question_id
int64
1
1.16M
title
stringlengths
10
191
question_body
stringlengths
6
2k
answer_body
stringlengths
0
2.5k
tags
stringclasses
73 values
question_score
int64
-15
1.65k
answer_score
int64
0
2.91k
view_count
int64
4
1.24M
creation_date
stringdate
2008-08-01 18:45:00
2025-06-19 04:44:02
category
stringclasses
12 values
source_site
stringclasses
8 values
269,584
Monitor a window or RDP Session
At my job, I often perform tasks on remote Windows machines using RDP. These tasks can take a long time to finish (hours/days/weeks), so I end up with many RDP sessions open simultaneously, each with a task running. The problem I have is that I have to monitor each of these RDP sessions in order to know when the task f...
You can do this via a batch file using tasklist. You can change it to the process ID or what ever process you're using to monitor it. Obviously sub notepad.exe for whatever the name of the process you're using is. [CODE] That way you're RDP session will be logged out and you'll have a log file of when it finished.
0
1
371
2011-05-13T21:13:17.863
pipeline_ops
serverfault.com
639,353
Rewrite or change MAIL FROM:<> with postfix or mailman
I've got a problem with laposte.net free french email provider : since several weeks now, their smtp servers don't accept empty [CODE] anymore. Here is a sample telnet session : [CODE] I know that it is mandatory to accept these emails, and I've contacted them several times, without any luck. The problem for me is for ...
Have a look at the PCRE map for Postfix . It allows you to define mail from rewrites for addresses based on a regular expression.
1
2
2,017
2014-10-24T10:20:05.050
infrastructure
serverfault.com
975,511
curl ip address of load balancer
I have an application running on a VM, that sits behind an internal load balancer in Azure. I can reach it locally on /api without any problem. I have configured the rules for the load balancer to direct traffic coming from port 8001 to 443 on the VM. However, when I try to curl http:///api:8001, it doesn't reach the V...
You need to do a curl from a VM which is not part of the backend pool. The curl URL should be http://InternalLBIP/api:8001 . Also make sure you are using the correct protocol as I see you are translating 8001 to 443. LB will only forward the packet to the backend pool when the Probes are healthy. Make sure your Probe i...
0
0
2,962
2019-07-16T23:23:58.360
infrastructure
serverfault.com
309,326
Organizing effectively the project
One of our assignments is to write a website which should use a database. I would like to have some help organizing it. Here are characteristics of our work. The assignment is for a group of 5 people. We have access to a server, where each person of the lecture has an account and a database (MySQL). (Some haven't seen ...
This won't answer all your questions but at least it may be better than nothing. There is few cohesion between us, so there is lack of understanding what other members are doing or what should each one do. Now that we try a beta of the website we found each part is not well correlated with each others. I think you just...
1
0
88
2016-02-05T09:53:25.087
database_errors
softwareengineering.stackexchange.com
416,761
Installing Ajenti fails because of python dependencies which aren't found
I'm trying to install Ajenti http://ajenti.org I've followed the instructions on their website but when I do: [CODE] I get this: [CODE]
The base CentOS 5 system includes Python 2.4, whereas Ajenti requires Python 2.6. Python 2.6 is however available in the EPEL repository, so you need to configure this before installing Ajenti.
0
1
989
2012-08-12T19:56:37.200
infrastructure
serverfault.com
964,766
Grant access to user for all user folders and subfolders in c:/users
We have an RDS server with dozens of user profiles and I am trying to run cleanup scripts to get rid of some old software folders from the users C:\users*username\appdata\local\softwarenamedfolder However I get access denied errors when trying to run my script When I try to browse to said folders it gives me a popup sa...
1) This is bad practice. 2) I do something similar where I give a backup administrator rights to the users folders so that I can do granular restore using Windows Backup. Just do what you're doing (more or less) but put it in a login script and the user themselves will run the script for you on login or as a scheduled ...
0
0
816
2019-04-26T15:55:06.537
infrastructure
serverfault.com
1,094,906
What the "uri" written in nginx doc(difference with the "file")?
The last argument of [CODE] directive is slightly different from the others, it has a leading slash(but not means absolute path): e.g. [CODE] . And the doc distinguish them as [CODE] and [CODE] . Also the doc of error_page , the last argument written as [CODE] and it may internally redirect, like [CODE] one's. Sum up a...
This last URI argument is compared against your [CODE] blocks - and the best/longest match is used to resolve it. So if you do not have [CODE] in your [CODE] - the above example will return error 404.
0
0
183
2022-02-25T05:24:19.543
infrastructure
serverfault.com
19,971
Linear regression on probabilistic data
I have a dataset which is probabilistic in nature. For instance, if a record has d features, then values of $x_1$, ..., $x_d$ are such that their sum adds to 1. In other words, for each $x_i$ data record (row) $$P(x_{i,1}) + P(x_{i,2}) + ...+ P(x_{i,d}) = 1$$ I want to apply Linear Regression Model to predict a variabl...
The issue with linear regression in your case is not whether it can be used - it can nearly always be used to build a predictive regression model - it is whether the resulting model is useful, usually whether it is accurate enough for the intended use. The accuracy and utility of your model does not depend only on the ...
5
6
205
2017-06-26T12:32:09.107
data_quality
datascience.stackexchange.com
238,293
Data Loss when forced failed over to secondary replica on Sql Server 2014
Setup: 2 Availability Groups 2 Replicas on Synchronous Commits. 1 Replica on Asynchronous Commit. Automatic Failover configured for the two replicas on Synchronous Commits. Manual Failover configured for the single replica on Asynchronous Commit. Problem: ESX Server for the primary replica went down. Automatic failover...
What am I missing here You should first read How It Works: Always On–When Is My Secondary Failover Ready? . This would tell you about scenarios when your secondary is not failover ready and what could lead to "no automatic" failover Why did the data loss happen? My understanding is that since two replicas was on synchr...
1
2
1,750
2019-05-16T08:21:04.897
database_errors
dba.stackexchange.com
883,108
Mikrotik IPV6 dhcp client
The DHCP client in my mikrotik router never obtains a ipv6 address or prefix, when connected to internet. I understand I need a prefix, so the devices on my lan can get a valid external IP. However when I connect my laptop everything works as expected?
figured out I needed to only ask for a prefix, then setup a DHCP server, and add an ipv6 address. This post on the mikrotik forum was pretty clear. https://forum.mikrotik.com/viewtopic.php?f=13&t=101918&p=506310&hilit=dhcpv6#p506307
1
1
2,282
2017-11-12T22:52:47.710
infrastructure
serverfault.com
971,135
You don't have permission to edit this api key. required permission serviceusage.apikeys.update
I have been using Google Cloud Platform mainly to use it with Google Maps. I created several API keys which are working fine. The last one was a couple of weeks ago. A couple of days ago I wanted to updated it but couldn't, an error message was coming up very briefly when saving it. I thought it might have been a glitc...
As indicated in the error message, the permission [CODE] is needed if you want to update keys. The IAM roles that have this permission included are the following: Owner Editor API Keys Admin According to the screenshot attached, looks like the roles are enabled. Could you confirm if your user have one of the roles ment...
0
0
1,666
2019-06-12T16:13:34.583
infrastructure
serverfault.com
605,439
SIP INVITE packet has WAN address rather than call manager LAN IP
I am using SIP between two subnets ( [CODE] and [CODE] ) each connected via VPN. I have a call server on [CODE] , and two phones [CODE] and [CODE] on the remote subnet. The WAN IP on the subnet where the call server is located is [CODE] . There is an issue with quality of service from the ISP with SIP packets, so inste...
You have use [CODE] in sip.conf in general section. Also you need ensure no nat applied
0
0
1,450
2014-06-16T12:11:46.513
infrastructure
serverfault.com
276,223
Extracting client specific code. refactoring possibilities required
I am facing a Design problem. I have a set of classes which writes data in XML,JSON or HTML formates for different clients. I have a class which receives Data and a XML, JSON or HTML writer as it parameter. And these Writer have a common Interface, Writer uses the Data to create Data in speficied format. The writes hav...
