question_id int64 1 1.16M | title stringlengths 10 191 | question_body stringlengths 6 2k | answer_body stringlengths 0 2.5k | tags stringclasses 73
values | question_score int64 -15 1.65k | answer_score int64 0 2.91k | view_count int64 4 1.24M | creation_date stringdate 2008-08-01 18:45:00 2025-06-19 04:44:02 | category stringclasses 12
values | source_site stringclasses 8
values |
|---|---|---|---|---|---|---|---|---|---|---|
122,270 | MySQL binlog does not show SQL statements | While checking the binlogs, it struck me that I cannot see any SQL statement. Here's an example: [CODE] and the output [CODE] However, database securities is being replicated to the slaves without any trouble. Also, what do the [CODE] mean? I would have expected to see statements there. | Remove this clause: [CODE] | 2 | 3 | 1,122 | 2015-11-27T10:34:29.157 | database_errors | dba.stackexchange.com | |
75,229 | Is GNU Octave a perfect place to code neural networks | GNU Octave is used for its simplicity and compiling speed to write numerical algorithms (such as eg machine learning problems), but I wanted to know if I can also use it for faster coding of neural networks. | No. The key to implementing neural networks easily and fast is having automatic differentiation . This is the key feature that allows programs using Python libraries like Pytorch or Tensorflow (and Keras ), to implement only the forward pass of a neural network and have the backward pass computed automatically. Octave ... | 2 | 5 | 4,229 | 2020-06-01T05:07:53.877 | data_quality | datascience.stackexchange.com | |
30,889 | VirtualBox cloned Ubuntu Server network error | I run a number of virtual servers on my network and I want to be able to easily clone base installations of Ubuntu Server. I use the VBoxManage command to clone the actual hard disk and I then create a new profile for my VM and copy over the settings of the original VM. However, when I boot into the cloned VM, there se... | Just remove [CODE] then restart. And all will be fine. | 12 | 17 | 4,625 | 2009-06-24T10:37:49.140 | infrastructure | serverfault.com | |
453,553 | ipvsadm lists a few hosts by IP only, rest by name | We use keepalived to manage our Linux Virtual Server (LVS) load balancer. The LVS VIPs are setup to use a FWMARK as configured in iptables. [CODE] http://www.austintek.com/LVS/LVS-HOWTO/HOWTO/LVS-HOWTO.fwmark.html [CODE] At the time the realservers were setup, there was a misconfigured dns for some hosts in the 10.10.3... | Looks like you have an issue with name resolution on your machine. [CODE] uses [CODE] every time it displays the list, so it lets your libc grab the name dynamically (call chain: [CODE] -> [CODE] -> [CODE] -> [CODE] -> [CODE] ). You might need to flush your caches (restart [CODE] , etc.), or fix your DNS. | 2 | 1 | 1,643 | 2012-11-29T18:47:02.923 | infrastructure | serverfault.com | |
96,234 | Is there a faster way of moving data between databases than CTEs? | I use the following query on SQL Server 2012 Express to move data that is older than 4 days old out of one [primary] database and into another [secondary database] for archiving purposes. The only issue is that this takes the database offline as it is usually moving about 500k rows of data, and that figure is climbing ... | This doesn't have anything to do with using a CTE specifically, as your question title implies. It is probably a combination of at least one or more of the following: an expensive scan (or seek + a million lookups) to identify the rows to delete (I assume [CODE] is not the clustering key) many underlying non-clustered ... | 0 | 4 | 1,665 | 2015-03-25T17:15:35.597 | database_errors | dba.stackexchange.com | |
72,416 | Is my MySQL instance irretrievably dead? | I'm trying to install a JIRA instance on a MySQL 5.1.73 instance running on CentOS 6.5 for our developers. The install gets to the point where I need to create the database, and then FLUSH PRIVILEGES; This is what I get: ERROR 1033 (HY000): Incorrect information in file: './mysql/tables_priv.frm' So I hit google, and t... | Looks like you installed MySQL 5.1 over a 5.0 (or older) installation, without running mysql_upgrade to create new system tables and add columns to existing system tables. – Bill Karwin 25 mins ago It is safe to run mysql_upgrade without disturbing your other databases. Read http://dev.mysql.com/doc/refman/5.1/en/mysql... | 2 | 3 | 1,388 | 2014-07-25T17:31:12.343 | database_errors | dba.stackexchange.com | |
124,227 | SUM of ever increasing column | I have a table of "transactions" where each transaction has an amount: http://sqlfiddle.com/#!15/42849/1 Records in the table are never REMOVE'ed or UPDATE'ed. Only new transactions are added. I wish to calculate the SUM of the amounts. The calculation doesn't have to be 100 percent up to date for every request. On a d... | Here's one idea that you can evaluate: [CODE] The current amount should be something like: [CODE] On a regular basis you can refresh last_transaction similar to: [CODE] The version of PostgreSQL in your fiddle does not support (perhaps no version does?) [CODE] Just an idea, that may or may not fit your needs. Edit: add... | 5 | 2 | 1,525 | 2015-12-21T11:12:00.367 | warehouse_errors | dba.stackexchange.com | |
199,704 | WAMP: phpmyAdmin gives access denied after I create password using cmd.exe | Hi I'm pretty new to the WAMP scene, I've just downloaded WAMP from: http://www.wampserver.com/en/download.php And got it installed with ease. I've set up a password to MySQL using cmd.exe on Windows (7, 64-bit) using the following command: [CODE] Now when I click the WAMPSERVER icon on my system tray, go to phpmyAdmin... | You should check the host, username and password in your configuration and make sure that they correspond to the information given by the administrator of the MySQL server. Find your [CODE] file under the phpMyAdmin installation directory and update the line that looks like this: [CODE] ... to this: [CODE] | 0 | 2 | 1,345 | 2010-11-09T04:44:15.580 | database_errors | serverfault.com | |
755,043 | nodejs - issue with accessing the application remotely | I am running nodejs application on my server with the link: [CODE] Now I want to access this application remotely from anywhere. So i added 3000 to be allowed port in the server firewall (both TCP and UDP). But i cannot access this remotely from my system for example with the following link: [CODE] In the browser i am ... | You should check if the application is bound to some real addresses, not only locahost. [CODE] . If it's bound only to a [CODE] , this would be the root cause. | 0 | 0 | 471 | 2016-02-09T16:46:31.973 | infrastructure | serverfault.com | |
12,002 | Include verbose output in terraform/terragrunt | Is there any way to include verbose / debugging output in Terraform / Terragrunt? I'm new to the language, and often struggle with knowing exactly what's going on. It would be helpful for me to be able to inspect certain values; e.g. to confirm that locals & variables have the values I expect, to get the ids of created... | You might be able to do something with the local-exec Provisioner to push the information out to an external script or file which you could monitor separately during the run. The issue you might encounter is the run order, HCL isn't processed top to bottom like a "traditional" programming language, it works out a depen... | 1 | 1 | 1,433 | 2020-07-15T09:30:52.103 | pipeline_ops | devops.stackexchange.com | |
81,328 | How to improve results from a Naive Bayes algorithm? | I am having some difficulties in improving results from running a Naive Bayes algorithm. My dataset consists of 39 columns (some categorical, some numerical). However I only considered the main variable, i.e. Text, which contains all the spam and ham messages. Since it is a spam filtering, I think that this field can b... | Your model certainly overfits. It's likely that the main issue is the inclusion in the features of words which appear very rarely (especially those which appear only once in the corpus): Words which appear only once don't help classification at all, if only because they can never be matched again. More generally, words... | 2 | 4 | 1,357 | 2020-09-07T09:18:43.070 | data_quality | datascience.stackexchange.com | |
1,035,927 | I want to resolve an incorrect configuration error in the Google Speech To Text API | I get an error when making a request to Google Speech To Text. I don't know the cause, can you help me solve it? error contents [CODE] Audio metadata used I'm using ffmpeg. [CODE] Settings sent in request [CODE] In another mp3 file, requests with the same settings are being processed successfully. Is there a problem wi... | According to doccumentation , the "Invalid recognition 'config': bad encoding" message states that: Your audio data might not be encoded correctly or is encoded with a codec different than what you've declared in the RecognitionConfig. Check the audio input and make sure that you've set the encoding field correctly. He... | -1 | 0 | 424 | 2020-10-01T01:38:34.737 | infrastructure | serverfault.com | |
