237,138
SQLServerLogMgr::LogWriter: Operating system error 1117
We have an ongoing issue with our production sql server (physical) where we randomly receive this error in the log which puts the database into a recovery state [CODE] The issue always occurs on our drive storing the transaction logs. The database normally recovers on its own, but few instances it does not and we need ...
That being said, how should the sql server dba handle this error aside from reporting it to the storage team and checking for database corruption? There really isn't anything you can do from the database side. SQL Server is a victim of the underlying hardware and virtualization (if any) having issues. The underlying is...
3
6
6,519
2019-05-01T15:18:16.127
database_errors
dba.stackexchange.com
65,102
How to automate SSH session for a specific user from a specific IP?
I have two machines: Host1 and Host2 that are connected to the public internet but they are also connected through a private LAN (so both hosts have a public IP and a private IP). - Host1 : 192.168.0.1 - Host2 : 192.168.0.2 I need to automate an SSH session from Host1 to Host2 (i.e. no password prompt). But due to secu...
To answer your followup question, if you create your SSH keypair without a password, then you would not need to enter the password to connect the servers. You would add the pubkey in .authorized_keys according to this paragraph: Key Access Limits As an optional step to limit usage of the public key for access to any se...
1
2
2,152
2009-09-14T11:33:53.710
api_errors
serverfault.com
147,746
CSV file generation using Java
We have a requirement in our project to generate a big CSV file every 2 hours using a Java program. This file will have around 60,000 lines (around 120 characters per line). I am not sure about the size yet. I would like to know if I would run into any memory issues because I will open the file using FileWriter and the...
No, you shouldn't. The point of a file is to store things outside random access memory; the FileWriter's size is constant, and likely to be pretty small, all things considered, even if it's a buffered FileWriter. The constant rewriting might cause I/O load or CPU spikes, but almost certainly not memory shortage.
8
14
8,446
2012-05-08T13:34:12.157
api_errors
softwareengineering.stackexchange.com
125,571
Migrate users from one Active Directory domain to another?
I work for a company that hosts desktops for a number of different companies. At the moment, all the clients access a single domain controller called HOSTING. Under that are groups for each company. Each of the hosting servers exist on the same network and so are therefore potentially browseable by other terminal serve...
ADMT is good for migrating accounts to a new forest for sure. But...should you really build a dedicated AD forest for each customer? That could get difficult rather quickly. If your business is such that you only have a handful of customers it probably isn't a big deal. But if you have many customers and if you hope to...
3
2
7,563
2010-03-24T01:46:52.460
infrastructure
serverfault.com
202,270
Hadoop Rolling Small files
I am running Hadoop on a project and need a suggestion. Generally by default Hadoop has a "block size" of around 64mb.. There is also a suggestion to not use many/small files.. I am currently having very very very small files being put into HDFS due to the application design of flume.. The problem is, that Hadoop There...
Media6degrees has come up with a fairy good solution to combine small files in Hadoop. You can use their jar straight out. http://www.jointhegrid.com/hadoop_filecrush/index.jsp
1
1
950
2010-11-16T03:03:56.857
hadoop_errors
serverfault.com
675,563
How should my SPF record be set up, or is it even necessary?
I have a domain (fiestyturtles.com) registered at namecheap.com, and hosted at a shared webhost (hostpc.com). But I've moved the email handling of my domain to google apps, I think I set this up by changing the MX records at the domain setup at my webhost to modify the records, there. It's recently come to my attention...
Just add the [CODE] statement that Google is recommending: [CODE] Do not create multiple SPF records.
3
7
540
2015-03-14T20:54:52.117
infrastructure
serverfault.com
626,260
DFS slowly and using a lot write speed on sender member
I am transferring 400gb of multiple files trough 2 server whit 10gb connection inside one VLAN. When I had 2 servers that were not in production the transfer was very quick using 100% of 1gb connection. But now I am transferring one production server whit hard disc 100% Active Time(24hrs) because the dfs is using alot ...
The hard disk on your production server cannot read and write information from several random places at the same time. It have more than one head, but the number of simultaneous IO operations is limited. Because of this, if your server is writing lots of data, the read speed will be impacted. This penalty would be negl...
1
1
316
2014-09-04T13:34:55.870
database_errors
serverfault.com
424,894
Cronjob script won't pass in mysql password
I have a script called /etc/cron.daily/99loganalyzer_expire, which is as so: [CODE] When it runs overnight, I get an email saying it failed: [CODE] ...however, when I run it as root from the console, it works: [CODE] How can I pass in the credentials for this mysql user so they will work in a cronjob?
Putting login credentials into a command line like this is risky, as anyone who can view the process list could view those credentials. A better option is to put those credentials into an option file such as ~/.my.cnf and then reference that file in your command. [CODE] Make sure to chmod the permissions to 0600 on tha...
1
3
2,635
2012-09-06T10:56:18.603
database_errors
serverfault.com
613,999
Can't create Build Controller on other server for TFS
I'm currently working on creating a test environment on my local machine using some virtual servers: TWITCH: This server contains the real TFS Server BUILDSERVER: This server should contain the Build Agent to be used by TFS SANDBOX: This server will be my Sandbox environment INTEGRATION: This server will be my Integrat...
This is well explained at Managing Team Foundation Server in a Workgroup (can't find where this doc has moved in the newer version). The general idea is that you need shadow accounts, so in your case you must create a BUILDSERVER\BuildServer account with the same password as TWITCH\BuildServer, and use the BUILDSERVER\...
1
0
642
2014-07-20T17:10:58.853
infrastructure
serverfault.com
1,046,254
Failed To Authenticate To NPS Server
I am running an NPS Server on my Windows Server 2019 of my network. I use it to authenticate into my Cisco C9300 switches as an administrator to work on them. Recently I am unable to login as it says I am not authenticated. Here is a copy of the NPS log I get when I try to SSH into the switch. [CODE] NPS Server is conf...
After doing some testing I found the issue. I moved the NPS from a Domain Controller to a Member Server. Do to rights assignments I was unable to log into the switch with my Domain Controller credentials because they are not allowed on be logged onto the Member Server the NPS was running on. I am still able to set any ...
0
0
1,766
2020-12-15T12:20:14.230
api_errors
serverfault.com
727,827
Apache 2.4 unusual logs
since some days, i am getting some tries of hack attacks, but actually all seems fine. but i saw some log i could not explain: [CODE] here is my log configuration: [CODE] how is it possible to thoose requests to reach 127.0.0.1 ? what can i do to prevent 408 errors ? should i panic to see thoose kind of attaks incommin...
This is how i get ride of this : I added this configuration after all defined virtual host, to catch "else" request (the request that doesn't match any other virtual host). The most important is the virtual position(last) and the command [CODE] [CODE]
1
0
1,965
2015-10-09T09:31:41.403
infrastructure
serverfault.com
883,453
How can I configure two different OpenLDAP olcLimits based on user?
When runing an [CODE] from the command line using an anonymous bind, I'd like to allow a user/application to have unlimited results returned as long as paging is used.. For the [CODE] user, I'd like to allow unlimited results. I'm using the LDIF file below, but it's not quite right. [CODE] is working OK, returning all ...