Now my problem is that Descriptions part of the Documents is very client specific. Only that specific part looks completly different for each client but the rest of the Document is same. Should I use writeDescriptions as a factory which calls clientSpefic writeDescriptions function? then I have another problem that I h...
-1
0
90
2015-03-13T15:31:29.830
api_errors
softwareengineering.stackexchange.com
12,374
How to handle services when the developers provide incorrectly in k8s
I provided the script to provision a new feature environment inside k8s it will create all the configs required, namespaces, resources and whatever... in my script, I described this param: [CODE] when the developer is provisioning a new env, he will provide a list of services that he wants to enable on that environment...
@Mkash, don't you know in advance what services you have in your [CODE] file? Maintain a list in groovy, and see whether the input is in that list or not. Something like: [CODE] The other option is to change the parameter from type of [CODE] to multiple-choice possibly using https://plugins.jenkins.io/extended-choice-p...
1
1
52
2020-09-09T18:23:23.953
pipeline_ops
devops.stackexchange.com
258,329
Mongo E11000 duplicate key error collection after mongo 3.4 to 3.6 upgrade
I have a Mongo replica set on Ubuntu with three members configured for my information system and am having issues when I try to upgrade MongoDB from version 3.4 to 3.6 After setting the "featureCompatibilityVersion" to 3.4 on the master node and checking it on the two slaves, I started upgrading the slaves one by one (...
First, per the documentation you should always upgrade the Secondaries first, finishing with the primary node as per MongoDB upgrade process . Second, since 3.6.13, MongoDB added a field [CODE] adding a UUID into any user created to avoid [CODE] collision such as what you seem to have encountered. See https://jira.mong...
0
1
1,086
2020-01-28T11:26:15.620
database_errors
dba.stackexchange.com
155,978
How to insert SP results in a multiple tables
I have an sp it results in 3 sets. Now the problem is i want insert these 3 result sets in to 3 temp tables. In these three results are different structures and no.of columns also different in these results.
SQL Server has no built-in mechanism for capturing multiple result sets returned from Stored Procedures where the result sets have differing numbers of columns and/or datatypes in the same column position. [CODE] can output multiple result sets, but they need to have the same number of columns with the same datatypes i...
5
3
8,199
2016-11-22T05:01:35.523
warehouse_errors
dba.stackexchange.com
283,892
Connecting Oracle XE DB / Oracle Database 10g Express
I started with Oracle DB. On Windows Server 2003 I installed Oracle Database 10g Express Edition and then I also installed PL SQL Developer. I tried log on via PL SQL Developer to XE database. I use this credentials: Username: system Password: password is correct :) Database: XE I got this error: ORA-12528 . So I googl...
once disable your all network connections then restart your PC/Server and then try to log in. if it is successful enable your all network connections.
1
1
4,119
2011-06-24T17:58:06.630
database_errors
serverfault.com
289,177
Event logging: record a whole message, or a list of properties and generate?
I've written a simple event logging system, which I write to with a function similar to: [CODE] Where [CODE] is derived from a set of constants such as [CODE] , [CODE] would be the path of the volume, [CODE] the computer where it occurred, and [CODE] when it was detected. Since [CODE] is a known value, I can automatica...
I feel I can contribute to this given answer . The concept Phill is describing comes very close to the EventSourcing Pattern . If your systems contains several types of Events, consider such an implementation. The overal flexibility, as mentioned by Phill, will drastically increase since you don't have to know yet what...
1
2
164
2015-07-09T05:37:20.733
api_errors
softwareengineering.stackexchange.com
18,895
How can you write tests for Selenium (or similar) which don't fail because of minor or cosmetic changes?
I've been spending the last week or so learning selenium and building a series of web tests for a website we're about to launch. it's been great to learn, and I've picked up some xpath and css location techniques. the problem for me though, is seeing little changes break the tests - any change to a div, an id, or some ...
The purpose of Selenium is to create UI-driven integration tests . Integration tests verify that all components of your system work correctly when deployed together. Integration tests are not a sufficient test strategy and complement other test strategies having a different focus, for example unit-testing and acceptanc...
9
7
3,341
2010-11-14T10:07:46.550
api_errors
softwareengineering.stackexchange.com
1,033,828
Automatically updating bind9 DNS TXT entry after letsencrypt wildcard renwal
When updating a wildcard-letsencrypt-certificate you're being asked to deploy a DNS TXT record with some sort of hash-value before continuing with the verification. Like this: [CODE] Usually i change the entry by hand but i tried to automate it... so i wrote a bash script which first starts certbot - pipes the output i...
While not a direct answer to the question, I think a better solution was reached in the discussion of the question. Let's Encrypt as a whole is centered around automation and [CODE] has built-in facilities for this. The intended way of automating [CODE] DNS-01 validation is to use their plugin interface. [CODE] also sh...
1
2
2,826
2020-09-14T13:35:00.613
infrastructure
serverfault.com
579,112
Can't start Gunicorn via Supervisor after server reboot
I have a Django application "djngxgun" that uses Nginx and Gunicorn. I just installed Supervisor so that I can use it to manage my Gunicorn processes. The problem is that Supervisor isn't starting Gunicorn after I reboot the server. When I start Gunicorn via Supervisor ("sudo supervisorctl start djngxgun"), I see the f...
I figured it out. The solution is to set "user = root" in the project's Supervisor configuration file. The documentation says, "If supervisord runs as root, this UNIX user account will be used as the account which runs the program." Thus, setting user this way is equivalent to my running the script manually using "sudo...
1
0
7,133
2014-03-01T00:27:01.253
infrastructure
serverfault.com
135,116
Why do I get Access Denied when using WinRM?
Following on from this question: Why does my PowerShell script hang when called in PSEXEC via a batch (.cmd) file? I took the advice from Jim B and installed WinRM. To recap I have two servers: HMon01 - runs Windows 2003 Standard SP2 Web1928 - runs Windows 2008 Standard SP2 ( not R2 ) Both servers are standalone. I ins...
try installing the latest version of winrm from here on the 2003 box. The ports (by default) should be 5985 for http and 5986 for https. Also note that winrm quickconfig is not available on 2003. Winrm will run commands based on the user currently accessing the machine. Once you have te 2.0 version installed run from t...
0
2
11,219
2010-04-23T02:23:33.307
infrastructure
serverfault.com
167,663
MAX NUMA/ "Affinity" in SQL Server
Is there now, or possibly in the works a way to tell SQL Server to stay inside one NUMA node, either server wide or at the query level? Basically the same functionality as MAXDOP, but MAXNUMA? Right now, unless I am totally missing it, when a query goes parallel it can use all of the processors it can see. Just wonderi...
...a way to tell SQL Server to stay inside one NUMA node... There's no hint that does that, but SQL Server can be configured to do what you describe. See SQL Server Parallel Query Placement Decision Logic by the Microsoft SQL Server Customer Service and Support Team for details. The table below is reproduced from that ...
3
1
694
2017-03-20T17:39:08.853
database_errors
dba.stackexchange.com
219,094
Delete using another table with index
I'm trying to delete rows using another table and wondering why postgres doesn't use an index, here are the steps, on pg10.5: [CODE] I would have expected Postgres to pick an Index Only Scan using parent_idx followed by an Index Only Scan on child_idx. What am I missing?
It can't do an index-only scan in this case. It needs the actual table row, not just the index entry, of the parent row. If you do an EXPLAIN VERBOSE, you will see the p.ctid getting exposed. I believe that is because if the delete encounters a locked row in the child table, it will block until the transaction locking ...
