question_id
int64
1
1.16M
title
stringlengths
10
191
question_body
stringlengths
6
2k
answer_body
stringlengths
0
2.5k
tags
stringclasses
73 values
question_score
int64
-15
1.65k
answer_score
int64
0
2.91k
view_count
int64
4
1.24M
creation_date
stringdate
2008-08-01 18:45:00
2025-06-19 04:44:02
category
stringclasses
12 values
source_site
stringclasses
8 values
1,089,196
UFW port not accessible from public web despite rule explicitely allowing it
I have two dedicated servers: "web" (YYY.YYY.YYY.YYY) and "monitor" (XXX.XXX.XXX.XXX). Both are in the same network of a mass hoster (hetzner). Now on "web" I have 3 prometheus metric endpoints running : docker-engine (9323) on the bare metal host and neo4j (2004), telegraf (9273) as docker containers. Both docker cont...
As the ports 9273 and 2004 are exposed by Docker, the packets to these ports are going through [CODE] chain and then through [CODE] chain. The rules you added to [CODE] are blocking most of the external traffic to docker containers networks. You need to allow forwarded traffic with [CODE] or you can add rules directly ...
0
1
416
2022-01-06T17:19:13.633
pipeline_ops
serverfault.com
145,511
Dell Powervault MD3000 - Not sharing Files between servers
I'm a developer who has to set up a Dell Powervault MD3000 due to lack of resources. I have connected the Powervault to 2 Dell 2950 servers via the SAS cables. I performed the setup using Dell's MD Storage Manager software (4 disks, RAID 5 with hot spare). Then I added the disks using Windows 2003 disk management (Basi...
NTFS isn't a cluster filesystem. If you're really trying to share the same LUNs between two server computers you're going to have problems (at the least). Mounting the same NTFS filesystem on two different systems simultaneously is a recipe for filesystem corruption. If you really want to do this you'll need a cluster ...
0
2
569
2010-05-26T15:31:50.587
infrastructure
serverfault.com
290,098
NLB Traffic Stops on all nodes when a single node is rebooted
We had a 2 node NLB cluster running IIS websites on virtual machines. Both nodes were online, the balancer functioned exactly as expected, (if traffic is 50/50 balanced, and you stop or drainstop a node, all traffic routes seamlessles to the other node.) But when I rebooted a node, even if I stopped it prior to reboot,...
After some research, I’ve discovered that the issue is related to VMWare and the fact that the NLB cluster is in Unicast mode. Apparently VMWare has to be configured properly to avoid issues at the switch level with virtual MAC addresses that are created from Unicast mode NLB clusters, and recommends configuring the NI...
1
0
1,359
2011-07-13T21:13:49.553
infrastructure
serverfault.com
583,209
Which network file systems can deal with huge amount of subdirectories?
I need a network file system that can be accessed from multiple machines as the same time and that it will still be able to keep like 100.000 subdirectories of a single directory. In case someone is wondering why having these requirements: the server (JIRA) is storing attachments for each issue inside a subdirectory wi...
If XFS works for you, you can share it via NFS. If you prefer to us a NetApp you should use a system that supports Ontap 8.1. With this release the WAFL restriction of ~100k subdirectories for one directory has been lifted (see KB ID: 3012261 for details. If 8.1 is not an option, you might want to check the if you can ...
0
2
182
2014-03-19T18:18:11.200
infrastructure
serverfault.com
119,537
Does a covering nonclustered index help to answer Select * queries?
Our application developers run a lot of [CODE] queries against our database system, unfortunately. The missing index suggestions of sys.dm_db_missing_index contain a lot of cases that indicate to create a 100% covering non-clustered index for those cases. For example actually there is an index with 3 index columns and ...
The missing index suggestions are opportunistic entries added whenever the optimizer happens to notice that an exact-match index for the current set of predicates it is considering do not exist on the base object. The information recorded in the DMVs is intended to be a helpful input to the normal activities of a skill...
5
8
129
2015-10-29T11:21:24.457
database_errors
dba.stackexchange.com
980,890
ESXi Server shows "Storage: 0" after updating via vib
I'm kinda lost, my ESXi kungfu is not strong enough obviously. What I did is put the server into maintenance and install the vib [CODE] via [CODE] which worked fine and then I finished off by [CODE] but now I cannot see any storage anymore. [CODE] can also not find any drives, disk or such. I tried some commands and re...