I've run into this problem again after upgrading the server and finally figured out how to get it working. Posting it in case anyone else runs across the same problem. [CODE]
1
1
1,460
2017-11-14T21:49:53.707
api_errors
serverfault.com
247,382
PHP scripts randomly becoming really slow to respond - Database lockup?
I wasn't sure whether to post this here or on stackoverflow, so apologies if its in the wrong place. I have about 7 php scripts running on a centOS VPS. Each of these scripts contacts a game server and processes the logs, with the logs it either does some database queries or sends info back to the game server. I am hav...
A few things you can try: Check the system and application logs for any relevant messages. Sometimes there are issues/timeouts that will get logged there. This includes the MySQL slow query log that DerfK mentioned. Some sort of monitoring system on the server would be nice to have. This would tell you for sure if ther...
2
3
3,660
2011-03-14T22:32:35.303
database_errors
serverfault.com
779,450
phpMyAdmin on CentOS 7 with NGINX returns blank page
I have installed CentOS 7 in Virtual Machine with NGINX. PHP, MariaDB and everything else is installed and working fine. However, when I access the http://localhost/phpMyAdmin it shows blank page. Anyone knows why? My nginx.conf is as follows: [CODE] ERROR LOG [CODE]
I think the session folder is not writable by the web service try to change permission [CODE]
0
3
4,870
2016-05-27T15:26:08.257
database_errors
serverfault.com
490,594
Redirect local traffic to proxy port with iptables
I have a Ubuntu 12.04 host that has a squid proxy on it running on port 8080. I want to proxy all the web traffic from the host through squid using iptables. Is the correct method: [CODE] This is not working. When I browse to a page it appears normally, even when the proxy is disabled. Any suggestions appreciated.
tl;dr Your command is very close. You need to remove the [CODE] fragment and ensure you run your proxy process as a different user and exclude that user from the filter with [CODE] so the proxy doesn't have its traffic redirected to itself. More detail I found that most of the suggestions for configuring [CODE] for tra...
2
5
23,044
2013-03-22T19:17:07.267
infrastructure
serverfault.com
100,660
After installing Apache, PHP and MySQL I can't add extension to php.ini without Apache error
I have Windows XP OS. Installed Apache 2.2.14, then PHP 5.2.12 (tested with phpinfo.php -> IT'S WORKS!) Then I installed MySQL 5.1. And now, when I add [CODE] to php.ini and restart server, Apache tells me that he can't start (small window with "The requested operation has failed"). Even if I add only [CODE] ---> the s...
Is your php extension directory set in php.ini and pointed to the right place? Is your dll in the stated extensions directory? http://php.net/manual/en/install.windows.extensions.php
1
1
3,751
2010-01-06T01:50:48.033
database_errors
serverfault.com
233,406
Index partitioned table to prevent Postgres from doing a sequential scan
I have a Postgres database with a partitioned table that will contain ~2,000,000,000 entries. I have defined a partitioned database based on the first letter of the "identifier" - this is split into 37 sub-tables, [0-9, a-z, default (catchall for everything else)]. The database is very simple and straight forward, and ...
Try adding the partition key explicitly (redundantly!). Like: [CODE] This should allow Postgres to understand it can prune all other partitions from the query. Can be derived from [CODE] of course: [CODE] You'll still see a sequential scan on the one partition, unless you create an index like you had in mind: [CODE] Th...
4
4
3,305
2019-03-28T15:57:15.143
warehouse_errors
dba.stackexchange.com
508,343
Solaris 10 zlogin logs in, logs out immediately
On a SPARC v445 running Solaris 10 9/10, had to rebuild rpool and reattached the three existing mirrored zpools on the other existing disks, with their zfs filesystems and NG zones intact. The zones have been configured with [CODE] etc. ... and are now online using [CODE] then simply booting after being in installed st...
There has AFAIK never been a [CODE] distributed with Solaris. It's possible someone installed one at some point. There is one here for example. There must be an entry in [CODE] that mentions it. To get things working until you decide if you want to install it, you should be able to comment it out from the global zone t...
0
1
629
2013-05-16T15:38:19.127
infrastructure
serverfault.com
1,004,078
memcache container: Error starting userland proxy: listen tcp 0.0.0.0:11211: bind: address already in use
I am having problems setting up memcached on my docker. I get an error when I run: docker run --name=memcache -p 11211:11211 -d memcached memcached -m 128 This is the error that comes after running the command above [CODE] In the end it says the port chosen is taken already. So to confirm that memcached doesn't listen ...
You appear to be running an instance of memcached outside of a container on the same port. You'll need to either stop that outside instance, or pick a different port to publish n the host. For stopping the outside instance, that depends on how you've been starting it, perhaps it's in systemd. You can work from the proc...
0
0
2,347
2020-02-21T14:07:23.120
pipeline_ops
serverfault.com
192,298
VMWare fusion NAT + host tunnel; access from vm
I'm having trouble accessing a port on my OSX host from a vm. I'm using NAT in VMware fusion. In my (OSX host) hosts file, I have the ip address for vmnet8 mapped to 'mac'. From my vm, I can 'ssh user@mac' and it works as expected: I am logged into the host. So, my hosts file is working. I have a tunnel from my OSX hos...
Okay, I got things working the way I want - I think. 10.0.0.1 is mapped to 'mac' in /etc/hosts [CODE] Not a networking expert, obviously, so I couldn't say exactly why this works and my first attempt didn't. Anyway, it allows me to refer to the host os as 'mac' from my VMs, and in addition allows me to access any ssh t...
1
1
871
2010-10-18T22:53:38.387
database_errors
serverfault.com
416,753
Kill process, then uninstall application--Can I do this with PowerShell, over 400 computers, from a txt file?
I'm fairly new to PowerShell, but I'm very much trying to figure it out. Here's the sum up of what I want to do: 400 computers, with no more than 5 at a physical location, connected by fairly poor speeds across VPN All have a single application with a single version (but on Windows XP and Windows 7) that needs to be re...
While this is technically possible, there's probably a better way to go about it. And speaking of better ways to go about it, You could do this in a GPO with a few lines of code as a startup or shutdown script, which is how I handle this. With a few more lines of code you could log the results of checking for the prese...
1
1
1,838
2012-08-12T18:17:56.407
pipeline_ops
serverfault.com
328,924
IBM DB2 v11.5 on RHEL8 - recovering BLOB table
first of all, thanks to all the gurus.. The problem is: A table that accepts pdf/jpeg/png file upload from frontend. The table with BLOB defined as below: [CODE] The table got too large and we perform the following steps to recover spaces by archiving old data. rename table A1 create new table A2 export old data based ...
You should be familiar with rules of exporting LOB data described in the LOB export considerations topic. When exporting tables with large object (LOB) columns, the default action is to export a maximum of 32 KB per LOB value and to place it in the same file as the rest of the column data. If you are exporting LOB valu...