1
3
204
2018-10-02T16:02:13.267
warehouse_errors
dba.stackexchange.com
641,805
DNS or Virtual host issue to open abc.com and www.abc.com
I'm facing issue with Linux VPS. Whenever I'm clicking xyz.com , it is working fine. Whenever I'm trying to click www.xyz.com , it is opening firstly configured website on virtual host. I configured virtual host. whatever ServerName I am giving [CODE] I already made entries in /etc/hosts [CODE] both are same IP address...
You seem to be looking for server aliases. In your configuration, set up a configuarion alias to www. for example [CODE] source: http://httpd.apache.org/docs/2.2/vhosts/name-based.html
0
2
680
2014-11-04T05:08:11.843
infrastructure
serverfault.com
674,897
Windows Authentication working on localhost but not on other site on IIS
I'm trying to set up a simple html/css/js only site on my local IIS that uses Windows Authentication. So far I just a have a c://mysite/index.html file When I point the default IIS website (i.e http://localhost ) to this folder and enable Windows Authentication, I am shown the login dialog when I browse to it. When I e...
Check if you have KB 3002657 installed. This patch broke windows authentication, and the symptoms are what you mentioned (redisplays login credentials) Has March 2015 Patch Tuesday broken 2003 shares? http://www.infoworld.com/article/2895900/security/microsoft-netlogon-patch-kb-3002657-woes-continue-kb-3032359-cisco-an...
0
0
1,500
2015-03-12T11:35:20.660
database_errors
serverfault.com
762,474
Exchange 2013 is failing its Readiness Checks for installation due to legacy Exchange 2000/2003 records
We're in the process of upgrading our exchange 2007 to 2013, but after running the readiness checks, we're getting an error. Error reads: "One or more servers in the existing organization are running Exchange 2000 Server or Exchange Server 2003. Installation can't proceed until all Exchange 2000 or Exchange 2003 server...
Doesn't look like the exchange server was ever decommissioned Has it been removed completely from the AD? And the old Exchange server is no longer shown under Servers? Please refer to the section "Remove the Exchange Server 2003 server from Active Directory" How to remove Exchange Server 2003 from your computer Just ma...
0
1
863
2016-03-08T20:30:42.463
infrastructure
serverfault.com
536,454
Can a URL Rewrite condition compare two server variables?
I am trying to compare two server variables as part of a URL rewrite condition. But first, some context... In IIS, if you request [CODE] and [CODE] is a directory, IIS sends a 302 "Object moved" redirect to [CODE] as a "courtesy redirect" ( Source ). If you are using IIS+ARR as reverse proxy with SSL offloading, the re...
You can use a custom rewrite provider. A provider is C# code that turns one string into another string. You can then use it in a similar way to how you'd use rewrite map: You can pick a separator which is not valid in a url at all. (Maybe use space or something like that. I'll use [CODE] so it's visible in this post, b...
5
3
2,852
2013-09-04T23:05:28.860
api_errors
serverfault.com
696,913
SSH Tunnel not working
I have a number of SSH tunnels set up between our company's server (hosts website) and our customer's servers (hosts database). For all sites but one the connection is relatively stable however one site is persistently causing problems. I was checking to see if the connection was still there using the following command...
They are coming from some process on your local system. Probably the application that you are trying to use. They are likely a symptom of your connection not working, not the cause. Your application has tried to open multiple connections via the tunnel, and the connections haven't completely failed, so they show up as ...
0
2
1,253
2015-06-05T15:51:23.947
infrastructure
serverfault.com
313,581
Setting umask /etc/apache2/envvar not working Ubuntu 10.04
I am trying to set the default umask to [CODE] . I tried adding it to: [CODE] But after restarting Apache it hasn't changed? Still [CODE] . Where do I have to put it? Thanks
Probably the best place is the apache startup scripting in /etc/init.d/ directory.
0
0
1,180
2011-09-20T19:16:18.630
infrastructure
serverfault.com
307,814
Sql server complex select query row as column
I have two tables in SQL Server: Table1: Table2: I need a select query to give me output like this: I am attaching here the sample data of two tables in text format since I am unable to add the Excel sheets here Table1 SCHOOL_ID TEACHER_ID IS_HEAD_MASTER TAGGED_CLASS IMAGE_NAME LATITUDE LONGITUDE ACCURACY CREATED_DATE ...
Given data: [CODE] The basic idea is: [CODE] Results: TeacherID Image1 Image2 Image3 Image4 Image5 341 1.jpeg 2.jpeg 10.jpeg 20.jpeg 30.jpeg 734 3.jpeg 4.jpeg 40.jpeg 50.jpeg 60.jpeg db<>fiddle demo If you need a dynamic pivot because you don't know in advance how many columns there will be, see: Need help with SQL Ser...
-2
3
67
2022-02-22T11:15:01.677
database_errors
dba.stackexchange.com
181,212
Best Practice to Avoid "Playing Telephone" with Constructor Arguments
I find that the encapsulation required by OO has me frequently passing paramenters down the line from parent to child to great grandchild to second grand nephew once removed (not actually that bad). But inevitably in the process, and especially if graphics are involved there will be garbling the by the third iteration ...
To expand on @9000's comment, I would use objects that provide more information and possibly error checking about your arguments. For example, in the following: [CODE] The second is generally more readable. It can check errors (can coordinates be negative? can a rectangle have a negative width or height?) and provides ...
8
11
1,148
2013-01-02T06:06:47.070
api_errors
softwareengineering.stackexchange.com
1,126,909
Cannot create aws lambda function. error: the following arguments are required: --runtime, --handler
I am trying to deploy an image to be run in [CODE] at a scheduled interval. I have built and tested the image using RIE and locally it runs as it should. Next I have pushed the image to [CODE] to be stored. My next step is to create a [CODE] and this is where my troubles begin. As per the docs : If the deployment packa...
The usage of containers with Lambda was introduced in CLI version >=2.2.0. You need to update your CLI version in order to make it work.
0
0
480
2023-03-23T08:57:38.360
pipeline_ops
serverfault.com
173,142
Getting Postgres CREATE TABLE statements
I created some tables (9, to be exact) with a Django (1.9.6) migration and now I'm trying to get simple [CODE] statements for them. I tried this answer , but using [CODE] in this way gives me over 800 lines of output for the 9 tables. For example, part of the output creating the first table is [CODE] and then later on ...
I don't know of any Postgres-specific tool that can do that, maybe you should approach this from the Django perspective: https://docs.djangoproject.com/en/1.8/ref/django-admin/#django-admin-sql
3
0
529
2017-05-09T21:47:01.297
data_quality
dba.stackexchange.com
258,746
Non-SA role restoring database?
If I'm reading Books Online correctly, a user can restore an existing database if they're the DBO of that database; the actual words are: If the database being restored does not exist, the user must have CREATE DATABASE permissions to be able to execute RESTORE. If the database exists, RESTORE permissions default to me...
There has been a change in this area in and above SQL Server 2008 compared to SQL Server 2005 and below. Some of it is documented in the below. http://msdn.microsoft.com/en-us/library/ms173778.aspx http://msdn.microsoft.com/en-us/library/ms178569.aspx
1
1
4,365
2011-04-12T13:34:33.323
database_errors
serverfault.com
162,884
retrieve file size from HTTP headers without downloading the file with CURL (no HEAD)
What i want to do is knowa file size and not download it. I've tried it with HEAD but the server doesn't respond curl_setopt($curl, CURLOPT_NOBODY, true); if i quit this , it will , but it will download the whole file... So if i could somehow tell curl that the max received data should not pass certain bytes and stop, ...
Find out why your server does not respond to the HEAD request. This is exactly the purpose of the HEAD request :-) Another option would be to start fetching the file and then just kill the connection. Are you calling curl from PHP? In the callback function you could receive the header and then stop. You can define such...
0
1
5,771
2010-07-22T05:02:24.430
infrastructure
serverfault.com
153,552
Linux: Encryption of a physical LVM volume doesn't imply encryption of its logical subvolumes?