So, the problem was that the [CODE] needed an update. To find the proper bundle, you have to check VMware HCL for IO Devices: https://www.vmware.com/resources/compatibility/search.php?deviceCategory=io I had to install the [CODE] offline bundle and now my storage is back at last. Next ESXi update will be skipped :D
1
1
1,226
2019-08-27T14:21:24.057
infrastructure
serverfault.com
286,949
Azure SQL Database - dedicated administrator connection (DAC)
If you check the setting in any of your Azure SQL databases, you will see that the [CODE] column value is zero for [CODE] . Meaning ‘Remote admin connections’ are not allowed from remote clients. There is no way to change that at the time of writing this question. [CODE] is not available for Azure SQL Database. [CODE] ...
As per Microsoft documentation, Diagnostic Connection for Database Administrators is available for the Azure SQL database. If you are not familiar with DAC, read this official documentation from Microsoft. By default, the connection is only allowed from a client running on the server. Network connections are not permit...
2
2
243
2021-03-13T11:24:13.207
warehouse_errors
dba.stackexchange.com
900,766
Percona MySQL 5.7 Replication error 1236 "unknown error reading log event on the master"
we are using two instances of 5.7.20-18-log (in the meantime updated to 5.7.21-21-lo) Percona Server in a master-master (dbm1 / dbm2) replication. The application only uses dbm1 for writes and reads so the dbm2 is used as a cold standby only. Since a couple of weeks the replication on dbm2 stops multiple times per week...
This error is usually caused by a hardware glitch or a bug so obscure that it hasn't been found in over a decade. You haven’t mentioned anything about the hardware, so the obvious first question to ask is whether it has ECC memory and whether you are seeing any MCE errors in your syslog, or if sensors are showing overh...
4
2
1,437
2018-03-09T00:59:37.733
database_errors
serverfault.com
782,319
Make SSH server to forward connection per user
Is there any way to force OpenSSH (or create a proxy of some kind) to forward one user to one machine and another user to another machine just by the username that he (or she) provided? I've got following problem: I'm going to run GitLab in Docker container and simultaneously SSH server on the host machine. GitLab list...
The SSH TCP port tunneling is configured by the ssh client. On the server, you can only limit the tunneling configuration using [CODE] in authorized_keys. Another way to redirect the traffic would be to use Netfilter/iptables with [CODE] and DNAT target.
6
2
2,197
2016-06-06T21:15:54.830
pipeline_ops
serverfault.com
332,858
Where does the logic belong to respect SRP here?
I'm working on a simple class to get a token from an API. As simple as it is, it has different aspects. A connection to the API is needed for this to work at least the first time. Credentials are stored in the code (security is not the subject). A token should not be fetched from the API more than once every 9 hours, t...
You seem to be making classic OOP design error : you are focusing on "things" instead of "behavior". In your case, there are three behaviors : [CODE] the token, [CODE] the token and [CODE] the token. There is also one nice abstraction : Because client shouldn't care where or how the token is received, it can use [CODE]...
3
4
110
2016-10-05T09:37:50.467
api_errors
softwareengineering.stackexchange.com
551,466
Couchdb attachment hashes don't match attachment content
While doing some auditing of a database, I found that some attachment content did not match the hashes given in the document's [CODE] map. I tested this by downloading the document and calculating its hash. Comparing that to couchdb showed that they did not match. I then noticed that the mismatched attachments were one...
Not sure if you got this sorted out, but I started going down the same path. After looking at the source for a bit, it appears that digest calculations take place prior to compression, so I don't believe compression will have a bearing on the digest value. I was able to reproduce the md5 digest produced by CouchDB for ...
3
1
806
2013-11-07T19:43:34.760
data_quality
serverfault.com
412,164
How do I really write tests without mocking/stubbing?
I have been using TDD when developing some of my side projects and have been loving it. The issue, however, is that stubbing classes for unit tests is a pain and makes you afraid of refactoring. I started researching and I see that there is a group of people that advocates for TDD without mocking--the classicists, if I...
This answer consists of two separate views on the same issue, as this isn't a "right vs wrong" scenario, but rather a broad spectrum where you can approach it the way it's most appropriate for your scenario. Also note that I'm not focusing on the distinction between a fake, mock and stub. That's a test implementation d...
50
65
12,618
2020-06-30T04:21:13.910
api_errors
softwareengineering.stackexchange.com
953,677
webpage access blocked from command line but not browser
I'm trying to set up a cron job to run this command every day: [CODE] The website example.com is located on the same server I'm running the cron job from. But I keep getting an error 403 in my logs: [CODE] When I try to access the same url from my browser it works though: [CODE] So I guess there is something blocking r...