391,423 | Can encapsulation/information hiding cause problems in error identifying/locating? | I understand the principles behind opaque data types, encapsulation, information hiding, etc. in theory : preventing alteration to parts of a program can prevent people from accidentally messing it up, and hiding the information is basically just to make it more readable. The thing that I just can't seem to wrap my bra... | This isn’t a concern for encapsulation, it’s a concern of using proprietary software. Because what you describe is clearly a bug. It’s either a bug in the published API or it’s a bug in the implementation. If the black box is internal to your company or the source code is otherwise available to you, you might be able t... | 2 | 3 | 234 | 2019-05-04T21:42:09.193 | api_errors | softwareengineering.stackexchange.com | |
249,500 | Gitosis, created testproject, but can't create more projects? | I followed this tutorial to install gitosis on my homeserver(ubuntu 10.10 server edition): https://help.ubuntu.com/community/Git . After a lot of fiddling around because it didn't work(something with certificate naming) I finally got it to work properly. I added the testproject and everything worked fine. Now I want to... | Here's an attempt at trying to figure out what happened. When you push a new [CODE] to the server, it updates a locally checked out version in the [CODE] directory. Its possible that, due to some unknown reason, this file did not get updated correctly. Hence, the original repositories were working fine, while the new o... | 1 | 0 | 203 | 2011-03-20T11:42:32.623 | infrastructure | serverfault.com | |
10,140 | ssh keys + RHEL5 | I've been able to set up SSH authentication keys on my ubuntu, fedora core and mac systems, however, I'm not able to get SSH keys to work properly with redhat enterprise linux 5 (RHEL5). I've tried created the keys with 2048 bit encryption, but nothing seems to work. Here's the debug output that i get when i try to con... | Check the permissions on your [CODE] file. They should be [CODE] . [CODE] Is my standard pattern Update: Check that your home directory is owned by you alone, ensure that your primary group does not have write access to your home directory. There is an attach vector where someone in your primary group could move your [... | 4 | 3 | 5,325 | 2009-05-19T22:36:31.910 | api_errors | serverfault.com | |
835,776 | How to nginx rewrite setting non trailing slash to trailling slash | i have problem with my rule on rewrite (redirect) rules in Nginx. this is my current setting [CODE] www.mysite.com/new/33/ -> it is okay www.mysite.com/new/33 -> error not found so, my question is: i want to redirect non trailing to trailing slash. | You need to make the final [CODE] optional by adding a [CODE] . For example: [CODE] See this useful resource on regular expressions. | 0 | 2 | 742 | 2017-03-02T03:32:54.930 | infrastructure | serverfault.com | |
79,740 | How would you encode missing pixels in image data? | I am working through an example on the MNIST dataset, and was just curious, if your image input data were missing some pixels, how would you encode it. Since the values are always positive, and normalized between 0 and 1, would it make sense just to encode it as -1 or something. Thanks | You'd substitute a statistical aggregator, such as the median or mean, for the missing data. Calculating the aggregator for a neighborhood region would "smooth out" the missing pixels. You wouldn't set it to -1 because lost pixels are effectively noise, which you want to suppress, not exaggerate. | 1 | 1 | 359 | 2020-08-04T03:48:52.450 | data_quality | datascience.stackexchange.com | |
89,820 | Windows 7 Auto login | Is it possible to configure windows 7 such that it will always auto login as a particular user - this includes when coming out of sleep or hibernation or after a remote desktop connection has been made - ie avoiding the console is locked message | Try this: From the start menu, in the Run... dialog, type [CODE] On the User Accounts dialog that opens, select the user that you want to automatically log in Uncheck the option [CODE] Click apply. You will be prompted for the password for the selected user. Click Ok, Click Ok again. Now whenever your pc starts, the se... | 0 | 2 | 910 | 2009-12-01T14:37:25.910 | infrastructure | serverfault.com | |
743,737 | Nginx+Passenger serving assets on sub uri | I'm serving a Rails application under a sub-uri like https://projects.mydomain.com/app1/ But my assets are not loading. here is my nginx config : [CODE] The application is loaded, with all URL/PATHes prefixed for /app1/ but the assets are not loaded. https://projects.mydomain.com/app1/assets/application-123456.css Does... | Got a friend's help. Here is how to works: [CODE] | 1 | 0 | 1,448 | 2015-12-17T15:02:13.130 | api_errors | serverfault.com | |
54,544 | In Powershell Retrieving Printed Message From SSMS | Our DBA team doesn't verify the backups using the below [CODE] (which can easily be done post-backup and takes almost no time, so I don't get why not): [CODE] They've had issues in the past, so even though we'd think they'd learn from it, they haven't. I created a Powershell script to do this because we have about 100+... | Capturing InfoMessage Output (PRINT, RAISERROR) from SQL Server using PowerShell The trick, as Jonathan points out, is that you need to have a listener attached to the connection manager listening for the print or error actions. [CODE] I also piped the output of adding a parameter to [CODE] as that was noise I didn't n... | 12 | 20 | 8,122 | 2013-12-05T21:07:24.420 | database_errors | dba.stackexchange.com | |
613,535 | how to handle this case if fetchmail fetches spam from yahoo, and postfix does not deliver because host does not exist | I have fetchmail collecting from yahoo and passing the mails to the local postfix server. If I have a 4xx Error , because for example the sender domain does not exist, fetchmail will try to pas this email forever to postfix and postfix will reject it forever with [CODE] first question: how do I have to setup fetchmail ... | Personally I avoid the whole local mailserver and have fetchmail running from my crontab and deliver straight to old-school procmail which in turn calls SpamAssassin, anti-virus and before filtering and dropping my mail in the correct Maildir: [CODE] | 1 | 1 | 507 | 2014-07-18T04:51:03.537 | infrastructure | serverfault.com | |
129,264 | Transaction Log file of the secondary database in Log Shipping grows fast and fills up disk space | I have a log shipping setup for DR. The transaction log file of one of the secondary databases, which is in restoring mode, is 7 times larger than the data file and is filling up the disk space. What are the possible causes and fixes? Note that it is the transaction log file of the secondary database in the DR site tha... | I have a log shipping setup for DR. The transaction log file of one of the secondary databases, which is in restoring mode, is 7 times larger than the data file and is filling up the disk space. What are the possible causes and fixes? Possible causes can be a heavy transaction or bulk load ran on the primary database w... | 1 | 0 | 1,256 | 2016-02-15T04:14:01.197 | database_errors | dba.stackexchange.com | |
222,647 | Strangely high writes per second | I'm experiencing some extremely strange behavior on one of our OLTP Servers. Just to provide a bit of background, we have an 'OLTP' which has many large and wide tables. We have 560 tables within it which have more than 100 columns within them, and unfortunately as it is an outsourced application there is little I can ... | Start with the open source sp_BlitzCache (disclaimer: I'm the maintainer of the project.) It's a script that analyzes your cached execution plans to find the most resource-intensive ones, and then tells you about design issues in those queries. You don't have to set anything up in advance - just install sp_BlitzCache a... | 0 | 1 | 1,280 | 2018-11-15T15:34:52.533 | bi_errors | dba.stackexchange.com | |
108,784 | Any way to map WebDAV with SSL as network drive in Windows XP? | I'm trying to map WebDAV with SSL as a network drive in Windows XP. (I've been at this for several hours) I can read the share just fine using a browser and with Network Places, but it refuses to mount as a network drive. I've tried it using the Windows explorer interface and net use. Net use with the \\server@ssl:443\... | Here's how I got it working on Windows Server 2008 R2. The Web site is pointed at C:\inetpub\webDAV. Authentication used is Windows Integrated WebDAV is Authorized to for All Users, with Read, Write permission. Command I use is "net use \win-2k8wss1@ssl:443" Error message: 53 means "The network path was not found." Err... | 2 | 0 | 18,912 | 2010-02-02T16:12:23.173 | infrastructure | serverfault.com | |
780,033 | Strange DNS error | Google reports me several strange errors on a subdomain of my site : [CODE] (the subdomain with the issue is [CODE] ) Screenshot of the google console here On all my other subdomains, I have no issues (they have the same configuration) Just [CODE] suffers this DNS problem although i have the same config for several yea... | If it is an off and on issue like that, then it is going to be your DNS provider. You mentioned that you haven't changed your records and have other domains setup the same so it would be the DNS provider or Google reading the records. Using mxtoolbox.com everything looks fine right now also, A record lookup works and t... | 1 | 2 | 477 | 2016-05-31T14:30:10.973 | infrastructure | serverfault.com | |