I installed OpenSuse one year ago on my notebook. I created all partitions except [CODE] inside an LVM partition. I enabled encryption for it during setup. The system asked me a password on each boot later. Everything seemed fine... But one day I wanted to cancel the boot process and did it with SysRq [CODE] . During e...
There are two ways to encrypt an LVM volume: You create an encrypted partition, create the PV inside it and then the whole PV is encrypted You create a normal LVM, create LV inside it and then create an encrypted partition inside the LV. If you use method 1 your root partition is encrypted. You might have gotten an eme...
1
0
1,198
2010-06-22T11:33:32.653
infrastructure
serverfault.com
43,419
SQL Server full safety mirror commit overhead less then Time to send?
How is it possible that the time to send value is greater then the mirror commit overhead? The mirror operates under full safety so this means that the commit is only done @ principal when the commit is successful @ mirror. When the time to send is 2 seconds, this should mean that that overhead is at least 2 seconds. O...
Database Mirroring Monitor (Status Page) : Time to send log (estimated) Approximate amount of time the principal server instance requires to send the log that is currently in the send queue to the mirror server instance (the send rate). Because the rate of incoming transactions can vary significantly, the time to send ...
2
2
653
2013-05-30T10:09:32.667
database_errors
dba.stackexchange.com
524,408
How can I get an InstallShield Package to install as the SYSTEM user, or from SCCM?
There is a piece of software that I am trying to package that uses an InstallShield installer. I have tried the [CODE] and get the [CODE] file, and call the package via [CODE] From a batch file. All the files are placed in a WinRAR sfx and extract to the C:\Temp\ folder. This setup works fine when run as admin, however...
I too am having a problem with an installshield installer for Pixelogic Sculptris. The problem lies with the way SCCM uses the SYSTEM account whenever it runs as when "run with administrative rights" is set. That's why running the batch file I have from the cached folder (which points to the iss file) as myself and "ru...
2
1
3,619
2013-07-18T14:07:34.497
infrastructure
serverfault.com
111,402
Ubuntu Slow Server Response; Initial Load; RoR
I have a rails app sitting on an Ubuntu 9.10 server located here: http://sandbox.incolo.com If you hit it initially, it takes about 4 seconds to do its initial load. Once the load has happened the server response nearly instantly. Any thoughts as to why the initial http request is so slow? It definitely shouldn't be lo...
https://stackoverflow.com/questions/853532/slow-initial-server-startup-when-using-phusion-passenger-and-rails/854870 Found my question. Thanks guys for anyone who looked at this.
0
0
1,133
2010-02-10T02:06:03.260
database_errors
serverfault.com
309,510
Is denormalising a data structure essentially a code optimisation, to which the normal rules apply?
One of Bloch's Effective Java items [CODE] extends Jackson's rules on optimization: Rule no. 1: Don't optimise! Rule no. 2 (for experts): Don't optimise yet! Extra Bloch rule 1: Don't try it until development is finished. Extra Bloch rule 2: Measure performance before and after implementing an optimisation (you'll be s...
The problem I have with those rules is they're talking to babies. A time comes when finding speedups is necessary, and when it does clichés won't help. You've got to know how to do it. Guessing doesn't find them. If somebody looks at the code and says "maybe this could be done better" - that's guessing. Measuring doesn...
2
4
198
2016-02-07T14:04:03.753
api_errors
softwareengineering.stackexchange.com
41,376
Better Understand the 'Strategy' Design Pattern
I have been interested in design patterns for a while and started reading "Head First Design Patterns". I started with the first pattern called the 'Strategy' pattern. I went through the problem outlined in the images below and first tried to propose a solution myself so I could really grasp the importance of the patte...
Your code will break when, e.g. ducks quack with a different sounds. The boolean will only lead to other booleans into really hairy if-statements. The strategy pattern is simple though. Take in this instance the quack method and place it into it's own class or interface. An interface in php would be a class that does n...
7
6
2,021
2011-01-30T08:11:55.400
api_errors
softwareengineering.stackexchange.com
79,642
Clients not updating with approved updates from WSUS
I've been a bit behind in my windows XP updates recently, and I have about 18 or so I need to roll out to all our users, according to WSUS. I'm trying it on a couple of test PCs, and so far i've had no luck. On each one, one update would install (and need a reboot), and nothing else since. When I run wuauclt.exe /detec...
Have you tried a diagnostic with WSUS Client Diagnostic Tool ? WSUS Diag Tool And are you sure that you have approved all the updates in your WSUS server ?
1
2
5,713
2009-10-29T18:01:42.030
database_errors
serverfault.com
334,675
Does catching/throwing exceptions render an otherwise pure method impure?
The following code examples provide context to my question. The Room class is initialized with a delegate. In the first implementation of the Room class, there are no guards against delegates that throw exceptions. Such exceptions will bubble up to the North property, where the delegate is evaluated (note: the Main() m...
Yes. That is effectively an impure function. It creates a side-effect: program execution continues somewhere other than the place to which the function is expected to return. To make it a pure function, [CODE] an actual object that encapsulates the expected value from the function and a value indicating a possible erro...
28
26
3,489
2016-10-26T15:43:50.223
api_errors
softwareengineering.stackexchange.com
275,002
Child Object depends on member of Parent Object
I am wrestling with this OOP design issue. Take these base classes, for example: [CODE] This example is oversimplified to just concentrate on the question at hand. If I wanted to add logic that would get the [CODE] row count , you would think that naturally belongs in [CODE] class: [CODE] The problem is, in order to ge...
Pass an already established connection to [CODE] 's constructor (as opossed to the other answer suggestion of passing the connection string). That's the approach I've used for years. Objects that access the database don't open or close database connections. A connection is made by some other component, usually the main...
3
6
505
2015-03-02T19:48:42.783
api_errors
softwareengineering.stackexchange.com
63,765
Pytorch CrossEntropyLoss expected long but got float
have you done some research before asking the question? Yes. I have done a lot of online searching, and others had similar problems. There solution was to use .float() when entering into the loss function. This did not work for me. Instead, regardless if I even do [CODE] etc. I still get the same error. I predict it ha...
It seems you need to pass a 1D LongTensor for the target. In your sample code, you passed a float value. I changed your sample code to work on MNIST dataset. [CODE]
0
0
4,918
2019-11-26T02:19:14.620
data_quality
datascience.stackexchange.com
933,137
EXIM: Auth not advertised when using EHLO
I've moved my mail server from one VM over to another. Everything has been configured as it was previously, and from the perspective of IMAP, there are no issues. Currently however, I'm having an issue with sending emails. It's stating that a relay is not permitted, however looking at the configuration, this shouldn't ...
You have missed condition for auth advertising. May be the simpliest way is to advertise the auth only for those hosts that have used TLS for connection: [CODE] Semantics of the condition above is the next: auth is advertised for every host having non-empty tls-cipher(i.e. TLS is already established). All hosts that re...
0
1
1,867
2018-09-28T16:54:15.197
api_errors
serverfault.com
414,435
When to add version numbers to documentation
It is often useful to document when (i.e. in which versions) a feature was added, marked as deprecated, etc. For example: [CODE] Foos [CODE] with [CODE] and bars them with [CODE] . (Parameter [CODE] was added in version 1.2) I'm wondering when and how those notices are best added, and I can think of two alternatives: W...
This depends on how you plan which features go into which release. For example, if any feature that is merged during a certain timeframe will make it into the 2.4 release, then you can use that version number directly. If you do not know the next version, it would still be reasonable to update the docs immediately, pre...
16
27
2,293
2020-08-04T07:18:33.217
api_errors
softwareengineering.stackexchange.com
943,965
Unable to install PHP 7.3 on Centos 7
I have a server currently running CentOS 7.6 and PHP 7.1.25. I want to update my PHP version to 7.3 (released on 6 Dec) but I'm having some troubles. I followed this guide but when I run [CODE] , it throws the following error: [CODE] So I thought, let's just install [CODE] manually, so I googled for that package which ...