0
1
67
2023-07-04T13:18:26.430
data_quality
dba.stackexchange.com
163,441
IIS 7.5 running Classic ASP connecting to UNC path problem
Moving from Windows Server 2003 to Windows Server 2008 R2. We have a classic ASP site that connect to a remote UNC '\10.1.40.7\' path. When I run PROCMON on the web server, it says ACCESS DENIED....Impersonating: NT AUTHORITY\IUSR. On the 10.1.40.7 server, the IUSR_COMPUTER account was setup with the same password on b...
Seems the above solution is working fine. Too bad no one else was able to chime in, I would like to know if this is the best solution. Anyway, here is a recap. Under the Default web Site, click Authentication, then for 'Anonymous Authentication', right click, Edit. Changed Specific User to my newly created IUSR_MACHINE...
0
0
5,845
2010-07-23T15:04:32.710
api_errors
serverfault.com
229,511
How to list permissions on a schema?
In SSMS, if you follow the path [Database] > Security > Schemas and view any schema properties, you have a tab "permissions" that list all the permissions that every user have on that specific schema. I would like to make a query that gives me the same output than that tab. I tried using sys.database_principals, databa...
Using the accepted answer from List schema permissions , this would probably give you what you want. [CODE] [CODE]
5
8
36,557
2019-02-12T14:31:10.270
warehouse_errors
dba.stackexchange.com
620,184
Bind9 DNS resolves full domain to localhost
I have set up a Bind9 DNS server on my development VM which is running Debian Wheezy. My addresses resolve from my host machine (Win7) to my dev VM, and I can ping from there. Internally on the VM, I can ping my names (www, share, my_name, etc.) and it resolves to the correct ip (11.11.11.11). But when I ping my full F...
if you have www setup as your machine hostname in your hosts file (/etc/hosts), it will resolve there first from the local machine (hosts is checked before the resolvers you have setup). Check your hosts file...
1
1
3,809
2014-08-13T15:39:51.210
infrastructure
serverfault.com
26,458
linux: directory created with Access: (0000/d---------)
On a Linux (ubuntu) machine, an automated script running as a normal user is creating a subdirectory under its home directory. For some reason, the directory is created with [CODE] . umask is 0022. This obviously means the script can't create any files in that directory. Can anyone think of anything? Apparently this on...
What is the umask of that users login session set to? Also you can always chmod the directory after you create it. "man chmod" for details.
2
1
507
2009-06-16T11:51:31.250
infrastructure
serverfault.com
211,283
Why isn't my Scheduled Task running a batch script?
OS: Windows 2003 Server Setup: The batch file basically uses 7zip to zip up a few files into a location ready for uploading into an offsite location via FTP. I have run the batch file as myself and it has worked perfectly. It takes about two hours to zip the files. I have applied full permissions on the relevant folder...
I wonder if you aren't running into the problem of CMD.EXE not being readable by non-Administrator users when not running as "INTERACTIVE" (or "BATCH" or "SERVICE"). This is a a new default in Windows Server 2003. Take a look at this Microsoft KB article for some details.
1
2
7,724
2010-12-10T13:31:55.653
infrastructure
serverfault.com
311,513
Safety of magic setters in PHP
I don't know how in else languages, but in PHP seems to me that they are very unsafe way how to set value of any member variable - because one setter cannot easily validate input for many variables (mostly if they are of various types) Most examples of magic setters say only [CODE] There is not any validation. And it i...
The use case for magic setters is different than when data has constraints. Typically magic setters are used for Data Transfer Objects. PDO is one such case where the results of a database query can be returned as objects rather than associative arrays. Internally, these PDO objects are using magic setters and getters....
1
1
890
2016-03-01T17:21:38.257
data_quality
softwareengineering.stackexchange.com
148,111
Can user variables be assigned of BIT datatype?
Based on the documentation : User variables can be assigned a value from a limited set of data types: integer, decimal, floating-point, binary or nonbinary string, or NULL value. As you see, user variables aren't supported [CODE] datatype. Right? Ok, I have this code: [CODE] Note: [CODE] column is [CODE] . You know, my...
[CODE] is just the number [CODE] represented in a different way. Similarly for the column [CODE] and the variable [CODE] .
0
2
38
2016-08-28T00:50:57.817
data_quality
dba.stackexchange.com
804,100
cassandra unable to create thrift socket
I do not know why i am not able to enable thrift protocol on cassandra. in [CODE] [CODE] [CODE] . OS centos 7 iptables not running firewalld not running cassandra ver 3.7 (datastax repo) up and running. [CODE] JAN installed JMX enabled etc.. everything in cassandra configuration is ok, except swap file needed due to la...
It seems that there is a conflict with [CODE] when switched to [CODE] i ve got first a null point exception and then retried few second later it started thrift.
1
2
1,533
2016-09-19T22:43:00.980
database_errors
serverfault.com
111,673
Is it advisable to asynchronously update the summary table every time a transaction is deleted?
Given three tables: (a) Product (b) Transaction Head (c) Transaction Detail We need to create a query that fetches a list of products with associated latest ordered quantity and latest transaction date. We also have a web page where the transaction can be created, edited and deleted. The problem lies in the query perfo...
1M/year is 2 per minute. You can do a lot of updating in 30 seconds. 1M/day (12/second) would be more exciting. Do you need to rerun the summary queries? Can't you just do a subtract via an [CODE] ? Possibly fast enough to be synchronous. How often do you need to post a correction? If it is rare, consider adding a row ...
0
0
280
2015-08-20T09:58:21.937
warehouse_errors
dba.stackexchange.com
314,194
Why does Windows command prompt stalls until a key is pressed when executing long batch files or programs
I've just had two occurrences of windows 7 stalling an execution until I hit enter on the command prompt/powershell. Afterward execution seems to continue as expected. First was an batch file of copy commands like [CODE] One file seemed to be taking ages. I checked the folder and it was complete, hit enter and suddenly...
edit the settings on the command shell that you've opened up its been set to quick edit mode which you don't want in this case.
18
16
17,077
2011-09-22T02:39:49.010
data_quality
serverfault.com
173,123
TSQL Stored Procedure rollback without any warning/error?
This is more of a curiosity, but I noticed a strange behavior today. Note - there are no explicitly defined transactions in this code. I have a stored procedure that takes in a user defined table type variable and a string containing another table name. [CODE] I then key off the table name to delete from a particular t...
It was the timeout - thanks for the help guys. I should have known better.
1
2
292
2017-05-09T18:26:21.220
database_errors
dba.stackexchange.com
746,194
Is it possible to use Kerberos over TLS through sssd?
Background I am trying to log in (via SSH, to an Amazon Linux EC2 instance running [CODE] ) as users that I've created in my AWS Directory Services Simple AD. I am authenticating with Kerberos and identifying the user with LDAP (all through [CODE] .) I connect to the Simple AD through an ELB over several proxy servers....
What you want to achieve with RFC 6251 is not possible with MIT Kerberos as there are no plans to implement this scheme. However, since MIT Kerberos 1.13 there is support for proxying Kerberos over HTTPS by supporting the same protocol that Microsoft's Active Directory does support, MS-KKDCP. The client side for MS-KKD...
7
2
1,580
2015-12-31T18:55:09.537
pipeline_ops
serverfault.com
304,414
How to make nagios not class hosts that are down as an unhandled problem?