1,129,743 | sendmail: server shows failures due to bad client certificate | My sendmail server (FreeBSD, compiled against OpenSSL) is refusing to negotiate TLS with one particular set of clients. Log messages look like this: sm-mta[92474]: STARTTLS=server, error: accept failed=-1, reason=sslv3 alert bad certificate, SSL_error=1, errno=0, retry=-1, relay=xx.example.com [XX.XX.XX.XX] Other than ... | You could use OpenSSL to query the remote server. For example, to see the certificate on one of Google's mail server: [CODE] should show something similar to: [CODE] You can add [CODE] to get all the certificates in the chain. | 2 | 1 | 746 | 2023-04-26T15:30:30.243 | infrastructure | serverfault.com | |
279,602 | How to quantify the improvement in application performance after installing a squid proxy | We conducted a load test on our web application and we found that once the load goes beyond 40 users the server response time goes up drastically. (It was a 256MB RAM cloud machine). So we installed squid reverse proxy in front of the apache server. Interestingly when we started load testing, we realized that the serve... | Squid access/cache log parsing is one way to do that, but there are other ways, too. You should use Squid SNMP MIB (if you already use SNMP for monitoring your servers) for general statistics about hit/miss ratio. [CODE] is an excellent command line tool for querying Squid status. It can show you cached objects, Squid ... | 0 | 1 | 617 | 2011-06-12T12:29:34.497 | infrastructure | serverfault.com | |
658,235 | gnutls-cli hangs when testing an ssl connection | I'm running the command [CODE] and the output is [CODE] and then a blinking cursor, it just hangs there. Using strace, I see that after several lines of code are executed, it reaches a point where it just prints select(6, [0 5], NULL, NULL, {0, 50000}) = 0 (Timeout) Over and over and over again. I tried upgrading gnutl... | You command line is wrong. Instead of [CODE] it must be [CODE] See usage: [CODE] So it actually established a plain connection and waited for EOF from the terminal and only after that it would start with the SSL handshake. | 0 | 2 | 1,394 | 2015-01-08T21:59:28.507 | database_errors | serverfault.com | |
2,499 | Testing/Verifying Google Analytic code | I need help figuring out a test methods for Google Analytic. Our client pushes out a lot of marketing campaigns and they love using GA to track what is working, what is not working and where to focus their efforts next time. The client was under the impression that Google Analytics code could not be tested on a Dev or ... | I used to have a very similar problem. I've found a couple of things work. You're already doing the right thing by scanning the pages for the javascript. You're right, the wait time can be too much, especially when you need quick turn arounds. I've found that the Google Analytics Debugger add on for Chrome to be the mo... | 8 | 4 | 2,055 | 2012-01-26T03:17:17.923 | data_quality | sqa.stackexchange.com | |
1,049,805 | Improving Performance of my SQL Database | Using mysqltuner i'm a bit worried at the maximum of memory sql seems to want to be able take... I just want to tune SQL to run better and understand how to do it myself. Here's my mysqltuner results; [CODE] My.cnf file is basic as i don't understand all the different variables; [CODE] Any ideas or advice? | If you are having performance problems, the likely solution involves indexing and/or reformulating queries. Suggest you find the slowest query and let us advise. Meanwhile, two settings to adjust in your 'small' 2.8GB of RAM: [CODE] should be about 500M. [CODE] | 1 | 0 | 1,678 | 2021-01-14T11:51:30.980 | database_errors | serverfault.com | |
435,968 | Should test cases show desired behavior or actual/current behavior, or can they do both? | Let's say I want to add tests to a software that has some flaws/bugs. I want to add the tests before I fix the bugs. And I want to actually merge them in the main branch, not just have them in a feature branch or bugfix branch somewhere. (EDIT: See below as to why I might want to do this.) If this is relevant, I am wor... | Add the tests at the same time that you fix the bug (your option 4). The final tests would then describe the desired, non-buggy behavior because they would pass. This is pretty typical for bug-fixing. Unless you're dealing with a massive bug, I can't see much reason to spend effort writing and merging tests that you kn... | 0 | 6 | 537 | 2022-01-14T02:52:24.530 | pipeline_ops | softwareengineering.stackexchange.com | |
176,411 | Multi-field unique constraint where we include one or another field based on nullity | Suppose I have four columns [CODE] I would like the following constraint: If [CODE] is [CODE] , then [CODE] , [CODE] , [CODE] must be unique. If [CODE] is not [CODE] , then [CODE] , [CODE] , [CODE] must be unique. Is this possible? | First, for constraint number 2, nothing special is needed. A [CODE] constraint ignores - and accepts - [CODE] values so a simple unique constraint on [CODE] will work just fine enforcing that. For constraint number 1, I don't think there's a way with DDL in version 5.6 so your best option is probably the trigger soluti... | 4 | 6 | 645 | 2017-06-15T23:30:07.117 | data_quality | dba.stackexchange.com | |
326,847 | Why do consecutive .bak full backup files increase in size? | First, this is NOT a duplicate of this question . In that question the person was over-writing the file each time and the solution is to use INIT or NOINIT. In my case we are generating a unique filename with each backup - a timestamp is appended to the filename. We have an agent job that runs full backups nightly for ... | This seems to have been a particular issue where [CODE] was reporting [CODE] on two replicas in the Availability Group, and [CODE] on the third replica. In my case, trying to determine the active transaction yielded no results - read the whole comment thread against the question for details. In the end I rebooted that ... | 0 | 0 | 119 | 2023-05-07T23:14:29.580 | data_quality | dba.stackexchange.com | |
705,988 | group permissions on directory being ignored for user | It seems that there is a Linux user (on an Ubuntu 12.04.4 server) who is unable to access a shared directory, even though that user belongs to the group which owns the directory. Here is an example session: [CODE] It also appears to be the case that this user is the only group member to be experiencing this permissions... | I know this issue was 10 months ago but I would just like to post that I had a very similar issue recently. I added a user to a group and the user still had no access to the folder. The solution was simply to log off from the user and then log in again. Based on your answer in the chat http://chat.stackexchange.com/tra... | 0 | 1 | 428 | 2015-07-15T16:26:26.413 | infrastructure | serverfault.com | |
35,616 | Create index if it does not exist | I am working on a function that allows me to add an index if it does not exist. I am running into the problem that I cannot get a list of indexes to compare to. Any thoughts? This is a similar issue to the column creation one that is solved with this code: https://stackoverflow.com/a/12603892/368511 | Index names in PostgreSQL Index names are unique across a single database schema. Index names cannot be the same as any other index, (foreign) table, (materialized) view, sequence or user-defined composite type in the same schema. Two tables in the same schema cannot have an index of the same name. (Follows logically.)... | 87 | 132 | 136,174 | 2013-02-27T20:39:14.980 | warehouse_errors | dba.stackexchange.com | |
59,530 | Streaming replication between postgresql 9.2 and 9.3 | Does anyone know if it's problematic to have a postgresql 9.3 slave setup to do streaming replication from a postgresql 9.2 master? | In general, log shipping between servers running different major PostgreSQL release levels is not possible. It is the policy of the PostgreSQL Global Development Group not to make changes to disk formats during minor release upgrades, so it is likely that running different minor release levels on primary and standby se... | 1 | 6 | 4,013 | 2014-02-24T13:30:10.760 | database_errors | dba.stackexchange.com | |
45,285 | Loss Function for Probability Regression | I am trying to predict a probability with a neural network, but having trouble figuring out which loss function is best. Cross entropy was my first thought, but other resources always talk about it in the context of a binary classification problem where the labels are $\{0, 1\}$ , but in my case I have an actual probab... | Given that you are trying to predict a scalar probability value, the cross-entropy formula you listed in the question is only valid if the target variable is discrete. So if your question is "predicts the odds of drawing a matching card from a deck", it will be fine. The main difference between cross entropy and MSE wi... | 9 | 0 | 3,540 | 2019-02-09T00:14:07.110 | data_quality | datascience.stackexchange.com | |
961,711 | AWS EC2 Amazon Linux is using swap even if it shouldn't | I have a few ECS servers running various apps. After a few mysterious outages I noticed that the instance is swapping hard and it consumes its IO Burst Balance rendering the instance useless. The facts: the machines are [CODE] and [CODE] instances with 2GB or 4GB RAM there is more than enough real RAM on the instances ... | in my imagination with my settings the SWAP should remain all free all the time except in case of some unfortunate event when the total memory usage would exceed the available memory An out of memory condition is too late. Reclaim by paging out is extremely slow, and Linux VMM tries to stay away from OOM. Instead, a sl... | 2 | 0 | 1,548 | 2019-04-05T14:38:57.103 | pipeline_ops | serverfault.com | |