Answer is in your output Loaded plugins: priorities 4509 packages excluded due to repository priority protections So you need to fix priority to ensure remi-php73 repository have higher priority (lower number) than any other repository. Another way is to remove the priority plugin.
1
2
5,214
2018-12-12T07:25:32.593
infrastructure
serverfault.com
1,045,298
Telegraf Tail file that contains json data to Influx
How can I extract the json data into influx by tailing a file that has the JSON data? EG: My logs are like this: [CODE] Is there a way to just extract the JSON part and send it to influx? I know the grok pattern [CODE] will extract the JSON part. My config looks like this: [CODE]
Since my JSON output contains a timestamp field. I modified my rsyslog config to to save the the syslog [CODE] and save it starting from the opening first match of [CODE] [CODE]
0
0
682
2020-12-07T15:09:58.730
infrastructure
serverfault.com
955,839
111: Connection refused while connecting to upstream: supervisord Django channels Nginx
I am a beginner on server side processes and the other questions that address this topic are running different stacks than I am so it's been quite hard to find useable answers. It's very possible I am making a silly error with the IP addresses in the server block but again, as I am a beginner, it is not obvious. I'm ru...
Solved it by changing to [CODE] so it was able to execute the [CODE] command
0
1
4,796
2019-02-26T16:14:01.143
api_errors
serverfault.com
3,575
How to understand existing test coverage?
I believe this is a common issue for any QA that enters a project with existing test base. I entered the project which have lots of unit tests and FIT tests for existing functionality. When I test a certain defect or new sub-feature added to existing functionality, I try also to understand if existing tests cover the a...
Are the tests at least categorized by product, feature and separated by unit/integration/functional? If not, that would be a good place to start to start before trying to figure out what coverage they provide. One possibility would be to run code coverage on your product while executing the tests. This could give you a...
9
5
313
2012-08-01T16:20:42.860
data_quality
sqa.stackexchange.com
562,477
Can the iPad remember the iTunes password when using Meraki MDM?
I'm currently using Cisco Meraki MDM to manage apps that get pushed out to company-owned iPads. In order for the company to retain ownership of the apps we purchase, apps are installed through the company iTunes account. The problem is that when the apps installed with that account have updates to install, the user is ...
Google tells me "No, mostly." https://docs.meraki.com/display/SM/Systems+Manager+FAQ#SystemsManagerFAQ- Does the user have to enter the Apple ID password for every app installed? When Apps are deployed via MDM, Apple requires an Apple ID and password for the app to be installed. Apps downloaded and installed via Apple ...
7
9
2,241
2013-12-19T13:50:05.300
infrastructure
serverfault.com
314,902
Membase nightmare too many connections
We have a group of four web apps (C#, ASP.NET, NHibernate) and a few services that used to share a Northscale instance. We've since upgraded to Membase, at which point we were actually able to start making effective use of the NHibernate second level cache. However, once we got the apps into production, the memcache se...
Looks like it was an issue with the membase provider. Apparently it was creating separate clients for each entity in our app (there are a crap ton of them). Multiply that out by the number of sites we have and the trouble is easily understood. The other dev made a tweak to the code that changed the allocation strategy....
1
0
918
2011-09-23T16:30:06.440
pipeline_ops
serverfault.com
204,712
What's the difference between fetch and fetch next?
I've got a cursor sending out pager messages, and occasionally it sends out duplicates. The syntax looks like this: [CODE] Question: if I'm getting duplicates, could it be the fetches? do they both need to be fetch next, or neither?
There is no difference, and omitting [CODE] will not lead to duplicates or different results in any way. [CODE] is just an explicit declaration of the default behavior. From the syntax diagram : [CODE] [CODE] is not the only option, and most of the other options are only available with certain types of cursors. It's ha...
4
11
2,883
2018-04-23T14:15:21.827
data_quality
dba.stackexchange.com
209,070
How to Restore MongoDB Database After Having Deleted DB Files From Directory
I'm running MongoDB 2.6 on Ubuntu 14.04 and I accidentally deleted db file in [CODE] . I cannot restart the MongoDB instance: [CODE] If I purge and re-install will I be able to restore the data? Any help is appreciated.
3-rd Party Tool You might want to consider recovering the files using the PhotoRec tool. Reference: PhotoRec Homepage PhotoRec is file data recovery software designed to recover lost files including video, documents and archives from hard disks, CD-ROMs, and lost pictures (thus the Photo Recovery name) from digital cam...
1
1
2,328
2018-06-08T07:43:49.187
database_errors
dba.stackexchange.com
126,039
How is the password file accessed when it's on an ASM diskgroup and required to connect to ASM?
When a RAC is turned on, it will try to accessing the OCR registry which is located on ASM. ASM also holds the asm password file. However to open ASM, it needs to access the password file. If the password file is missing or corrupted etc... when turning on the CRS stack, this happens: [CODE] Oracle's solution to this i...
ASM metadata describes the location of the password file on the ASM disk. With that information, even you can read it directly from the disk, with the help of [CODE] (which is installed with the Oracle binaries) and OS specific tools for reading the disk directly, for example [CODE] , without using ASM. Same goes for t...
0
1
1,419
2016-01-12T20:11:21.723
data_quality
dba.stackexchange.com
31,367
MySQL SELECT query: i want show duplicated entries
Example My query is: [CODE] output is: [CODE] Only one row. Instead I want this output: [CODE] How can I achieve this? I want this because I need to use the records on an Excel Spreadsheet.
If you really need it (I don't get why though), you can do [CODE]
1
2
288
2013-01-03T13:47:28.113
database_errors
dba.stackexchange.com
9,389
Combining InnoDB with MyISAM
Possible Duplicate: Is it common practice to mix InnoDB and MyISAM tables on same server? I have a movie clips and photos table in an application; these tables contain a tag column, which allows users to search for the movies/photos by tag; however, the whole database is designed using InnoDB tables specifically for da...
As long as you recognize the tradeoffs you're making, there is nothing inherently "wrong" about introducing a MyISAM table into a primarily InnoDB database for the purposes of supporting full-text searches. Tradeoffs: No enforcement of referential integrity on MyISAM tables. Referential integrity may be enforced at the...
7
3
1,063
2011-12-19T16:26:30.573
data_quality
dba.stackexchange.com
225,771
Does IIS have a log?
I have a secure web site but I did not configure permissions to let the IIS worker process access the respective machine certificate's private key. Naturally, navigation to the site does not work. I want to know how can one troubleshoot this situation? I cannot find any relevant logs. I mean, I do have the logs in c:\i...
Hope this isn't over simplistic. There are website logs, which log HTTP and such request. If do this on a site level, you'll need to enable that, done very simply through IIS7 by going to site in features views, open logging, and click enable on the right. For IIS6: http://support.microsoft.com/kb/313437 There are also...
1
2
3,299
2011-01-23T13:09:04.813
infrastructure
serverfault.com
118,756
Is storing attributes in separate tables instead of columns a standard practice?
This question is a little open-ended and subjective, but hopefully it's still okay for me to ask on here. I was contracted by a small business to do a project and as part of it received a database dump of their website. I was appalled when I saw the database had 542 tables in it because every attribute is stored in a s...
Is structuring a database like this a standard practice? No. I'd like a second opinion before approaching the company about it. Are you explaining poor performance? Complaining? Suggesting a re-design or replacement? Did anyone ask for your professional or personal opinion of the system? Is it going to affect project e...
1
1
233
2015-10-21T14:17:37.560
database_errors
dba.stackexchange.com
315,296
Apache2 ErrorDocument not working on VirtualHost
My ErrorDocument redirect doesn't appear to be working! Here is the bottom of my sites-available file: [CODE] If you go to 109.123.109.205/404.php, the error page appears correctly, however, when you go to 109.123.109.205/asdf.php, I just get the bog standard 404 error... Any insight greatly appreciated,
Your [CODE] statements look correct. As you are testing this using an IP address you may be picking up the default configuration. Try connecting to the virtualhost using the server's name as defined by the [CODE] directive.