I monitor desktops during work hours. Some desktops do not get turned only once or twice a week. I have disabled host notifications for those, but active checks still fail and "host down" still shows up as an unhandled problem in nagios/multisite. How to make host down to not be a problem? Also I want active checks to ...
I dont think, that desktop pcs should be monitored by Nagios, but maybe Allow host down while under nagios watch can help you.
2
2
2,895
2011-08-24T08:45:03.530
infrastructure
serverfault.com
812,125
AWS EC2 - OpenVPN - VPN OK But No Internet Connection for Clients
I've been on this for days and have tried everything I can search on the web, but nothing still seemed to work. Clients can connect to and receive ping responses from the VPN server, and I don't see any errors in the logs. It's just that clients don't have internet connection. Whenever I comment out [CODE] on [CODE] th...
Since you can fetch the page at [CODE] , which returns the redirect to [CODE] , you have nothing wrong in your configuration. This fact means that the client is able to open a TCP connection to [CODE] , and issue an HTTP request and receive a response. Does this happen on other sites too?
1
1
6,243
2016-10-30T06:00:31.393
infrastructure
serverfault.com
544,419
powershell: How to check if S.M.A.R.T is enabled on remote machines
I was attempting to get disk info of remote machines, including whether or not SMART is enabled on the drive by using the win32_diskdrive class. This is trickier than I thought. While it's easy enough the read the status property I discovered something interesting in the Capabilities property- namely the value denoting...
"When the road before you splits in two, take a third path..." ~ Telaxian Proverb Script This is the script I used to get the SMART data from multiple machines. I've already enabled [CODE] on the devices used in this example. [CODE] That will get you output like: [CODE] Script Notes: In the text file I have one hostnam...
8
5
6,787
2013-10-07T19:06:00.267
infrastructure
serverfault.com
578,869
alias directive with nested location to catch php files - requests for php files giving 404
I have a directory/web app that is located outside of the web root directory of my site. Say the site is here: [CODE] And the external app is located here: [CODE] My question is how can I configure nginx to map/route all requests that are like [CODE] (asterisk being wildcard) to the external location [CODE] ? For examp...
Ah, I figured it out. I needed to change this line [CODE] to [CODE]
0
0
218
2014-02-27T22:11:11.273
infrastructure
serverfault.com
650,095
Why is SCCM 2012 R2 is pushing client to devices without being configured to do so?
As far as I know there are only three ways to install the SCCM client on devices: 1) Client push settings within SCCM 2) Group Policy 3) Standalone installation After enabling GPO to allow auto-enroll of client certificate (duplicate of workstation authentication), the client is being installed on devices throughout my...
I'm responsibly certain that I've figured this out. 4) Very early in the implementation (early October) site-wide client push was enabled. This was before most of the configuration was complete, including SSL. It wasn't enabled for more than a few hours before I backtracked. Apparently in that short span of time, the ....
2
0
433
2014-12-08T21:06:40.713
data_quality
serverfault.com
619,676
Sync keepass database file with cloud storage and multiple users
The scenario is: I've been using my keepass file in my onedrive pro folder on my pc. However, I really need my coworker to have simultaneous access to the file as well. We have a windows 2003 file server that would work fine (as many other users in our office share their keepass files this way) however I really need mi...
I'm going to suggest two possibilities: Schedule a script that runs on your workstation and copies the keepass file from the server to your onedrive every X minutes. Switch to something like LastPass Enterprise or a competitor with built-in support for multiple users to share passwords. Good luck!
-2
2
4,448
2014-08-11T21:07:13.287
infrastructure
serverfault.com
196,428
Query in PostgreSQL with large quantity of squid access requests
Hello people, I'm using a log daemon ( https://github.com/paranormal/blooper ) in Squid Proxy to put access log into PostreSQL and I make a Trigger Function: [CODE] The main function of it is make a table partition by user_name and by month-year of the access, inhering from a master clean table: [CODE] The main problem...
You are representing time in 3 different was. The query is using epoch, while the index is using timestamptz, and the partition constraints are using year and month as two separate fields. So the query can make use of neither the index nor the partition constraints. You should probably change them all to use timestampt...
0
0
194
2018-01-28T02:24:43.663
database_errors
dba.stackexchange.com
406,378
Clean Architecture: are repositories always needed?
I'm trying to apply Clean Architecture to a mobile Android App, but I still have some doubts about how to manage API calls. Currently, the classes are structured like this: View -> ViewModel -> UseCase -> Repository -> DataSource It's all well and good when the API calls are about fetching some data from/sending some d...
I wouldn't. You cannot express an action in this framework as an action. This architecture is about things and is not about actions. Conflating the two is a sure recipe for confusion. If you absolutely must though. The trick is find a way to communicate the Action in terms of Things. I can see two approaches: turn the ...
1
1
583
2020-03-11T01:04:33.473
api_errors
softwareengineering.stackexchange.com
1,135,263
Postfix logging incomplete after changing myhostname
My postfix installation does not log most of the messages after changing [CODE] . The [CODE] is now different from the FQDN (and hostname) of the machine where it used to be the same. After changing this (for other reasons) the logging to syslog stopped working for the delivery and queing part. Only some warnings are l...
I finally found the cause of my problem.... After reading 100's of pages i found out that logging is done by systemd-journald. systemd-journald forwards the logs to (r)syslog. My "problem" was the setting [CODE] which was set at [CODE] . My missing log messages from postfix were of level info. So the whole problem had ...
1
1
135
2023-06-30T08:08:11.497
infrastructure
serverfault.com
74,845
Need Routing help (tagged/untagged)
I really need some help trying to figure some "basic" routing. My brain is fried from being sick for a week and I'm not thinking clearly. Picture below describes my "setup". I'm trying to accomplish routing a user from their workstation to the Juniper SSG520 and then "OUT" through the internet connection. I can't move ...
I ended up resolving this. The issue was in the tagging. I had tagged the end ports on each side which wasn't required.
1
0
300
2009-10-15T17:23:40.957
infrastructure
serverfault.com
301,079
Best practice for removing old data in postgres table but retaining a copy of removed data
We currently have a table that has approx 20 columns (one of the columns being a timestamptz datatype) in our database server which has 834 million rows. This in terms of size is a big table (approx 250GB (inc indexes etc). I want to find the most efficient and best way of remove the old data that is older than 2 years...
Any solution that [CODE] s a lot of rows from a database table is painful. You will always end up doing something along the lines of [CODE] , which takes a long time, entails a lengthy autovacuum run and leaves the table bloated. The king's way to solve this problem is to use partitioning. Then you run a split-second [...
2
5
3,029
2021-10-13T15:25:26.467
data_quality
dba.stackexchange.com
536,413
Discrepancy in java Garabage Collection between jconsole and log files
I'm having an odd problem: my garbage collection log file (as defined by -Xloggc) will show n number of garbage collections have taken place, but jconsole will show n+6 garbage collections have taken place. I'm using the ConcurrentMarkSweep (aka CMS) metric to measure this. For example, I see 230 examples of "CMS-concu...