There was a rewrite condition in my .htaccess blocking some user agents, I guess including empty user agents. Adding [CODE] did the trick: [CODE] See also: https://unix.stackexchange.com/questions/139698/why-would-curl-and-wget-result-in-a-403-forbidden
-1
0
1,323
2019-02-13T08:54:16.270
api_errors
serverfault.com
323,038
Can't install PHP and MySQL on CentOS 5 64 Bits
I'm getting the following error when trying to install PHP and MySQL form the atomicorp.com repository: [CODE] Doesn't mysql-libs have libmysqlclient.so.16(libmysqlclient_16)? I also tried to install mysql-libs first and then all the rest, but that didn't work either. Thanks in advance
It looks like you are running into the "feature" of yum on x86_64 systems where [CODE] attempts to install [CODE] as well. Try [CODE]
2
2
3,840
2011-10-19T20:26:01.347
database_errors
serverfault.com
411,753
Convert Public Folder to Shared Mailbox
Due to a change in company policy, all existing Public Folders (PF) have to be phased out in favour of shared mailboxes. Unfortunately, they don't seem to have any procedures or guidelines for this migration and I can't find much online either. I've already migrated one of our public folders so far as a sort of test ca...
I know this is an old question, but to convert public folders to a mailbox, you would simply click on All Folders in Outlook, click the top-level public folder and then export that folder to a PST, ensuring you have checked to include all subfolders. Then once exported you would import into the shared mailbox you have ...
2
2
19,343
2012-07-27T07:28:45.913
infrastructure
serverfault.com
27,694
How to dissect raw data in an email
There may be an obvious answer to this question, but I have not found it yet. I have two email messages that were sent to two different people in our company. One individual did receive the message, the other did not. I want to try to better understand why. One way that I can think of to do this is to pick apart the ra...
You can use Exchange's message tracking feature to see exactly what path the incoming messages took; that's where I'd start. There's a decent tutorial here . Note that this is something your Exchange admin will have to do.
1
5
268
2009-06-17T22:19:08.050
infrastructure
serverfault.com
761,579
HAProxy: Detect SSL connection contents and then decide to forward it or not
I would like to have a front end with HAProxy on port 443. This front end acts in the following way: It decrypts the contents of the connection and checks: 1- If the encrypted contents of the connection is ssh, i.e., if the first words of the packets are [CODE] , then it forwards the decrypted packets to port 22. I ass...
You could use SNI first, selecting [CODE] or [CODE] and only if ssh.domain.com is selected you decrypt, do the ssh magic and send it to a local webserver unencrypted, assuming this is supposed to look like regular https traffic, but doesn't contain sensitive information inside the https content, because this is handled...
2
0
1,416
2016-03-04T13:18:36.720
infrastructure
serverfault.com
83,720
optimize my query mysql
I have the following query: [CODE] for some names it works well, but for some other it takes a long time to retrieve results.. film_info is a view containing 100,000 rows. The structure is: movieName, ImdbId, year, rate, posterLink(link to image of movie) director_movie: is a table containing 2,259,630 rows. The struct...
This is your original query [CODE] There are three things you can do SUGGESTION #1 You should reorganize the query so that the castName is searched first [CODE] SUGGESTION #2 Run these please [CODE] If [CODE] and [CODE] are the same, then remove [CODE] . It may actually return the results faster. SUGGESTION #3 (Optiona...
0
1
58
2014-11-26T15:51:12.873
database_errors
dba.stackexchange.com
191,531
Why does Cem Kaner consider a test not revealing a bug a waste of time?
What about confirming the functionality in positive tests, proving it is working - should I say it is a waste of time? What kind of concept is behind this quote? Unsuccessful tests, i.e. tests that do not find errors are a waste of time. Web Engineering: The Discipline of Systematic Development of Web Applications quot...
I wrote most of Testing Computer Software over 25 years ago. I've since pointed to several parts of the book that I consider outdated, or simply wrong. See http://www.kaner.com/pdfs/TheOngoingRevolution.pdf You can see more (current views, but without explicit pointers back to TCS) at my site for the Black Box Software...
16
38
3,518
2013-03-22T07:12:27.583
api_errors
softwareengineering.stackexchange.com
615,332
OpenVPN, How to filtering client
I have a problem with limiting "client" with my VPN server. I was reading the FAQ about using iptables with disable option client-to-client, but i cannot run it. The question is how correctly allow choosen client to communicate with other networks. Here is my config for openvpn.conf [CODE] on the ccd client A had a lin...