-1
2
1,707
2011-09-25T13:33:31.480
infrastructure
serverfault.com
10,591
docker | database connection refused between two containers
I have a mysql database running with the following [CODE] : [CODE] [CODE] [CODE] I have a basic golang rest api with the following [CODE] : [CODE] and the following function is called: [CODE] [CODE] [CODE] I cannot get the api to establish a database connection with the database container?
Your golang api should be included in the compose file and added to the same network. It also looks like when you run the golang api that you are adding it to a network other than [CODE] , which is the network that is created in your compose file.
1
2
9,377
2020-01-25T03:22:07.750
database_errors
devops.stackexchange.com
329,137
How to choose a clustered index for a fact table
What is a good strategy for choosing a clustered index on a fact or transactional table? I am using SQL Server 2019. I have picked a generic sales table (FactSales) that has these properties: no identity surrogate key composite primary key that includes 4 fields (all INT) about 300 million rows it loads continuously as...
Please let me know what you would choose. And why. I would normally choose a clustered columnstore index . They have the best compression, fastest scanning, automatic row group elimination on every column, and column-wise scanning and caching. Second choice is just to cluster on the PK. [CODE] Note that you can then pa...
1
4
255
2023-07-10T21:59:12.847
database_errors
dba.stackexchange.com
754,291
Clients can't update dNSHostName attribute after DNS suffix change
We have a bunch of Windows 7 and Windows Vista clients that belong to domain [CODE] . The clients are registered in DNS to [CODE] . We have changed the DNS suffix via GPO from [CODE] to [CODE] . This worked fine for most of the clients - [CODE] got updated automagically including the computer objects [CODE] attribute. ...
I found a simple solution to the problem. If I first "reset" the attribute to [CODE] it works as expected... [CODE]
4
1
10,739
2016-02-05T15:37:15.147
infrastructure
serverfault.com
323,931
EC2 Auto Scaling for mortals? Does that exist?
I have very simple EC2 setup with Eastic Load Balancer and two web servers under it. I need to automatically start additional instance when CPU on one of them reaches 100% or some instance fails. The first thing I looked was Amazon http://aws.amazon.com/autoscaling/ page. I read this page a few times and staring at it ...
Autoscaling DOES exists, it just haven't graphic interface and instead have command-line interface. You don't need programmer, you only need someone to spend few hours reading documentation and make a few command line calls. Take a look at the link below - it have an example of 7 command line calls you need to make it ...
9
2
2,530
2011-10-22T16:06:32.057
pipeline_ops
serverfault.com
842,292
Determine SSH authentication method before disabling SSH password auth
I'd like to write an automation script that sets [CODE] in [CODE] . However, I wan't to guard against locking myself out in case I run the script while being logged in via SSH and password authentication. Is there a way to determine the authentication method of my SSH connection when I'm already logged in?
Short answer, if you turn on a high enough logging level for ssh/sshd to report this detail before you begin the process, it should be trivial. If you haven't already done this it may be quite a bit harder. In my experience, unless you have ssh or sshd running/logging with verbose (debugging level, maybe?) output, this...
1
0
59
2017-04-03T17:09:29.703
api_errors
serverfault.com
254,780
How should be the approach to start thinking about multi thread programming
I am an experienced java developer.Of now I have started learning multithreading in java.I am able to grasp most of the concepts but still I am unable to visualize applications running on threads.I know the concept but somewhere if I am given a problem statement, I am unable to think or visualize it in threads.How shou...
The easiest way is to think of threads as processes (and this is the case in some unixy systems that spawn a new process where some systems would create a new thread). A process is a blob of code and data with a stack and a single thread anyway. Once there, you can start to imagine sharing data between threads- its eas...
2
1
855
2014-08-29T06:53:20.017
api_errors
softwareengineering.stackexchange.com
706,297
Can I import an SSL certificate that was created by the CA into my Java keystore?
I'm trying to import a CA-signed certificate into a Java keystore. All the instructions I can find for this tell me to first create a keystore and a signing request (CSR) using the Java keytool, then have the CSR signed by the CA, and then import the signed certificate back into the keystore. Well, stupid me didn't rea...
I did this in the past by using a PKCS12 keystore: [CODE] After that, use it directly by specifying keystore type as PKCS12 or convert to JKS with keytool: [CODE]
1
0
5,121
2015-07-16T16:23:52.513
api_errors
serverfault.com
231,961
SQL Server 2008 R2 100% availability
Is there any way to provide 100% uptime on SQL Server 2008 R2? From my experience, the downtimes for the different replication methods are: Log Shipping: Lots (for DR only) Mirroring w. NLB: ~ 45 seconds Clustering: ~ 5-15 seconds And all of these solutions involve all of the connections being dropped from the source, ...
No. 100% is not possible with SQL Server. Several nines, yes. As for clustering: only one individual SQL Server install can "own" the MDFs at any point in time. So you have the rollforward/rollback cycle as another instance takes over and connections are broken. This decides how long for the cluster to failover: typica...
4
5
637
2011-02-06T23:01:43.457
database_errors
serverfault.com
991,405
Apply iptables rules but exclude list of IPs
I am going to apply the following iptables rule to temporarily ban every IP requests certain port(s) more than 30 times per minute. [CODE] How can I sort-of whitelist a list of IP addresses, to be able to send and receive data from my server without any problem coming from the above rule? I need a rule that will leave ...
Simply put rules above (before) that rule in the INPUT chain which explicitly allows all traffic to that port from the IP addresses in question. iptables rules work like a waterfall, if an ALLOW rule higher in the waterfall matches, it whisks that packet off to the destination and it never makes it to rules lower in th...
0
0
279
2019-11-11T18:09:26.523
infrastructure
serverfault.com
146,577
Need correct mysqlfrm command path to restore a database from .ibd and .frm files
I'm attempting to restore a database made up of only .ibd and .frm files. Why I'm doing this: An uninstall of my WAMP installation left only .ibd and .frm files, and was using MySQL 5.6.12. A reinstall of WAMP has MySQL 5.6.17. The WAMP people said if I restore the database in the 5.6.12 then I'll be able to choose the...
You cannot just move the .exe around like that and expect it to work. All libraries and dll's (in your case I suspect [CODE] ) have to be in the same directory structure. You can execute commands from other locations by specifying the entire path or from any directory which is in your [CODE] environment variable. You c...
0
1
2,809
2016-08-11T23:31:34.207
database_errors
dba.stackexchange.com
120,533
Is PHP suitable for downloading large amounts of data?
Is PHP suitable for downloading large amounts of data, usually via cron? Should I worry about the memory footprint when I am using PHP for downloading multiple zip files?
While you can use PHP for this, it is hardly the most efficient tool, nor the easiest to use. Specialized command-line downloaders such as [CODE] or [CODE] are much better suited; you can drive them directly from cron, or you can write a simple shell script to encapsulate the required parameters. Another advantage of u...
-1
3
441
2011-11-18T19:46:21.917
api_errors
softwareengineering.stackexchange.com
131,779
MySQL Cluster - How the Sharding works?
Right now I have a MySQL database with a couple of tables with around 20MM rows each; This DB is located on a single server ( 4gb RAM, 60GB storage, 2 CPUs) each table size is 4gb +-, but my server storage is about 75%, and I'll need to upgrade the server. Instead of growing vertically I want to grow horizontally, afte...
NDB may be the right solution for you. Or... Sharding is splitting up the data -- some rows go here; some go there. NDB does sharding, and it also does redundancy. That is, the rows that are going 'here' can be put on 2 servers for redundancy. So think through whether you want both, and how many servers you want to put...
1
1
897
2016-03-10T04:37:57.450
database_errors
dba.stackexchange.com
23,531
Using dates from predicting loan
My goal is: Calculate the probability of a client take a loan. My problem is: How to take in account the date of the loan in this process. Certainly the date is important here since, let's assume my clients usually take loans closer to Christmas, for example. My initial thought was to use the day of the year, since thi...