Answered this myself not two minutes after posting this. It's a known bug in java 5, 6 and 6u2. I was using 6. The fix is to upgrade java. https://bugs.java.com/bugdatabase/view_bug?bug_id=6581734
0
0
56
2013-09-04T20:38:15.470
infrastructure
serverfault.com
10,567
Query Performance depending on parameter 21seconds vs. > 14hours
I have the following query: [CODE] When I use this specific date I had to cancel the query after 14hours running time, any other date the same query takes normally 21 seconds. I did check the query execution plan independent on what date I use it is the same, the amount of rows impacted by the query is for each day nea...
I don't know about sqlserver but in an Oracle database, I would suggest making a trace of the sql execution, one that includes all waits and events that cause the query to spend time. This shows the exact circumstances where the sql is executing in and that might be very different than those in the environment where yo...
6
2
294
2012-01-12T10:09:50.287
database_errors
dba.stackexchange.com
435,390
Limited connections to Ubuntu 12.04 server
I'm having a weird problem with my server. The server is inside my network, connected to a 3com switch which is connected to the router that handles the internet connection. The main purpose of the server is to host a php application. What's happening is that user 1 to 15 in the private network have no problems connect...
As you might guess this problem was due to the network topology. The network is installed in a school, and it has the weirdest topology I've seen so far. They've got a dedicated broadband internet access managed by a CISCO router. They also have a second internet access (ADLS) managed by the cheapest router you might f...
0
0
278
2012-10-05T17:15:24.880
database_errors
serverfault.com
331,424
Are same IP address with different submask unique?
Possible Duplicate: How does Subnetting Work? In a same block of IPv4 addresses, can there be same IPs with different submasks? For example, can I have this: [CODE] All the 3 addresses above have the same numbers but different subnet mask. Are all the 3 addresses distinct of their own? In other words, 180.70.65.140/25 ...
There are numerous reasons, but the simplest is that this will break any routing, because a host will have no way of knowing that they're going to an address on a different network. So, basically, no. An IP address needs to be unique, regardless of subnet. In other words, if I'm on 192.168.1.1 255.255.0.0 And I try to ...
13
16
28,610
2011-11-16T08:25:17.037
data_quality
serverfault.com
539,701
OpenVPN: TLS error
I am trying to connect a laptop running Linux Mint to a FreeBSD server running OpenVPN with no luck. I keep seeing TLS errors like this in the server log: [CODE] I have tried using TCP instead of UDP, authenticating by password, and various other options, all to no avail. Here is the server config: [CODE] I generated t...
As per @DerfK comment. You need to apply correct [CODE] . Edit your VPN connection in your Network Manager. Go to VPN tab. Click Advanced. Go to TLS Authentication tab Change the Key Direction (at the bottom) to 1
4
4
25,163
2013-09-17T21:33:40.457
infrastructure
serverfault.com
288,528
Identifying the Bottleneck on a Static File Server at 1000 requests/sec
This is something that has plagued me for a very long time and I'm really hoping someone could help me out. I'll keep it short and simple: I have a file server (2x Dual Core Xeon 2.0, 8GB RAM, 132 SCSI HDD) that hosts several thousand small image files, 4-10kb, and getting up to 1000+ requests per second. I've tried Ap...
This does indeed sound like you're saturating your disk's I/O capabilities. A 15K RPM disk can do about 170ish I/O fully random I/O operations a second. When used in a RAID0, RAID1, or RAID10 array this I/O op count is additive based on the number of drives in the array (R5 and R6 introduce another bottleneck so true t...
2
3
563
2011-07-09T01:47:46.603
infrastructure
serverfault.com
420,686
Best way to handle lazy models with mapstruct and spring transnational scope
In a typical Java Spring Web APP: we have the following layers: Model [DB Models] Repositories [where you have queries to DB] Services [Business service where you have the @Transactional annotation] Controllers [Rest endpoints] So for a simple model e.g Car [CODE] ??? : Here is the big dilemma, I use a mapstruct to con...
The first scenario seems a good approach. By default, the method [CODE] should just return the [CODE] object without the [CODE] (as it is set to be fetched lazily). If the controller needs the [CODE] and the [CODE] , an option is to provide an additional method [CODE] . Such a method, will explicitly load and return th...
2
1
5,076
2021-01-05T13:44:34.687
api_errors
softwareengineering.stackexchange.com
295,362
How to avoid deadlocks when generating consecutive ticket numbers?
I have implemented a ticketing system where when you join an event and placed an order depending on the quantity, a n of entries will be generated. Example: you place an order with 10 quantity, a 10 ticket number would be generated. The rule is, ticket number starts at 1 and would increment by 1 every time it is genera...
Now you know why [CODE] is not the right way to emulate a sequence; it's slow and prone to lock contention and race conditions. You'll have to rethink your approach. Firstly, the rule that says "ticket number starts at 1 and would increment by 1 every time it is generated" seems arbitrary. You can just as well uniquely...
1
0
317
2021-07-07T15:18:12.137
database_errors
dba.stackexchange.com
196,818
How to configure postfix + dovecot to copy and forward?
I have configured postfix + dovecot as per this guide , originally published at http://neranjara.org/article/title/How_to_configure_PostFix_and_Dovecot_for_Virtual_Users_with_out_a_Database_ now defunct. I used virtual users option. Everything works great. Now I'd like to configure a specific email address to forward a...
You can use the option recipient_bcc_maps to have mails to some recipients cloned and sent via BCC to another email address.
2
3
9,518
2010-11-01T07:52:06.153
infrastructure
serverfault.com
394,911
Can Windows log CryptoAPI CRL timouts?
I suspect that the process of building the CRL cache may cause latency in some applications. We have several .NET applications that occasionally "act slow" with no CPU or disk access. I suspect that they are hung up on authentication when trying to validate the certificate, since the timeout is almost 20 seconds. As pe...
One way to get more information on this is to enable the CAPI2 eventlog Open Eventvwr -> Application and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational -> Right click Enable Log The information that appears in the event log will assist in determining where the certificate validation process is taking a l...
6
4
4,219
2012-06-02T03:53:02.610
api_errors
serverfault.com
179,826
Round robin vs Demand Parallelism partitioning
This is related to having a common key driver on top of the query with a nested loops, and the parallelism for the rows coming out of driver being either demand type or round robin type. I would have assumed demand partitioning would perform better but I get opposite results. I started the queries within the same try a...
Should I always use round robin instead Only if you find it produces "better" results for your particular workload, or for particular queries within that workload. In general, I would say no. My personal experience is that Demand (D) partitioning tends to have fewer problems than Round Robin (RR). The particular plan y...
8
8
1,695
2017-07-14T04:18:35.363
database_errors
dba.stackexchange.com
324,026
Have I been compromised?
Possible Duplicate: My server's been hacked EMERGENCY Looking thru my logs, I found this: http://paste.u4ik.us/2294 $ (The log files are on that paste). Question is, this guy began using "all requests allowed" which is...? (Explain it please?) and eventually was making requests from "127.0.0.1" which means he's using m...