489,560 | Create a SCOM Monitor/Alert with a threshold relative to a performance counter? | Is it possible to have a SCOM monitor that is related to a performance counter. For instance, we monitor a WCF Service Operation that gives us an indicator of our system's workload ("Calls Per Second"), can we create a Monitor of errors that is related to this figure, a percentage say? Surely this is a pretty standard ... | Unfortunately the standard SCOM modules don't provide a way of calculating the ratio of two performance counters, or using a performance counter as a threshold. Here's an old TechNet thread on the topic - nothing has changed in SCOM 2012. One option is to author a custom monitor that uses a script module to perform the... | 0 | 1 | 4,567 | 2013-03-20T08:39:13.617 | infrastructure | serverfault.com | |
111,907 | Converting old SQL Server outer join syntax | I'm a Power Builder (PB) developer. I've migrated PB from 10 .5 to 12.5, and now I need to migrate the stored procedures from SQL Server 2005 to 2012 as well. I get a invalid expression error when I run the procedures in Power Builder. We have previously been using a lower database compatibility model in 2005, which al... | I just quickly grabbed your query and re-wrote it without looking at how you rewrote it. [CODE] It seems like you have the same thing as me (or at least basically), so I would say you are good. Obviously if you could test that would be best but I feel comfortable that it is the same thing logically. | 2 | 2 | 1,520 | 2015-08-22T12:26:20.900 | database_errors | dba.stackexchange.com | |
365,530 | What is generics abuse? | While reviewing some code, I noticed the opportunity to change it to use generics. The (obfuscated) code looks like: [CODE] This code could be replaced by generics, like so: [CODE] In researching the benefits and shortcomings of this approach I found a term called generic abuse . See: Protecting the uninitiated (develo... | When generics are appropriately applied, they remove code instead of just rearranging it. Primarily, the code that generics are best at removing is typecasts, reflection, and dynamic typing. Therefore generics abuse could be loosely defined as creating generic code without significant reduction in typecasting, reflecti... | 37 | 88 | 10,974 | 2018-02-07T17:23:03.857 | api_errors | softwareengineering.stackexchange.com | |
162,377 | Xen Bridge only working when IP Assigned | Just had an (in my sense) obscure situation. I have a Xen Server with bridged networking. Everything works fine since month. A while ago i configuresd a second bridge. only some DomUs get an channel on this bridge - my Dom0 doesn't need to / should'nt use this bridge. So just 5 minutes ago while rebooting the xen host ... | I don't understand you description exactly, but having some experience with Xen tells me that nearly everything depends on the Dom0 - all the devices are in fact running through it, so if you disable a bridge interface in Dom0, it may be like turning it off. Xen is only the hypervisor - it allows computer to run multip... | 0 | 0 | 405 | 2010-07-20T20:49:19.627 | infrastructure | serverfault.com | |
837,463 | Linux ethernet bridge can be accessed behind a router | I run Debian 8 and need to bridge a tap interface [CODE] to [CODE] (trying to setup an OpenVPN server). I use the standard bridging script from OpenVPN help page: [CODE] where 192.168.0.140 is the IP address reserved to this server by the router's DHCP. The router (192.168.0.1) is used to access the Internet. When I ru... | Alright, the answer is pretty simple. When the bridge goes up, the route for default gateway disappears. So [CODE] works as a charm. | 1 | 0 | 746 | 2017-03-10T12:05:17.977 | infrastructure | serverfault.com | |
750,502 | Samba server permissions not work | I have Samba server installed on Ubuntu 14.04 LTS I set up some smb shares for everyone. For example this is a part of my smb.conf: [CODE] This shared folder can open everyone user (it works without auth) and everyone have read/write permissions. And now my problem. When some user create new folder in this share (\myse... | Use: [CODE] instead. Don't forget to reload the configuration. | 1 | 1 | 1,118 | 2016-01-20T15:07:55.670 | infrastructure | serverfault.com | |
85,078 | how to forward dns alias to hostname:port? | Possible Duplicate: How to use DNS to redirect domain to specific port on my server My web application is running on myserver.mydomain:10000 I would like to make it available on the intranet as mywebapp.mydomain. Reading Forward port to another Ip/port , I have looked into rinetd, but I don't fully understand how I can... | If you don't want to create another IP, then all you can do is install a reverse http proxy on the main IP and a name based virtual host to route the traffic using mod_proxy. Here is how you can do it with apache, almost any http server can do it, other popular alternatives are squid, nginx, lighthttpd, etc. [CODE] | 18 | 24 | 169,659 | 2009-11-16T07:32:10.953 | data_quality | serverfault.com | |
344,442 | Dependency Injection with default Construction | Most of my production code has fixed types of dependencies, illustrated below: the [CODE] for example, at run time, always depends on the same [CODE] . Therefore, I am wondering what I gain by having the [CODE] force whoever constructs it to inject its dependencies as opposed to provide the option to inject the depende... | Even if each class has only has two dependencies, if the dependency hierarchy depth is 3, as for example in the House -> Bedroom -> Bed path, you have to instantiate 2^3 objects in your top level class which seems unfeasible for large projects with a dependency hierarchy depth of 10 or more. Make no mistake, you're sti... | 6 | 5 | 2,593 | 2017-03-18T17:06:06.540 | api_errors | softwareengineering.stackexchange.com | |
47,918 | strange "using where" in simple query | I have a table with this structure: [CODE] primary key of this table is : PRIMARY(user_id, group_id) I have simple query: [CODE] it has [CODE] , according it has additional disk seek,I know [CODE] concept, and Also I know it is not terrible , but conceptually I want to know why this query has [CODE] , although the cond... | See the documentation . Using index The column information is retrieved from the table using only information in the index tree without having to do an additional seek to read the actual row. This strategy can be used when the query uses only columns that are part of a single index. If the Extra column also says Using ... | 0 | 1 | 109 | 2013-08-11T09:52:07.113 | warehouse_errors | dba.stackexchange.com | |
308,574 | How to read HP's manual about ram modules? | On page 48 in this user guide, it is explained in which order memory modules should be installed for an HP DL385 server with AMD Opteron CPUs. There are 12 banks per CPU, and I have 6 x 4GB + 2 x 2GB modules for each CPU. How should the chart be read for this complex case? Update The 2GB modules are RDIMM and dual rank... | CPU 1 4 GB in A (1) 4 GB in B (7) 4 GB in C (4) 2 GB in D (10) 4 GB in E (3) 4 GB in F (9) 4 GB in G (6) 2 GB in H (12) repeat with CPU 2 | 0 | 1 | 196 | 2011-09-06T14:42:09.963 | infrastructure | serverfault.com | |
574,988 | SSH to local without password | We have some scripts that need to rsync without entering a password. I am trying to SSH to a local machine (itself). I cannot get it to work. It is always asking me for a password. It works fine SSH-ing to a remote machine. I am running CentOS 6. The user's home directory is in a non-standard location (i.e. it is not u... | When you use keys, if the perms on the [CODE] directory and/or the [CODE] files are not correct then ssh falls back to passwords if it is allowed to do so ( [CODE] ). Check that the permissions on ~./ssh are 700 and that the ~/.ssh/authorized_keys perms are 644 (or tighter). As you've identified SElinux as causing the ... | 0 | 1 | 474 | 2014-02-12T12:08:11.787 | infrastructure | serverfault.com | |
179,365 | Users in the built-in groups not getting permissions on workstations in a W2K3 Domain | I've been pulling my hair out over trying to get certain users onto DHCP classes to either filter their internet or allow unfiltered internet access. Basically I've got a transparent squid proxy running on 192.168.1.235 and gateway of 192.168.1.1. I've established some DHCP classes: "rstrc" and "unrstrc" and some vbs s... | Needed to be part of the domain admins group. http://ss64.com/nt/syntax-security_groups.html | 0 | 0 | 187 | 2010-09-09T01:28:19.453 | infrastructure | serverfault.com | |
183,716 | access localhost stopped working after I installed MAMP | I had configured my machine all access localhost I need some accessed "http://*.localhost.com:3000," * - I put the names of some projects and instances. I needed to run a PHP server and installed MAMP Pro, but after I ran the php server can't access my others servers more. The http://localhost:3000 it works, but when I... | Can you ping any of the subdomains? If so, the problem is with whatever listens on port 3000 not being configured to listen for those domains. In Apache it's vhosts, with RoR I'm not sure. | 0 | 0 | 555 | 2010-09-22T19:04:20.350 | infrastructure | serverfault.com | |