You are going in the right direction. Dates can contain a lot of information depending on the task you want to learn. A problem with your suggestion of using the day of the year straight up is that the last day of the year and the first day of the following year are very close to each other, while in your representatio...
0
1
100
2017-10-04T13:28:02.317
data_quality
datascience.stackexchange.com
5,357
Materialized views master table
New to this topic - in my current environment we are not doing any replication but we use materialized views frequently in order to achieve performance gains on complex views that are in turn used by web applications (obviously these are only used when the data involved is not completely time-sensitive, we do nightly r...
From the Oracle documentation When DML changes are made to master table data, Oracle Database stores rows describing those changes in the materialized view log and then uses the materialized view log to refresh materialized views based on the master table. 1 So you should be able to see what changes are invalidating th...
0
1
3,726
2011-09-02T18:40:03.920
database_errors
dba.stackexchange.com
791,889
authorized_keys and with_items in Ansible
I'm trying to create new users and populate their ~/.ssh/authorized_keys file using Ansible. Here's my task: [CODE] and my variables file looks like this: [CODE] I've setup the various user's public ssh keys into a publickeys directory which I put in the variable named "sshkey_path". There is one public key file for ea...
The reason it is failing, is because the actual plugin is called with_items and not with_item. You forgot the s.
1
3
8,801
2016-07-25T20:47:59.813
pipeline_ops
serverfault.com
854,807
How to check the content of swap memory in Linux?
I am trying to find out what exactly uses swap memory in my system. Free reports over 5GB of used swap memory, but all processes use only 24MB of swap. I suspect that swap might be used by a tmpfs filesystem, but I don't know how to check it. Would you be so kind to tell what else should I check to examine content of t...
Swap usage per proccess [CODE]
5
3
5,536
2017-06-09T07:48:56.093
api_errors
serverfault.com
248,010
Mac's Apache virtual hosts playing up
I'm hitting the most frustrating problem with the devlopment environment on my Mac at work (OS X 10.6.6, Apache 2.2.15, PHP 5.3.3 - all default installs with very little modification). Last night I started working on a new website, I added a virtual host and added a few domains to [CODE] to resolve to my local machine....
Some thoughts: 1) Try adding the port number to the VirtualHost directive, like [CODE] Make sure that it matches with the port number of the default VirtualHost directive and the NameVirtualHost directive. 2) Try using IP address 127.0.0.1 instead of 10.10.11.199, if the server is on localhost. 3) Remember to reload th...
0
0
201
2011-03-16T11:01:55.413
infrastructure
serverfault.com
558,664
Cannot reattach to a screen session after SSH connection was dropped
I have previously reattached to a long-running screen session with [CODE] . However, sometimes this command will not reattach to the screen and instead hang forever (10+ minutes after which I aborted). This only happens when the SSH connection is dropped unexpectedly and not when the screen is properly detached with [C...
As suggested by Jens Timmerman, the ultimate reason for this strange behavior was that I was connecting to the remote server using SSH ProxyCommand and [CODE] . After killing the [CODE] on the intermediate machine, I am able to reattach to the screen session.
16
1
4,987
2013-12-02T13:11:10.690
infrastructure
serverfault.com
12,136
FK on NON Primary Keys
Is there any performance problem / difference if I have one Foreign Key that points to another table Indexed Fields that is NOT the PK ? Something like [CODE] QUESTION: Is there a performance drop when I run a query that looks like this: [CODE]
Two things: 1 - You still need to have a [CODE] constraint to use a field as a foreign key. 2 - In your example you WILL have a performance decrease, because by default a [CODE] is also a clustered index. A non-clustered index on your FK field will speed the [CODE] but you will still need to pay the cost for a bookmark...
3
5
792
2012-02-02T19:24:57.540
warehouse_errors
dba.stackexchange.com
70,628
Why do programming languages generate method signatures without regard to the return type?
I have worked with many languages that do not generate a method signature based on the return type. I have also worked with one(maybe some?) that do. The ones that don't have given me problems in the past (like here ). Why do programming languages generate method signatures without regard to the return type? Update: I'...
It wouldn't mesh well with typecasting and type hierarchies. If you have two versions of a method, one of which returns type A and one which returns type B, you run into trouble when: A or B are subtypes of each other, and you assign the return value to the one that is the supertype. A and B have a common supertype, an...
11
5
638
2011-04-23T03:21:54.597
api_errors
softwareengineering.stackexchange.com
41,503
How to respond to requests to retest, in hope that the bug is gone?
We sometimes get requests from developers to re-run a failing test on the latest build, since "we did a lot of changes" and they hope the bug is gone. On one hand, one can claim that they should know what they are doing and not hope that some side-effect removed a bug. It also projects lack of respect for our time, if ...
As a developer, not a QAist, I have a responsibility to provide software that meets the specs, with as few errors as possible. From my perspective, QA has the responsibility to inform me of any errors that I have made. I place them in extremely high regard for that. When QA tells me that "they found a bug" they found t...
28
29
8,161
2019-11-12T06:22:18.240
data_quality
sqa.stackexchange.com
320,489
Postfix - don't generate "unknown user" bounces if message is Spam
We receive a a lot of spam addressed to (random) non-existing users. This causes postfix to generate "unknown user" bounces to the fake sender. As a workaround I use a catch-all to redirect any mail to myself and manually forward mail in cause of typos in the local_part. I want postfix to drop spams to non-existing use...
Unfortunately, the server checks for an existing recipient (against the envelope recipient) before it ever sees the message. It's not possible to check if the message is spam. The only things that come before this check are the "server helo" and "envelope from"; which you could try to filter ( SPF and rDNS lookups spri...
2
3
4,909
2011-10-11T15:06:37.640
infrastructure
serverfault.com
39,087
How to deal with ui-sref in Selenium
The Context: I'm using selenium in java to click on a link to navigate to the other page of the application. The Problem: The application is made in angular-js wherein I tried to click on the Link, but strange it logs out me directly. But if I hit the same URL manually, after login it works fine. I'm not sure Where I'm...
It seems that another element is located and clicked, thus the log out. Try [CODE] : [CODE] I would suggest to test it in chrome devtools console like this: [CODE] This is equivalent of [CODE] so if it returns more then one element the locator is still not valid and you will have to be more specific. In such case posti...
0
1
685
2019-05-08T13:18:46.107
data_quality
sqa.stackexchange.com
912,627
Stunnel - SMTP Authentication failed
Hi ServerFault community, I have posted this to the stunnel-users mailing list on 30 April 2018 and again on 16 May 2018 at https://www.stunnel.org/pipermail/stunnel-users/2018-April/006000.html , unfortunately no one there seems to know the answer, so now I am trying my luck with the experts here. The following is a v...
From your comments: The problem is that your mail server is already configured with an SSL certificate and will therefore only allow SMTP authentication when it detects a secure encrypted connection. As far as I can tell Your stunnel server terminates the secure connection a client makes and establishes a second, unenc...
0
0
3,032
2018-05-17T06:38:12.257
api_errors
serverfault.com
1,022,754
Ports to open for the SCOM Discovery Wizard to run properly
I'm trying to run the Discovery Wizard in SCOM 2016 against a few MS SQL servers, so the Health agent can be pushed to the remote computers. I've found documentation stating that the following ports should be open: 135, 137, 139, 445, and 5723. At the SCOM management server, I probed those ports on a SQL server already...
This is the official documentation about SCOM 2016 and firewall ports: https://docs.microsoft.com/en-us/system-center/scom/plan-security-config-firewall?view=sc-om-2016 . For agent push installation, you need the following ports to be open between the Management Server and the servers to manage (also between the Manage...