You cannot make this network setup using the [CODE] feature, because your OpenVPN server needs to have an address in each subnet you want to use. You should run multiple copies of OpenVPN, one for each /24 subnet that you are using. Each OpenVPN server instance then has a unique IP address in the subnet. So, for exampl...
-1
0
2,055
2014-07-24T21:44:50.440
infrastructure
serverfault.com
421,986
How to avoid cyclic dependency in UI application
I'm developing an UI application where I ran into an issue with a cyclic dependency. Here is the simplified code, to explain the problem. [CODE] Explanation: UiStyle - application style class. CreateStyle - method that creates some UI style. UiWindow - interface of an UI window (not to be changed) UiMenu - some impleme...
Cyclic references sometimes have their place, and before rejecting them as a solution, I think it is important to understand why and when they may become an issue, and if this issue really applies to your case. For example, as you mentioned by yourself, one could solve this problem by introducing an ctor parameter [COD...
-1
2
209
2021-02-07T20:07:15.580
api_errors
softwareengineering.stackexchange.com
1,025,335
Relay from postfix to exchange specific address
I have a very urgent issue where I need to relay some Emails to an exchange server. Right now we have a postfix server which is taking all emails from @domain. We are using an external POP3 account. What I have to achieve is the emails which are received in postfix to email@domain.com to be relayed to an exchange serve...
Sorry for that i'm not familiar with postfix, but I found an article which introduces the method to configure Postfix to Relay Mail to Local Exchange server for your reference: Configuration example link , hope it's helpful to you.
1
0
1,751
2020-07-15T14:06:24.137
infrastructure
serverfault.com
658,884
Change only other user's permissions
Is it possible to set the NTFS permissions so that a user has permission to edit folder permissions for every subfolder and every user except himself? For instance, I want a user to be able to administrate folder permissions for a specific netshare, without having permission to open files and without being able to assi...
Give read/write permissions on the folder to an Active Directory security group, then give the user access to add or remove members from that group. If you don't want him accessing the folder by giving himself membership in the group, just add a Deny flag for his account in that folder's permissions.
-1
2
91
2015-01-12T11:38:51.870
infrastructure
serverfault.com
265,967
ASM trying to mount droped diskgroup
In my envoriment I am getting the following erro: [CODE] The problem is: I already has droped this diskgroup (I've changed the OCR diskgroup to another diskgroup OCR_NEW). I have two instances, in the first instance it's everything ok, but in the second instance I get this erro. Where can be the problem? I didn't find ...
This can be caused by the [CODE] parameter. On older releases (like 11g), this was a typical problem. This parameter was automatically updated, except when a diskgroup was dropped, then its name was not removed from the parameter values. You can check this if you have access to MOS: Dropped Diskgroup Still Existing in ...
0
1
1,583
2020-04-28T02:48:53.497
warehouse_errors
dba.stackexchange.com
123,164
Requiring SSH-key Login From Specific IP Ranges
I need to be able to access my server (Ubuntu 8.04 LTS) from remote sites, but I'd like to worry a bit less about password complexity. Thus, I'd like to require that SSH keys be used for login instead of name/password. However, I still have a lot to learn about security, and having already badly broken a test box when ...
Not sure how PAM would need to fit into this. With a recent version of SSH (like what is available on 8.04) it should be as easy as using a Match blocks for the address space you wish to allow. So your sshd_config should contain something like this. [CODE]
4
11
3,333
2010-03-16T21:14:44.563
api_errors
serverfault.com
66,965
Ways to simulate weather data over several periods (Python or R)?
I have a time series dataset that has several variables for a state/province for fixed periods of time. That is for state A, there are samples from April 2017 to July 2019. Of course, I thought adding precipitation and temperature variables would be a great idea. I tried finding some relevant external data but most of ...
What about creating a Pandas DataFrame and adding a new column such as "Temp_simulated" and simulate the temperature?
2
4
1,666
2020-01-24T05:14:57.400
data_quality
datascience.stackexchange.com
191,034
How can I increase the size of a RAID 1 array from 750GB to 1TB? 3ware
3ware 9650SE-2LP Array is 750GB volume, RAID 1. One drive is 750GB, the other is 1TB. Looking to replace the 750GB drive with a 1TB. Will the array rebuild to the max size of 1TB, or will the array need to be broken and remade from the first drive? I need to retain the data so that once it's all done I can resize the /...
You de-split it into separate disks, then convert into degraded RAID1 and then add the second disk. That's how we migrated. Stupid, but it works.