331,048 | Indexing system vs raw DMBS connection | I have created a new dataset that has 11,000,000+ rows with 4 pivot tables in MySQL. The tables are not that deep, only 6 - 12 cols per. My question is I've set up the Lucene Apache SOLR to index the data, and it work's great for searching .. BUT I haven't noticed a dramatic load time in searches. If I run a raw SQL co... | At what point is it more beneficial to use a indexing engine vs scripting a raw query yourself? An abstracted layer for indexing is never going to be better or more performant than a correctly architected database structure. The purpose of it is instead to be a tool to make it easier for someone who is inexperienced wi... | -1 | 0 | 26 | 2023-09-08T20:31:18.747 | database_errors | dba.stackexchange.com | |
275,256 | System Stats out of sync | I have two databases that are in an availability group, one as the primary replica and the other is the secondary. I have a store procedure that returns the following error. DBCC execution completed. If DBCC printed error messages, contact your system administrator. Msg 2767, Level 16, State 1, Procedure xxxx.sys.sp_ta... | This is an outstanding bug in SQL Server which has been ignored for quite some time, unfortunately. You can track down the offending statistic and drop/recreate it, or as some others in the above thread have suggested: Clearing the userstore_dbmetadata related pools on ASYNC commit resolves the issue. [CODE] Or create ... | 6 | 6 | 4,633 | 2020-09-09T20:28:21.127 | warehouse_errors | dba.stackexchange.com | |
60,837 | Construct a multivariate neural network | I want to build a neural network with a data input of 15-18 variables. I want to use the model for anomaly detection based on the reconstruction error. I've done some tutorials now but the data was always already given so I have to do the very first step on my own now. Thus, I wonder, how do I handle the multivariate d... | I do not understand your problem, the first layer, i.e. input layer, of your neural net must have a size equal to the number of variables you have. The last layer, i.e. output layer, must have a size which is equal to the number of values you want to predict. Please be kind and tell me what you want to know more specif... | 0 | 1 | 84 | 2019-09-26T14:47:37.980 | data_quality | datascience.stackexchange.com | |
4,602 | Explain Microsoft Licensing | Possible Duplicate: Can you help me with my software licensing question? I think most of us have to buy Microsoft licences. I suspect all of us have got confused by Microsoft's licensing system before now - I know I have. Can anyone explain it in straightforward terms? I suggest making one answer for one bit (e.g. Desk... | This question is like asking a legal question on a message board -- a bad idea. There is no simple, concise description of Microsoft licensing because there is nothing simple about it. Even with the excellent Microsoft account team that I regularly work with, they consult licensing specialists about all but most trivia... | 6 | 3 | 3,162 | 2009-05-05T11:51:30.587 | database_errors | serverfault.com | |
642,789 | How to force PowerShell to not allow an interactive command window | I am a Citrix administrator and would like to restrict the general user population on our servers from using PowerShell to run their own scripts, or to use it interactively. We are already disallowing the use of the command prompt via GPO , but with PowerShell available, that's basically useless. I've found that Powers... | I think you are misunderstanding the use of the -NonInteractive switch; you can still run [CODE] and get an interactive prompt. The noninteractive switch is intended for automated scripting scenarios, where you don't want powershell to send a prompt to the user and wait for a response. For example, in a non-interactive... | 7 | 12 | 37,096 | 2014-11-07T16:27:30.283 | infrastructure | serverfault.com | |
288,945 | How to warm a MongoDB index | We're running a huge MongoDB with a large index (made of of four fields) which was created ad-hoc and should now be superseded by slimmer one (of the first two fields). But the problem is we can't just delete the old one as the warmup of the new one may take hours (or days!). We have two secondary instances, is it poss... | I tried this on a collection with millions of documents, and hope this is going to work in a multi-billon document collection: Create the index in the background. This can seriously hurt your [CODE] s. We got timeouts for the duration of the index creation. Clear the plan cache . Create a script to scan all your data w... | 1 | 0 | 563 | 2021-03-30T11:06:09.750 | database_errors | dba.stackexchange.com | |
351,257 | Installing MySQL 5.6 on Ubuntu | I need to install mysql 5.6 on my ubuntu machine for development reasons (the newest version contains features that I need to incorporate into some web projects). But I am having some issues. I've been following this tutorial which is not specific for version 5.6 but I figured it would be about the same: http://www.ova... | For the [CODE] error, you may need to make sure that the binaries are in your $PATH. Try checking using [CODE] . If it is not on your path, you should add it to your profile (if you're using bash, this will probably be [CODE] ): [CODE] As for the PID error, you might check [CODE] to see if it gives you any hints as to ... | 0 | 1 | 1,987 | 2012-01-18T16:11:16.293 | database_errors | serverfault.com | |
508,186 | Configure apache as proxy and remap one domain | For local test, I'm using Charles proxy, for those who don't know about it is a tool to debug HTTP requests. It can be configured to act as a proxy and intercept requests/responses and is able to do several things with it, like the most important for me, "remap" a domain to another. It means that when I want set up the... | Shooting from the hip, the [CODE] should be the thing you are looking for. The intent of that directive is to allow one proxy to forward some requests to next while serving others directly. Untested, but it should be possible to use this to your advantage: [CODE] NB! : Be sure to fill in some real IP numbers or other a... | 0 | 1 | 509 | 2013-05-16T07:20:17.007 | infrastructure | serverfault.com | |
234,924 | When I connect to DB, always connects as tempdb | I am trying to run a sybase DB query from a jsp session. I can connect to the DB fine, but when I run my query, by default it always runs against tempdb. Is there a way I can make a connection to a different DB and not by default connect to tempdb? The aim is to be able to run a query for any table chosen by the user f... | It seems the DBA who has created your login has set tempdb as your default database. You may request him/her to do the change at login definition level as per this article . By default, if none of them are mentioned, user connects to master database. You may use below command: [CODE] Kindly note that above command need... | 1 | 1 | 138 | 2019-04-16T13:52:52.543 | database_errors | dba.stackexchange.com | |
45,206 | Faster to connect single/direct drive to motherboard or RAID controller? | I have a PERC 5/i RAID controller currently hosting two drives in RAID 1. I am about to add a third drive in "direct" mode, just a normal physical volume. Would performance be better if the drive is attached to the motherboard's controller or to the RAID controller? A co-worker suggested that the RAID controller's cach... | In terms of performance I think the difference between the direct attachment to the motherboard and the PERC 5/i is in favor of the RAID card. How much in favor would be pretty difficult to guess, but I don't see any obvious performance related penalties thus far. I'd say that the features of the PERC 5/i itself like t... | 1 | 2 | 289 | 2009-07-24T15:01:02.697 | infrastructure | serverfault.com | |
588,623 | Is nfs good to share disk images over the internet? | I have an image server, this server contains disk images to be used by virtual machines. The server has to allow the runtime creation of new images, so iscsi is not good as it requires to restart the iscsi server in order to introduce a new target and I don't want that (I could't find any api to edit the /etc/iet/ietd.... | NFS can run over the Internet, but not well. It's simply not optimized for the sub-par WAN links and possible traffic loss associated with it. I agree with Andrew B on this one. There's usually at least a server on the same LAN segment for handling images in a given location. NFS is far too unreliable (any WAN-based sy... | -6 | 1 | 9,082 | 2014-04-12T17:53:13.240 | infrastructure | serverfault.com | |
613,609 | Allow specific SIP connection FreePBX | Hey I am using FreePBX with firmware: 5.211.65-14 and service pack 1.0.0.0 On this asterisk server I have everything up and running, but inbound phone calls might be rejected: [CODE] I talked to my service provider and they said this happens because they use a sip proxy, so my trunk may have connected to server A, but ... | The solution was to connect to every voip server they have and then adjust your internal routes. There is nu other way to do this. If you don't do this, asterisk might connect to Server A and get a response from server B. He would deny server B. In my case I set up two connections, one to server A and one to server B. ... | 0 | 0 | 5,395 | 2014-07-18T11:36:14.693 | infrastructure | serverfault.com | |