0
0
3,653
2020-06-24T13:39:56.347
database_errors
serverfault.com
221,663
processes slow after some time of actively running
i have several cron jobs running on an ubuntu machine. each one does some pretty heavy load stuff. The cron jobs are parsing files and the bigger the file the longer it takes them to parse it. The strange thing is that if i make the files too big ( like 30mb) the script kind of hangs. It starts processing them really e...
sar (1) will provide the data you need to analyze here. You can look at the [CODE] to see all collected sar stats, then drill down. For example [CODE] will give you the I/O stats to see if you are getting bogged down on disk activity. A nice feature of sar is it logs in the background so you can use it to review histor...
1
1
3,351
2011-01-12T17:20:51.203
database_errors
serverfault.com
3,544
SQL Select taking too much time to execute
It's a simple select from a temporary table, left joining an existing table on its primary key, with two sub selects using top 1 referring the joined table. In code: [CODE] This is an exact replica of my query. If I remove the two sub selects, it runs just fine and quickly. With the two sub selects, I get about 100 rec...
I think in a million records query, you have to avoid things like [CODE] . I suggest you use [CODE] Instead of [CODE] . As long as I think [CODE] is more efficient than sub-query in the select clause I will modify the query written by Conard Frix, which I think is correct. now: when I started to modify your query I not...
10
7
70,268
2011-06-28T18:35:01.040
database_errors
dba.stackexchange.com
173,309
How can I convert the first 100 million positive integers to strings?
This is a bit of an diversion from the real problem. If providing context helps, generating this data could be useful for performance testing ways of processing strings, for generating strings which need to have some operation applied to them within a cursor, or for generating unique, anonymous name replacements for se...
Your solution runs for 35 seconds on my laptop. The following code takes 26 seconds (including creating and populating the temporary tables): Temporary tables [CODE] The idea there is to pre-populate ordered combinations of up to four characters. Main code [CODE] That is a simple order-preserving union* of the four pre...
14
8
1,034
2017-05-11T12:22:51.333
database_errors
dba.stackexchange.com
787,829
Ubuntu 14.04 with Azure File Storage FSTAB mount drops after some time
I have an Ubuntu 14.04 server that has an Azure File Storage mount that auto mounts on boot via an FSTAb. To create this config, I followed the instructions in this article , and it works fine. The issue I am having is after a while, intermittently, the mount drops. It doesn't seem to be at any particular set time, or ...
I seemed to have resolved this issue by using AutoFS to mount the share instead of fstab. After making the change, we've not encountered the issue originally reported. A few days after we made the change, I did get a response from Microsoft stating this is a known issue (c/p of message below). AutoFS or Microsoft's sug...
3
2
810
2016-07-04T14:17:36.860
infrastructure
serverfault.com
1,007,328
Can't get certificate due to multiple IP addresses for subdomain
Please correct me if I am wrong, since I am a newbie to all things server. I have a website [CODE] hosted at host A. I want create subdomain [CODE] on host B - EC2 instance in this case. Now I did this by changing the A Record on my subdomain, to point at the Elastic IP of this EC2 instance. I visit [CODE] and it works...
There are currently two [CODE] records for your subdomain. Let's Encrypt needs to verify both addresses before issuing a new certificate. Just remove the duplicate one, leaving the one of your EC instance.
0
0
2,120
2020-03-17T23:15:43.720
api_errors
serverfault.com
780,326
Nginx upstream block nondefault port
experts. I am trying to configure nginx/1.10.0 for upstream to 2 https web servers on non standart port with ssl termination. Here is my current website setup in sites-available/ [CODE] It works without using upstream section. But when I change proxy_pass to proxy_pass https://backend ; I got an error 404, and https://...
Somehow I found the solution. I have added proxy_set_header Host $http_host; in location directive. Now initial config works. [CODE]
0
0
532
2016-06-01T15:59:45.897
infrastructure
serverfault.com
529,700
java http service on mac server with Apple server admin
I've written a simple com.sun.net.httpserver.HttpServer program that runs on a non-server mac. When I visit [CODE] in a web browser, it gives me the correct response: "Here's my response!". I then move this java file to a webserver Mac OS X Snow Leopard managed with Server Admin, compile it, run it on port 39600, visit...
It turns out that Server Admin doesn't manage specific ports. The GUI for the Snow Leopard firewall only lets you open specific applications (and thereby their associated port numbers). To open a specific port, you have to dig in to Terminal and type [CODE] where [CODE] is between 00001 and 65535 and [CODE] is as well ...
0
0
218
2013-08-08T20:29:51.457
infrastructure
serverfault.com
242,657
Is this simple XOR encrypted communication absolutely secure?
Say Alice and Peter each have a 4GB USB flash memory stick. They meet and save on both sticks two files named [CODE] (2GB) and [CODE] (2GB) which contain randomly generated bits. They never meet again, but communicate electronically. Alice also maintains a variable called [CODE] and Peter maintains variable called [COD...
Yes, this is a One-time pad . If the key material is never re-used, it is theoretically secure. The downsides are that you would need one key per communicating pair of principals and you would need a secure way of exchanging the key material in advance of communicating.
23
50
4,249
2014-06-01T14:51:17.077
api_errors
softwareengineering.stackexchange.com
51,352
org.openqa.selenium.interactions.MoveTargetOutOfBoundsException: move target out of bounds
I am passing input to rich text field. For that I have written the code below: [CODE] but I am getting the error move target out of bounds
The error message: [CODE] typically occurs when the target element is not visible or outside the visible area of the screen. Here are some possible solutions to try: 1 Scroll to the element: If the element is not visible, you can try scrolling to it using the [CODE] method. For example: [CODE] 2 Use an offset: If the e...
0
0
3,358
2023-03-08T11:50:51.187
data_quality
sqa.stackexchange.com
253,807
Data Pipeline load bulk tables in one time
I am using AWS Data Pipeline for copying my RDS MySQL Database to Redshift. I need to create separate pipeline for each table and each pipeline create new EC2 instance. (Process takes time). Problem Is there any way to load whole database table into Redshift with single Data Pipeline . so i can schedule it and sync all...
I did this... i made a shell script and include all my tables there into a loop and store it in S3 and in pipeline ...i mentioned the path to script ...at scheduled time...the script runs and sync the data daily to Redshift. :) :Y
1
1
94
2019-11-21T05:21:43.830
database_errors
dba.stackexchange.com
915,741
You don't have permission to access [ Apache + CentOS 6.3 ]
If I paste the code from a file into index.html and try to access it from browser is working BUT if I try to transfer the file with WinSCP into /var/www/html directory I get "403 Forbidden; You don't have permission to access". I also tried to copy the file with root login or a user made without root access + chown the...
Frequently such problems find their origin in SELinux security context violations. Try for instance [CODE]
1
1
16,713
2018-06-08T08:01:10.260
api_errors
serverfault.com
276,210
How to use WITH inside IF statement in PostgreSQL
I am writing a function that accepts a text flag based on which I need to run some code. So I am using an IF clause. However the code that has to execute inside IF and ELSE is a recursive CTE which has different joins for the different text flags. Following is sample that I am trying to write but getting an error. I tr...
I modified the code as below to make this work... Added PLPGSQL as language as Daniel suggested and added BEGIN and END as Daniel and Akina both suggested. But RETURN QUERY did the trick which I added before the WITH clause. [CODE]
0
0
2,458
2020-09-28T17:06:02.847
database_errors
dba.stackexchange.com
1,109,403
Domain computer account trust relationship failed after connecting system with old hard drive to network
Our server is Windows 2016. I set up a new install of Windows 10 on a new hard drive. I named the computer on the new install the same as the old one. I kept the old hard drive as-is and didn't make any changes to it for back up purposes. Something has happened unrelated to this and I need to go back to the old drive f...
Same name? Then yes, it is the same computer account and you just overwrite the keys for the trust relationship as they are stored under the computer in AD. There is nothing you can do now - really. The old trust is gone. History. Only way to access things on the HD now are basically adding it as second hard disc.
5
5
3,294
2022-08-29T17:54:13.780
infrastructure
serverfault.com