Don't panic . As a general advice, before reading logs and trying to get some security-related meaning out of them, be sure to have a sufficiently thorough understanding of what it does mean. Otherwise you end up with a heart attack over too many "dangerously looking" log entries. What you see is simply Internet backgr...
-4
1
597
2011-10-23T07:02:38.517
data_quality
serverfault.com
370,044
How can I tell the kernel to free cached memory during memory allocation request instead of the OOM killer terminating the application
I am running Ubuntu 10.04 with the below kernel version Linux ip-10-0-1-119 2.6.32-343-ec2 #45-Ubuntu SMP Tue Feb 14 18:18:17 UTC 2012 x86_64 GNU/Linux The memory status shows that the cache is using the maximum share of the RAM. [CODE] I understand that the OS manages it automatically and keeps the maximum share of RA...
Normally, linux will clear cache for you application. What you can do is exclude your application from OOM killer. OOM killer will not terminate your application then. [CODE] PID should be the PID of your program.
3
8
468
2012-03-15T13:21:45.280
infrastructure
serverfault.com
1,143,696
Spamassassin not adding X-SPAM header
I've spent hours on websites, checked config files etc. But can't find the problem. Debian server, with spamassassin and postfix. Spamassassin is enabled (checked it on command line). In the mail.log, some lines are relay=spamassassin, and it is writting logs when restarting service. Here are my postfix and spamassassi...
You need to ensure that SpamAssassin is running properly by running the following command: [CODE]
0
0
143
2023-09-14T10:49:08.430
infrastructure
serverfault.com
155,524
Can not access DfsrPrivate
I've set up DFS-R between three servers, and so far, it is replicating everything as its supposed to. The problem is, I can not access the [CODE] folder. Where is it located? So far I see the link/shortcut from within my replicated folder. But I get an [CODE] , when trying to open it. I can open and browse the [CODE] w...
You need to be a Domain Admin to override the permissions and view the [CODE] folder (located in the DFS root folder; should be able to pull up [CODE] ). It does contain a [CODE] folder within it, but it should manage the size of that folder automatically. Deleted items are moved to the [CODE] folder until all partners...
2
3
43,855
2010-06-28T12:39:48.900
database_errors
serverfault.com
379,010
How to interpret Dependency Inversion Principle
I am working on trying to understand the SOLID object oriented design principles. I was able to get the "SOL" pretty easily, though "L" required some hand holding because I am bad at definitions. I think I understand the "I" (I might not, which may belie my confusion). But "D" or Dependency Inversion is tripping me up....
I guess you are looking for an example utilizing dependency injection (which is the typical case for using the dependency inversion principle in context of SOLID). For that, you first need two classes which may depend on each other, and where the dependency between them can be resolved by "injecting" objects of the fir...
1
2
874
2018-09-26T01:54:16.190
api_errors
softwareengineering.stackexchange.com
272,474
Anonymous Authentication <anonymousAuthentication> / 403 - Forbidden: Access is denied
I am using windows server 2008 R2 and IIS 7.5 I deployed my app to that server for the first time and I got the following error; 403 - Forbidden: Access is denied. You do not have permission to view this directory or page using the credentials that you supplied. so I make a little search on that and I figured that I sh...
Replace [CODE] in your applicationHost.config with [CODE] You should be able to configure the same from IIS Manager as well using link
1
1
13,859
2011-05-22T15:34:17.117
api_errors
serverfault.com
578,129
How to replace permissions and everything inside with icacls on Windows Server 2012?
Using Windows Server 2012 R2 AND Windows Server 2008 R2. I have a folder called [CODE] and I want to grant access to [CODE] and a user and all files and subdirectories, and remove everthing else. I've tried this command but all the existing permissions remain: Existing permissions are: [CODE] I want to remove all ACLs ...
As mentionned is comments, you also have to use the [CODE] switch to remove inherited permissions. [CODE] only removes explicit permissions. [CODE] To also grant [CODE] : [CODE]
17
18
94,156
2014-02-25T11:04:51.697
infrastructure
serverfault.com
201,342
Simple locking daemon with API for PHP (or just simple API)?
I am looking for a simple locking daemon which listens for clients over TCP and processes locking requests. I need to synchronize parallel PHP processes at MULTIPLE machines. E.g. one machine may say "I lock the 'abcd' identifier from now and until my death", and if the second machine says the same "lock 'abcd'", its r...
Not sure exactly what you're trying to do. Might Amazon's Simple Queue Service be appropriate? http://aws.amazon.com/sqs/ In their explanation of the service, they say: Developers can create an unlimited number of Amazon SQS queues with an unlimited number of messages. A queue can be created in 4 regions – US East (Nor...
1
0
390
2010-11-13T00:16:03.610
infrastructure
serverfault.com
99,403
Incremental and partial drawing of the large graphs
I have the following problem: I'm developing a software for data visualization where I get a graph structure and represent it in 3D space. So far, I've been using force-based algorithms to draw graphs and it worked well, until I got requirement that my software should represent very big number of vertices and edges (fe...
I would do some calculations to actually show that it is infeasible to hold the graph in the memory that you have. As a quick estimate, if you have 25 million vertices and each one contains 12 ints (32 bytes), you are talking about roughly 1 GB of memory. What you are doing should be doable on a typical 4GB desktop. Wh...
4
2
184
2011-08-08T13:59:55.197
bi_errors
softwareengineering.stackexchange.com
196,738
Would there be a reason not to make primary keys unsigned?
I am going through a database creation script created by people with more experience than me, and I noticed that the primary keys were set to signed. So like this, [CODE] instead of like this, [CODE] It seems to me that by setting the primary key to be unsigned one has doubled the possible number of values, am I missin...
Reasons you may be given include: Suspicion that the unsigned type may not be portable, even among other non-portable code and even if no one's contemplating porting Fear that since it deviates from the default it has the potential to distract, while not being strictly necessary, leading potentially to programmers' was...
8
7
4,620
2018-01-31T16:05:49.773
warehouse_errors
dba.stackexchange.com
69,031
Replicating a SQL Server database & Optimization
We got a database of approximately 100-120 GB on a server with 128GB ram, while the db is sitting on an 256 GB SSD drive. The bulk of the database space is spent on the tables below: [CODE] and then statistics like messages, visits, clicks table where we store the raw data (page_content_id, timestamp, page_campaign_id)...
If I were you I'd be looking at AlwaysOn Availability Groups with a synchronous replica. It'll add a couple of milliseconds of latency to the SQL commands when they are run, but it'll give you a second server that's available in the event of a server failure without any loss of data. It requires no shared storage so yo...
3
2
168
2014-06-25T17:01:58.123
database_errors
dba.stackexchange.com
593,823
logwatch on Centos 6.4
My logwatch is configured correctly and is working correctly when I issue manually [CODE] I added it to root's crontab and it is listed correctly when I make [CODE] which gives: [CODE] My scripts work great but logwatch is not working although I added it twice in crontab using a direct call and using the script that is...