116,429 | Microsoft SQL Server Management Studio - default table view, default table parameters | A friend has recently started teaching me how to design relational databases. Long story short, as I am not SQL-capable yet, we're using SSMS and lots of right-clicking. And I am frustrated with the stuff - 95% of the new tables I make have ID as first column (non-nullable INT primary key) and I have to change datatype... | I'm not sure you can automate this in SSMS. Why not take the opportunity to learn a little SQL? The script below will create a table with ID as the primary key (int) - you can then just add the extra columns you need (refresh your table list first): [CODE] | 3 | 1 | 218 | 2015-09-29T09:24:07.603 | database_errors | dba.stackexchange.com | |
95,630 | XAMPP server on Linux uses "nobody" user | I have XAMPP server installed on Red hat . I find the when ever I execute PHP scripts it executes from the owner of "nobody". Now the problem is I need to use sudo to run some process inside the PHP script . if i use sudo , this owner "nobody" doesnt have the permission . How do I run the scripts with different owner n... | You should avoid XAMPP. RedHat, like any common distro already provides Apache, MySQL and PHP with real security support and correct integration. http://www.apachefriends.org/fr/xampp-linux.html#1053 What you want is probably this sudo parameter, but I don't think it's a good idea too: [CODE] | 0 | 3 | 893 | 2009-12-18T08:17:19.557 | infrastructure | serverfault.com | |
134,328 | AlwaysEncrypted Conversion Fails | I'm trying to encrypt a column with AlwaysEncrypted and I get the following error. Could not deploy package. Warning SQL72012: The object [AlwaysEncryptedDemo] exists in the target, but it will not be dropped even though you selected the 'Generate drop statements for objects that are in the target database but that are... | So, this actually wasn't a bug. There is (was) a trigger on the table that was changing data. The changing data is what caused the conversion to fail. Disabling the trigger did not help, it had to be dropped. | 1 | 1 | 578 | 2016-04-04T20:17:31.433 | api_errors | dba.stackexchange.com | |
147,966 | Do I need to disable access to a publisher database when setting up SQL Server 2000 Transactional Replication? | I have a production database i.e. where there are constant updates and I've configured this to be published to another server using Transactional Replication. When I configure transactional replication I've been doing the following: disable access to the source database backup source DB then restore to subscription ser... | The simple answer is No... You do not need to disable access to the system etc. Here is why and how it works... When you setup replication, the publisher creates a Snapshot of the data at that very moment you create the publication. There is also a Log Reader that is running at the same time with Transactional Replicat... | 0 | 1 | 84 | 2010-06-03T19:00:17.740 | database_errors | serverfault.com | |
636,356 | How can i set SCRIPT_NAME when using proxy_pass with nginx | I have a perl catalyst application that i'm mounting on a specific url (vs mounting on a subdomain) and am having problems setting SCRIPT_NAME on the request to the backend. This affects the urls generated by the application. It needs to know where it is mounted so that it can properly generate the urls. So my chain is... | The burden does not lie with nginx. Proxy or FastCGI both pass information over a socket, that gets interpreted. FastCGI is not that much different, except there's a contract that specifies how information that is to be put in the CGI application is to be transmitted and processed. The SCRIPT_NAME is one of them. If yo... | 1 | 0 | 3,695 | 2014-10-12T02:57:00.880 | api_errors | serverfault.com | |
46,668 | Group By primary key or DISTINCT increase query time over 1000x with limit | Also see https://stackoverflow.com/questions/17741167/hibernate-jpa-improve-performance-of-distinct-query but I realized this is mainly a PostgreSQL issue. My application uses a 3rd party extension to PostgreSQL to for searching chemical structures. This is in general slow. I can not change the SQL directly as the appl... | First off, [CODE] / [CODE] without [CODE] are of limited usefulness, since the order is arbitrary and can change any time (when [CODE] runs or when the table is manipulated in at any way). It is only somewhat reliable with read-only tables. That's fine if you don't care which rows you get back, but it may break paging.... | 4 | 3 | 2,027 | 2013-07-19T10:57:11.213 | database_errors | dba.stackexchange.com | |
332,127 | mysql: database suddenly loading forever | so I downloaded a public database. example.myd (10.2GB), example.myi (9.7GB) example.frm (21KB). I simply installed xampp. Mysql, phpmyadmin etc working perfectly. I just put these 3 files into the database which I created and it worked fine. Loading time was like 2-3 seconds which are fully okay for that big of a data... | #126 - Index for table '.\chris\101m.MYI' is corrupt; try to repair [CODE] Plan on converting from MyISAM to InnoDB so you won't ever have to do that again. In the MyISAM engine, the table [CODE] is represented by 3 files: [CODE] | 0 | 0 | 251 | 2023-10-13T23:55:46.703 | database_errors | dba.stackexchange.com | |
942,043 | How to prevent a Port from being used while a service restart | I'm using Ubuntu 16.04 servers. Each server hosts multiple services. Sometimes, when a service is restarted, it fails to bind to the port and says that the port is already in used. Indeed, some system service (or some other service which downloads tons of stuff from multiple websites) might be using the port at that pa... | option 1 : tune /proc/sys/net/ipv4/ip_local_port_range to make sure the port you want your app to listen to is outside the range option 2 : use 1 ip per service you are hosting, and ensure that your application actually binds its ip. this one is ok if you don't have a lot of services concerned. | 0 | 0 | 548 | 2018-11-28T20:10:07.860 | infrastructure | serverfault.com | |
202,032 | Update a table using values from another table | I have two tables with structure [CODE] I am trying to update the [CODE] Column of first table with value joined by [CODE] while comparing the [CODE] . I was able to get the values using the query [CODE] but when I try to [CODE] table1 I am getting a [CODE] . [CODE] Can somebody help with this? | Since you have not supplied any data, I've prepared next example: [CODE] Use next sentence: [CODE] This is final result: [CODE] dbfiddle here Have a look at MySQL docs about UPDATE syntax: [CODE] For the multiple-table syntax, UPDATE updates rows in each table named in table_references that satisfy the conditions. Each... | -1 | 2 | 6,978 | 2018-03-22T17:12:16.127 | warehouse_errors | dba.stackexchange.com | |
525,490 | Access IIS only over VPN | I was wondering if it's possible to make a VPN to connect to IIS on a single server. I want IIS to refuse connection if it's connecting from another address than the VPN. Is that possible? I've searched on google, but nothing came up... | You can set up a VPN whichever way you want as long as it consistently gives the same IP address (or one of a range of IP addresses if you are alright with setting a firewall rule for the whole range). There are lots of ways to do this (RRAS, openvpn, etc.). The VPN server endpoint could be on the IIS server or elsewhe... | 0 | 1 | 6,189 | 2013-07-23T02:42:08.790 | infrastructure | serverfault.com | |
48,955 | Pick one single row each time from either table? | I will run a query and get a list of aID and based on that I will try to match below tables.For each aID I just want one record either from tblGAlert or tblEAlert based on [CODE] and [CODE] depends on which time comes first. [CODE] Sample data I say for tblGAlert 1,12,1122,'Do',2013-07-13 14:30:19,2013-07-13 15:30:19,'... | First of all, this is my first post on dba.stackexchange.com, so I apologize in advance if there is any etiquette that I fail to follow, and am open to your input as to how I can improve future posts. Best database design practices would call for consolidating the two very similar tables into just one table, like sa555... | 1 | 3 | 2,037 | 2013-08-29T15:52:14.683 | warehouse_errors | dba.stackexchange.com | |
34,122 | KPI's for Programmers | Do you know any Key Performance Indicators for Developers? What should be measured and monitored? | Consider the following truth: you will get exactly what you measure and monitor. With that in mind: Terrible things to measure Lines of code - Elegant code has a concise nature to it. Lines of code encourages bloat, copy and paste, or even worse, code for the sake of code. Time-to-solution - Code done quickly contains ... | 30 | 41 | 38,782 | 2011-01-06T03:22:19.527 | api_errors | softwareengineering.stackexchange.com | |
37,939 | Is there any good browser plugin or tool to quickly identify any security issues of a web site? | I'm working on a web project and need to give a quick update on how the security of the web site. So is there any tool or browser plugin to do a quick scan for my web project and get an analysis report. | Yes for a few things but overall really I feel the answer is no single tool for what you seek. Reviewing security is a manual process because it is is a multi-faceted process. It will frequently involve using various tools but there is not an overarching tool you can use to simply run a security report that I am aware ... | 3 | 4 | 163 | 2019-02-24T13:45:00.173 | data_quality | sqa.stackexchange.com | |
172,847 | How does the transaction log work in SQL Server when i run a DML | I would like to ask you something about a query execution in SQL. in general, I know that when I run a SELECT query I mean a view, this is loaded in cache memory then is parsed, compiled and then the query optimizer applies improvements based on execution plans so for that we have also the support coming from buffer po... | Yes, [CODE] statements can in fact use space in the tempdb transaction log, as temporary working space to complete the query: The Transaction Log (SQL Server) : Long-running transactions might also fill up tempdb's transaction log. Tempdb is used implicitly by user transactions for internal objects such as work tables ... | 1 | 3 | 427 | 2017-05-05T19:10:05.210 | database_errors | dba.stackexchange.com | |
551,167 | Clean Wordpress installation shows Internal Server Error 500 | I'm trying to install Wordpress installation on my dedicated server. Copied all files, but it shows Internal Server Error 500. Logs shows this: [CODE] I use PHP 5.4.21 from remi repo + php_fpm_event + Apache 2.2.23 + nginxproxy 1.5.6 on CentOS 6.4 64-bit. I've tested the same config on my test server and it worked fine... | Commented: [CODE] inside php.ini and it works again ;) | -1 | 0 | 703 | 2013-11-06T18:49:13.617 | api_errors | serverfault.com | |
287,387 | How do I recover from Mariadb(10.4.18) binlog corruption | I have a 3 node Mariadb Galera cluster running Mariadb 10.4.18 on ubuntu 18.4. I applied updates to one of the nodes this morning and now Mariadb doesn't start on that node with the following error. [ERROR] I/O error reading the header from the binary log, errno=175, io cache code=0 [ERROR] I/O error reading the header... | Once it became clear that the cluster had been working properly right until the reboot, I restored the node to the last backup and let Galera bring the node back up to date. In the end it was came back very quickly. | 1 | 0 | 404 | 2021-03-20T10:39:04.587 | data_quality | dba.stackexchange.com | |
440,496 | Ok to edit task's xml file in c:\windows\system32\Tasks? | I wrote a PowerShell script that check the executable in the tag for each task in the Task directory and mark the TRUEorFALSE tag as false/true depending on the validity of the digital signature of the executable. After reading each task, the script re-saves the task file with the same name, type and location. Now my i... | This is a security feature. A person or malicious program could edit a task file and insert the location to a hostile program. Windows creates a hash of the task file's various attributes and contents, and stores it in the registry. If the stored hash differs from the calculated hash, Windows prevents the task from run... | 2 | 3 | 14,471 | 2012-10-20T12:27:00.120 | data_quality | serverfault.com | |
1,044,514 | Hyper-V Create Virtual Machine Failed | I have a windows 2012 R2 server with Hyper-V as a role. The server has 6 vm already working. If I use the domain administrator or the local administrator (wich is also in the hyper-v administrator group) to make a new virtual machine i get a very disturbing, undocumented, and not present in the windows event viewer, ER... | I seem to have figured out after some attempts. The issue in my case is caused by the fact that the machine has only 10 GB of RAM available. So the solution is: shutdown every other vm. generate a vm with 512 MB dynamic. power up all the vm. And then Increase the number of cores and the amount of ram to the maximum ava... | 0 | 0 | 1,119 | 2020-12-01T10:43:24.353 | infrastructure | serverfault.com | |
260,752 | Explicitly define enum values, even if the default value is the same? | There are times when an enum's values are important: it is not necessary for them to be unique, they also need to have specific values. In such cases, should the values be explicitly defined, even if they coincide with the defaults? An example: [CODE] Imagine that for whatever reason your application assumes that [CODE... | This is very much a judgement call, but I would agree with you that explicit values are the way to go, plus a comment at the start explaining the significance of the explicit values. As an example of a prominent project that is doing it this way, look at Clang's AST serialization. It uses a huge enum to define codes fo... | 4 | 6 | 14,156 | 2014-10-23T16:01:08.740 | api_errors | softwareengineering.stackexchange.com | |
193,936 | Is it a good idea to build a library on top of somebody else's library? | Is it a good idea to use somebody else's library as a base and build your own library over that. I want to make a JavaScript Canvas framework for a animation player on top of KineticJS. Should I do it? Do I need permission from the author of KineticJS? Do I just say to users to donwload KineticJS before my library, or ... | I see two perspectives to this: Legal: Can you do it? I see no reason you can't. I know there are some laws/rules about bundling other people's libraries, but that would probably only be for proprietary libraries or with licenses that have very specific rules against including them in other projects (This was the case ... | 5 | 7 | 610 | 2013-04-04T20:29:22.687 | api_errors | softwareengineering.stackexchange.com | |
442,847 | C# Source Generator : which way to go for a simple GitHub Community Project | CONTEXT My project is about implementing the "conventional method for house-energy-efficiency assessment" in France (120 pages). I want to provide a strict yet easy to use API to this method. At first, the audience will be engineers that are not programmers but have basic knowledge in C# to consume such an API inside t... | It sounds like an Object-Relational Mapping (ORM) package may take care of a lot of the work you're trying to do. Code generation is a valid and well-travelled path, but it is difficult. You may find yourself getting stuck in the implementation details rather than moving towards a working solution to this problem. It's... | 1 | 1 | 457 | 2022-12-15T09:53:28.187 | api_errors | softwareengineering.stackexchange.com | |
112,071 | SQL Server restore differential after restoring full backup | Here is the situation: I had a full backup, and a differential backup. I have restored the full backup into the database. But accidentally lost that backup file. Now I would like to apply the differential backup. Normally you must restore from both the full backup, and the differential, without opening the DB for use. ... | No, sorry. Once the log chain was broken the following differential cannot be restored because there are at least a few transactions that would be lost. You may feel that those 'unimportant' changes could just be ignored. But SQL Server insists on a complete restore chain. Though there are certainly some companies that... | 5 | 3 | 966 | 2015-08-25T01:49:57.443 | database_errors | dba.stackexchange.com | |
154,260 | Interesting DBCC CHECKDB scenario | I woke up this morning to corruption in one of my databases. I have a job that runs daily DBCC CHECKDB's for all databases on a server. The output indicated corruption in only ONE table (fortunately). [CODE] I'm always looking for the last line so I can figure out the minimum level of recovery involved. In this case, i... | Yup - there are some errors where CHECKDB picks REPAIR_ALLOW_DATA_LOSS even though it's a nonclustered index. You should be able to manually rebuild these (begin tran, disable, rebuild, commit tran). My guess is a lost write, stale read, or possibly a new bug in 2016. | 4 | 1 | 789 | 2016-11-04T13:05:21.723 | data_quality | dba.stackexchange.com | |
108,482 | Class imbalance: Will transforming multi-label (aka multi-task) to multi-class problem help? | I noticed this and this questions, but my problem is more about class imbalance. So now I have, say, 1000 targets and some input samples (with some feature vectors). Each input sample can have label '1' for many targets (currently tasks), meaning they interact. Label '0' means they don't interact (for each task, it is ... | It's the opposite: if you had such a multi-class problem where a class represents a subset of labels, then it might help to transform it into a multi-label problem in order to have more instances for every label. In your case, it's very likely that the multi-class setting will make the imbalance problem worse, with ver... | 1 | 0 | 309 | 2022-02-24T00:41:01.010 | data_quality | datascience.stackexchange.com | |
404,784 | Where to put the server in my Messaging System UML diagram? | I try to design a client application for a messaging application. The client can send and receive messages, the client can connect/disconnect. My problem is that I don't know how to incorporate the [CODE] class. Where would one put it in the diagram? | Issues in your diagram You use the ECB pattern with [CODE] , [CODE] , [CODE] . This approach is meant to map classes to a use-case: [CODE] would be a use-case, so a user goal. But [CODE] does not represent a goal at all: it represents a component. [CODE] would be the domain objects (in general persistent). This would b... | -4 | 2 | 622 | 2020-02-06T10:59:29.913 | api_errors | softwareengineering.stackexchange.com | |