I followed @lain's link (thanks @lain), set the MAILTO variable, waited for the report email which let me know that the problem comes from sendmail which is located is under /usr/sbin which is not enabled by default for crontab entries. I just adjusted the PATH and everything is alright
0
0
550
2014-05-08T04:15:01.253
infrastructure
serverfault.com
111,542
Limit Salesforce objects and fields in Tableau Desktop
In connecting Salesforce to Tableau Desktop it brings in every single object as a table. Within each table/object it brings in every single field. The issue is there are many standard objects my org doesn't use. Within each object there are even more fields which we don't need. Is there a way when connecting Salesforce...
When you say your "team," that must mean that you have either Tableau Online (now called Tableau Cloud) or Tableau Server. If you have Tableau Desktop, that came with Tableau Prep. What you need to do is pull it all into Tableau Prep, get rid of all the columns that aren't needed, and output to a published data source ...
0
0
35
2022-06-03T18:21:15.110
bi_errors
datascience.stackexchange.com
994,835
Where do these NTFS permissions actually live? How are they created?
Alrighty, not sure how to word this but: Where do the NTFS permissions themselves get created? For example, I can set "Full Control" or "Read", but where are those programmed at? Here is why I ask: I noticed that when I am in other programs (such as Active Directory) and I click the "Security Tab" on the item it allows...
On Windows NT based operating system, many types of objects have security descriptors applied to them. Here is an incomplete list: [CODE] The [CODE] for each object describes who can do what with the object based on the permissions of the user. How and where these are stored depends on the type of the object. For files...
1
1
1,225
2019-12-09T03:51:12.307
infrastructure
serverfault.com
1,029,075
Why returns apache a http 500 but does not log any errors?
On a 12 year old (web) server is still 1 old (custom) PHP application hosted. We want to shutdown this server and remove it from the rack. Unfortunately we still need the application, is not actively used anymore but needs to be available for archive purposes. The application does not support newer PHP versions than v5...
Maybe Apache doesn't know when to use the php module? I found this apache cwiki [CODE] This how I started the container: [CODE] /tmp/project is world read-, write- and searchable, the first index.php I put in there was executed succesfully when I visited http://localhost:9090/. When I try, like you, to "docker run" wit...
1
0
6,257
2020-08-06T07:30:50.080
pipeline_ops
serverfault.com
936,216
How to Enable IPV6 on Windows Server 2012 R2 (Cloud Google VPS)
I'm new to Cloud Google VPS. Since it's free, I am testing some Windows Server with 2012 R2 OS, but having a problem enabling IPv6 IP Address. Help would be greatly appreciated!
I don't think Google supports IPv6 inside their cloud platform. All references to IPv6 talk about deploying a proxy or load balancer with IPv6 at the edge, but then connecting to resources inside the cloud platform via IPv4.
-3
2
287
2018-10-18T18:51:36.560
infrastructure
serverfault.com
100,573
MongoDB service not working after upgrade to Ubuntu 15.04
I have recently upgraded my Ubuntu from 14.10 to 15.04. All features seems to be working fine except MongoDB. It is not controllable from service as we do normally in Ubuntu. [CODE] or [CODE] I get this error message Failed to restart mongod.service: Unit mongod.service failed to load: No such file or directory. But I ...
Since your error is: [CODE] This is pretty much saying that your startup path is not in the expected location or else the Ubuntu install has led to problems. See: http://docs.mongodb.org/manual/tutorial/manage-mongodb-processes/ EDIT: Updated with link to what appears to be the answer, namely something is wrong with Ub...
2
2
10,256
2015-05-04T18:21:31.457
database_errors
dba.stackexchange.com
1,151,013
Nginx Reverse proxy issue in Azure App Service
I've been struggling for a few weeks now with an issue and I'm not knowledgeable enough to even know if what I'm trying to achieve is possible. FusionAuth forums haven't been very helpful, and neither has Azure support which can't do much outside of App service configuration help. To give a brief explanation of what I ...
After pulling my hair out for 3 weeks I just figured it out. There are two issues at play here. Azure App service TLS/SSL requests never get to the app. They are terminated at the front end. This explains why only the server block listening on 80 was being hit, and not the other server block. https://learn.microsoft.co...
0
0
343
2024-01-06T16:28:57.590
pipeline_ops
serverfault.com
594,618
What are best practices for defense against CryptoLocker type threats in an Active Directory environment?
What are best practices for defense against CryptoLocker type threats in an Active Directory environment? Are there Group Policies that could help? NTFS permissions? Anti-virus software?
The biggest one is backups - well tested, covering everything important, and not directly accessible from client machines, with older backups kept for awhile in case nobody noticed the problem right away. The next is user training - teach people how to tell if an email is suspicious, and what to do when they encounter ...
1
2
198
2014-05-12T19:20:51.277
infrastructure
serverfault.com
959,233
How to inform Google Cloud security that external network traffic is expected?
My platform has a function that sends traffic out, crawls for data and retrieve them back into my platform. Google cloud informed me that they suspect that platform was compromised etc but that was not the case. I also noted the feedback by them - “you can fix the problem by ensuring that your project traffic directed ...
Not totally sure what do you mean by "inform" but this should be fixable creating a good firewall rule. , If you have the port that your app is using and it's public IP, you should be able to whitelist that traffic with the firewall rule. but, also keep in mind that depending on the type of machine you have, the maximu...
0
1
99
2019-03-21T02:50:12.950
infrastructure
serverfault.com
126,154
Escaping a password using mysqldump console
I am running a mysqldump via a bash script and have encountered a problem with a password that contains special characters. [CODE] How do I escape the password?
Even better, don't put the username or password on the command line where it can be seen by anyone who can do [CODE] . Create a control file named something like [CODE] : [CODE] ...where [CODE] is literal (not the name of your server) and [CODE] is... well... your mysql root password. Then invoke like this: [CODE] Pers...
3
5
2,638
2010-03-25T11:09:57.413
database_errors
serverfault.com
159,096
Return magic value, throw exception or return false on failure?
I sometimes end up having to write a method or property for a class library for which it is not exceptional to have no real answer, but a failure. Something cannot be determined, is not available, not found, not currently possible or there is no more data available. I think there are three possible solutions for such a...
I don't think that your examples are really equivalent. There are three distinct groups, each with it's own rationale for its behaviour. Magic value is a good option when there is an "until" condition such as [CODE] or when there is a simple to use value that will never be a valid answer (-1 for [CODE] ). Throw excepti...
96
60
53,344
2012-08-01T19:05:46.003
api_errors
softwareengineering.stackexchange.com
1,141,114
Data Sync between 2 Datacenters
I'm reaching out to you in the hope that some of you can provide me with fresh ideas for a current problem I'm working on. I'm planning to set up a redundant data center (including websites, mail services and databases). Here are the key points: I have two data centers connected by a 1 Gbps link, with IPs routed using ...
Are there any approaches that might work better and faster than synchronizing the sometimes several TB-sized files using rsync between the data centers? (copy only change delta? But since it's Virtuzzo File System there is no such mechanism I can utilize as far as I know) erm, copying the delta is exactly what rsync do...