842,268 | Packer won't correctly use private key for SSH auth in provisioning step | I use Packer to build VirtualBox images, with the Ansible provisioner to set up the images. The builder step creates a temporary user ( [CODE] and [CODE] ). The Ansible provisioner runs using this temporary user. I, of course, want to get rid of this user after it's set up our more secure public key-only user. So I add... | I had this problem and was unable to get the Packer SSH-Proxy to behave successfully. In order for packer to not create the temporary key, you need to either bake the "provisioning key" into the AMI or have it exist on AWS ahead of time. If you follow option 1 - you need to provide both the [CODE] option to the builder... | 7 | 2 | 8,343 | 2017-04-03T15:56:51.770 | api_errors | serverfault.com | |
438,069 | How to refactor code so that a facade class could be decoratable? | I've got a class that is a facade class (encapsulates complex-ish behaviour for reusability). It has a function called [CODE] (the class is called Manager): [CODE] I would like to log the result to another table something like this: [CODE] But of course it convolutes the function; and even it has a very vague name, log... | Logging would only break the SRP if the manager class would implement the log mechanics by itself. But adding some event mechanics to send notifications to a callback does not, for example [CODE] Now, you can initialize [CODE] with a default value of a "do nothing" function, and with a real logging function whereever y... | 0 | 1 | 177 | 2022-04-14T10:45:39.013 | api_errors | softwareengineering.stackexchange.com | |
1,026,941 | Nginx - TYPO3 installation - URL behaviour | First of all, I have to deal with a project-related upgrade of a [CODE] version and am also relatively new to the [CODE] web server. Therefore I ask for patience with me. ;-) I'm also not quite sure, if this question would be better on stackoverflow.com instead of serverfault.com. So if it is a question more for stacko... | Ok. Now I found the solution. It was a config setting of my [CODE] installtion: [CODE] which was set initially to [CODE] After I found this bug report https://github.com/dmitryd/typo3-realurl/issues/333 I saw that I need to limit the L-value for security reasons. In our case 0 for german, 1 for english, 2 for french: [... | 0 | 0 | 73 | 2020-07-27T19:02:23.347 | infrastructure | serverfault.com | |
370,586 | New kernel compilation on CentOS | I'm trying to compile and install kernel 3.2.9 for CentOS 5.6. I compiled new kernel and installed kernel modules: [CODE] I also created new initrd image: [CODE] I copied kernel-3.2.9, initrd-3.2.9 and System.map-3.2.9 to the /boot directory and edited grub.conf file: [CODE] During boot I got a kernel panic with the fo... | I found the problem by myself: I added [CODE] to the .config file as described here https://www.centos.org/modules/newbb/viewtopic.php?topic_id=23627&forum=37&post_id=97305#forumpost97305 and it solves the problem | 1 | 2 | 647 | 2012-03-16T22:21:11.020 | infrastructure | serverfault.com | |
365,666 | IMAP losing 'X-Header' from exchange server | I have Exchange 2007 installed on Windows 2003 Server. I am having difficulties with the additional 'X-headers' being removed when my messages are delivered to my inbox via IMAP. For example, when I receive emails with very specific X-Headers that are needed to be kept in tact they disappear when the message finally ar... | The problem is bigger than just [CODE] . [CODE] also doesn't have the [CODE] . I believe the issue has to do with Exchange not keeping the full Mime structure when it stores emails and instead only returning promoted named properties. You may have luck with changing the [CODE] to [CODE] . as refrenced in this article .... | 2 | 2 | 1,285 | 2012-03-02T13:28:57.930 | infrastructure | serverfault.com | |
365,828 | Integrate Web API Services with multiple authentication services | In a multi-tenant deployment of Web application, How can the Asp.Net Core Web API services be designed to work with different authorization services? The Web applications use OAuth and JWT Bearer authentication and pass access token to the Web API services. One approach that I could think of is to, get the Authority fr... | Technically, your approach would work. The token will have the authority embedded in it (the 'issuer' claim), you can use that to retrieve the public key, then you can validate the JWT. | 0 | 0 | 1,658 | 2018-02-13T04:56:03.800 | data_quality | softwareengineering.stackexchange.com | |
1,063,353 | Fallback options for private DNS servers | I have a private DNS server that is used across locations, configured on routers and on mobile devices. For routers, it uses the IP for DoH/DoTLS. For mobile devices, it uses the domain "dns.example.com". We rent the server from the data center and have no infrastructure other than the server itself. Yesterday the data... | I would suggest anycast DNS service. Be it homegrown (which requires dedicated address space and some BGP knowledge) or by 3rd party (some DNS providers offer secondary servers on anycast addresses). Cloudflare provides DNS anycast services for free, but it does not include slave servers. If you don't mind management t... | 0 | 0 | 807 | 2021-05-12T17:40:43.180 | infrastructure | serverfault.com | |
83,314 | Debian Apache Weirdness | I have a fresh minimal Debian Lenny server with one IP address running just Apache. I have two domains, site1.com and site2.com for the purpose of this post, pointing to this one server. The www subdomain is a CNAME to the main domain. Pinging all four entries (the two domains with and without the www subdomain) all po... | I'm going with typo in the vhost's ServerName, or else the machine's ServerName points to www.site1.com and that's overriding the vhost's definition. | 1 | 1 | 179 | 2009-11-10T16:22:16.710 | infrastructure | serverfault.com | |
15,746 | While pulling windows docker image from private registry, Docker trying to download some layers from internet | I created a Windows based docker image (asp.net web project) and pushed it to my private image registry. when i pull the image from another windows server (offline and there is not a proxy), i'm getting the following error. As you can see the first two lines (system fs layer) tried to download many times, but it couldn... | this could be the reason - https://docs.docker.com/registry/recipes/mirror/ Configure the Docker daemon Either pass the --registry-mirror option when starting dockerd manually, or edit /etc/docker/daemon.json and add the registry-mirrors key and value, to make the change persistent. More details in the link | 0 | 1 | 493 | 2022-04-06T04:33:44.980 | pipeline_ops | devops.stackexchange.com | |
616,738 | Automate app pool recycling of an Azure Cloud Service Web Role | How can I script (e.g. using PowerShell) the action to recycle the app pool of a web site hosted in a Web Role on Azure Cloud Services? Only one instance of the cloud service is running (used for development). The reason for recycling is to work around a Web Deploy bug . | While I'm not exactly sure of the AppPool name, you should be able to recycle an app pool with [CODE] . For example: [CODE] You can also use PowerShell, by adding WebAdministration and executing Restart-WebAppPool . For example: [CODE] How you execute this would be up to you. Maybe execute it via remote PowerShell. May... | 0 | 0 | 3,503 | 2014-07-30T21:01:10.290 | infrastructure | serverfault.com | |
601,379 | Transition from GPO to GPP | I have a Windows network with a 2003 server as the PDC, and a 2008R2 server as a DC. We have used GPO sparsely when the majority of our workstations were WinXP, but now we have Windows 7 clients and we're having some issues with printer mapping. I'm not quite sure how I would go about taking up GPP, would it involve sh... | Group Policy Preferences are a subset of GPO settings. Think of it as an extension to the Policies that form the core of Group Policy. Policies defines the outcome of built-in behaviors that the clients must adhere to, once set. Preferences define settings that clients should implement if applicable (ie. an appropriate... | 2 | 4 | 1,147 | 2014-06-03T07:30:14.750 | infrastructure | serverfault.com | |
200,191 | SQL Server 2016 Enterprise poor performance | Sorry to be long, but I want to give you as much information as possible so that might be helpful to the analysis. I know there are several posts with similar issues, however, I have already followed these various posts and other information available on the web, but the problem remains. I have a serious performance pr... | Not disregarding all your answers that were very useful and which I applied or will apply, the biggest problem was not easy to find. The problem got worse in the days after our last messages. As we are based on cloud, neither I nor the company that manages the infrastructure and gives us support has access to the physi... | 8 | 3 | 1,115 | 2018-03-14T07:39:47.247 | bi_errors | dba.stackexchange.com |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.