0
2
262
2023-08-09T10:58:29.087
pipeline_ops
serverfault.com
213,701
Mirroring on-premise SQL Server to AWS EC2 SQL Server
Trying to mirror an on-premise SQL Server instance to EC2 instance, but not much information is available on this topic. The closest one I managed to find is: Implement SQL Server High Availability and Disaster Recovery on Amazon EC2 - Part 4 Has any one done this? If so is there any documentation available? My intenti...
I know this is very old but yes I have this working. Ended up using mirroring due to company policy between SQL 2016 AWS and on premise SQL 2016 running on Vmware. Found this link very helpful. https://tecadmin.net/setup-database-mirroring-sql-server/ I know not exactly what you were looking for but thought might help.
2
0
835
2018-07-31T20:52:27.630
database_errors
dba.stackexchange.com
102,932
data preprocessing: missing labels
I have a classification task to predict {0,1} labels, but in my dataset I only have data with 1 labels. Class indicates that the buyer has made a purchase of some product. Features: user id, product id, and time of purchases. User ID: numeric from 0 to 20.000, Product ID: numeric from 0 to 881 How to solve this kind of...
This task could be treated as a one-class classification problem, where a binary classifier is trained only with positive instances. Instead of determining the optimal limit between classes, the model tries to determine what characterizes the positive class, considering everything else as negative.
1
1
75
2021-10-08T10:11:23.587
data_quality
datascience.stackexchange.com
411,760
Is it possible to disable "Admin Approval Mode" for a single account on a server?
A console-app runs on a single server in a domain and is tasked with deleting some home areas of users, who are no longer active. These homeareas are located on 50+ different servers spread around the network. The account runs under the context of an account, that is also a member of the Local Administrator group on ea...
This feature is called UAC (User Account Control). It can only be disabled per-server not per-user, to do so go to the start menu, type "msconfig" then open the only entry in the list. In this new window choose the "Tools" tab and select "Change UAC Settings", then pull the sliding scale down to disabled.
5
3
13,509
2012-07-27T07:46:39.007
infrastructure
serverfault.com
447,980
Correct process for starting new EC2 Instance from an EBS snapshot
I have an EC2 instance running the Ubuntu 12.04 32bit AMI (available in the first page the Classic wizard for launching a new instance). The root device is an EBS volume. I then follow these steps: Stop the server Right click on volume from Volumes tab -> Create Snapshot Right click on said snapshot from Snapshots tab ...
The errors you got suggest that your file system is more recent than that supported by the kernel (most likely an ext4 on a kernel that only supports ext2/3). Some AMIs depend on a non-standard AKI (Amazon Kernel Image) to provide certain features. In this case, the procedure you have followed seems correct, therefore,...
8
10
5,447
2012-11-12T20:27:34.863
data_quality
serverfault.com
1,000,164
Configure IIS 7 to create a Windows event on HTTP error (or to trigger an action)
How to configure IIS 7 so it creates a Windows event every time an HTTP error occurs ? The closest thing I found is this: https://docs.microsoft.com/en-us/previous-versions/iis/6.0-sdk/ms524984(v%3Dvs.90) . It describes two configuration variables [CODE] and [CODE] . However I cannot force IIS to create events for HTTP...
You can do that with (free) 3rd party software. EventSentry (Light) is one of the products that can do that by monitoring the actual log file and filtering on any text that occurs. There is nothing you have to do on the IIS side - for as long as it logs to the log file. I actually found a screen cast that walks you thr...
1
1
348
2020-01-23T20:29:16.670
api_errors
serverfault.com
303,196
Back up Event Viewer folder using backup exec without installing the remote agent
How to backup a shared folder without installing the remote agent? I used and enabled the "Enable selection of user shares" but an error appears "Failed to connect to computer"! I appreciate any other solutions to backup the event viewer folder using Backup Exec 2010 R3. Thanks, Khalid
Do you have a BE Remote Agent license installed on the BE server? I believe that's a requirement for backing up user defined shares. In addition, you need to define your user defined selections and select those in your selection list, NOT the shares viewable from the server itself.
1
1
126
2011-08-19T21:20:43.743
database_errors
serverfault.com
12,170
GPLed Library (EXT JS) Licensing Issue
Good Day Everyone, I am realy out of option for interpreting the GPL for EXTJS for my work/idea/personal project. I can see that this is an active forum I realy hope, I have a closure on this. First let me explain my project, Iam creating this website which is like a webportal which is intented for End-User, now this w...
Based on the letter of the GPL, you may be right in interpreting that it's possible to use Ext without releasing any code, depending on the circumstances. However, there's also something as the intent of the people who make it. In your place, I would mail licensing@sencha.com and ask them this question. If you don't li...
4
6
667
2010-10-15T03:46:09.520
api_errors
softwareengineering.stackexchange.com
792,633
E-mails disappear from mailbox via Outlook but not via OWA
I have a problem with disappearing email messages from Outlook. Scenario: One day user have all emails in his mailbox and suddenly many of these messages revealed to be missing. When user logs via OWA all of the messages are in place (in Outlook they are still not).We have Microsoft Windows SBS 2011 with Outlook (2010-...
If the emails are in OWA, then they are in the mailbox. That suggests the issue is with Outlook only. My instinct is a view is hiding the emails. Reset the views. outlook.exe /cleanviews
1
3
1,015
2016-07-29T07:37:57.373
infrastructure
serverfault.com
1,003,895
Cannot login to SQL Server instance installed on Debian using domain account
I can login to SQL Server 2019 (installed on Debian Buster) with SA account using SQL Management Studio on Windows Server 2016, but I cannot do this with the domain account using integrated authentication. 1. The DebianVM (hyper-v) has joined to Active Directory and the domain account can login through SSH to that serv...
Please follow these steps to configure Active Directory authentication on SQL Server (Linux). Here you will find a full tuorial. The following list provides a summary with a link to each section in the tutorial: Join a SQL Server host to an Active Directory domain . Create an AD user for SQL Server and set the ServiceP...
2
0
270
2020-02-20T14:15:14.910
api_errors
serverfault.com
800
How to avoid duplicated bug reports, described from different user perspective?
We get a lot of bug reports that ends up as the same bug, but are described through the eyes of a different user. For example one can see a device has crashed, the other sees communications loss and the third will see that she can't install a driver for the device. I was thinking of ways to solve this, my main idea was...
It's a rather difficult problem to solve, since bug reports are often written from the point of view of the observer, rather than the root cause. Tags/keywords are a good idea. One thing I do is attempt to have the bug report analyzed quickly by the relevant developer, who adds comments as to the root cause, and often ...
8
14
4,203
2011-05-25T12:11:20.337
data_quality
sqa.stackexchange.com
888,231
Missing raid device in /dev/
I have two sata disks: /dev/sda and /dev/sdb. I have 4 partitions: [CODE] And all of them are in raid1. Raid is working fine. Here is [CODE] [CODE] And my problem is: After boot my root partition is in readonly mode: [CODE] AND There is no /dev/md127 in /dev directory: [CODE] In dmesg I get this message: [CODE] Do you ...
I found the reason of this problem. I installed LVM and I added [CODE] flag to grub.cfg and everything started working properly. (I had [CODE] flag already added to grub.cfg)
1
1
1,042
2017-12-14T22:59:06.777
infrastructure
serverfault.com