0
2
3,666
2010-10-14T18:22:07.550
infrastructure
serverfault.com
2,016
Defined start sequence of containers
AFAIK you cannot influence the order how Docker Swarm starts containers for services. Is that possible with: Mesos? K8s (Kubernetes)? Rancher? Other? This question is not about specific orchestration of dependent services but the problem that if you run 10 services each with one JVM this creates a load peak. The system...
https://forums.rancher.com/t/start-order-of-stack-containers/3106/9 We do not support depends_on, and neither does Docker in Swarm mode. It is not a real solution to the problem anyway and leaves you with unhandled pointy-edge cases when failures occur and containers are being replaced. Your services should know how to...
5
4
196
2017-09-15T09:18:48.850
pipeline_ops
devops.stackexchange.com
36,296
Does large table variables fill up logs in tempdb?
I'm running into an issue with a DBA who claims that table variables reside in ldf of the tempdb and when large amount of data is loaded into the table variable, the tempdb's logs fill up. The DBA's solution is to use temporary table instead of table variable. While I see the justification to use the temp table in case...
Your DBA is correct that actions on table variables are logged to the [CODE] transaction log but so are operations on [CODE] tables so the proposed resolution doesn't help. Indeed if there is any surrounding user transaction the [CODE] table version may be worse as the [CODE] log cannot be truncated until that complete...
6
10
1,751
2013-03-08T21:10:25.900
database_errors
dba.stackexchange.com
134,344
High Availability Options for 2008 R2 or 2014 to 2016 "Mirror" for Reporting?
I'm a BI Developer investigating options for this scenario. I'm going to preface this question by saying I don't know the proper terms, so I will put "quotes" around terms that are probably not the official SQL terms. Let's say I have a SQL 2008 R2 SP1 Standard instance that runs a 3rd party vendor's transactional appl...
Your only valid options would be transactional replication. No changes since your downstream version is 2008 R2. When dealing with features like AGs, it generally is same MAJOR version of SQL Server.
2
2
165
2016-04-04T22:19:01.983
database_errors
dba.stackexchange.com
311,379
Web Application using only REST API
In an experimental personal project I (along with a "team" of friends) did some time ago, we used a REST API to provide all data. The frontend (a JS-only webapp) then just called this API using AJAX. We used a homebrew version of OAuth and some makeshift token mechanism to handle authentication, and it worked quite wel...
Moving more logic to the client means limited processing on the server , so you can get by with a less performant server but it does require more powerful clients . Depending on what kind of application you are working on, this may or may not be an option. For an application with a significant number of users and featu...
2
1
1,730
2016-02-29T07:20:08.217
api_errors
softwareengineering.stackexchange.com
59,810
Design for future changes or solve the problem at hand
While writing the code or during design do you try to generalize the problem at the first instance itself or try to solve that very specific problem. I am asking this because trying to generalize the problem tends to complicate the things (which may not be necessary) and on the other hand it will be very difficult to e...
Too often when you try to design for the future, your predictions about future needs turn out to be wrong. It's usually better to refactor when you actually know how the needs have changed than to overdesign your system on day one. At the same time, don't shoot yourself in the foot, either. There's certainly a middle g...
39
64
3,617
2009-03-24T17:50:50.527
api_errors
softwareengineering.stackexchange.com
958,047
Recommended deployment for public kerberos
I have configured and enabled an environment that does seamless X.509 / Kerberos authentication for iOS devices. The security concern is the KDC needs to be exposed to the public internet for this to work. I'm trying to determine the best way to mitigate this. I'm thinking of deploying a "slave" KDC in the cloud that o...
See also on Security.SE: Kerberos authentication over the public internet Does the Kerberos KDC know the users' plaintext passwords? I don't see what a copy of the KDC on the private network gains you. Kerberos was intended for untrusted networks from the beginning. Secure it like you would a database of hashed passwor...
1
2
331
2019-03-13T09:35:00.937
api_errors
serverfault.com
301,668
How to debug javascript in browsers that don't have a console interface?
It's unbelievable but my company is still building web app on IE 6. Although the online dashboard for IE 6 is limited in functionality, I've found extremely difficult to debug anything on it. It's probably the most challenging task in my career, and I'm considering to leave the job because it takes way too much time to...
Actually, lets go a bit further: There are two kinds of browsers - ones that provide a console interface with a log method, and ones that don't. Right before you do any other javascript, have the following code (assuming you have jQuery - adapt if you use something else): [CODE] A more complete approach can be found at...
1
6
209
2015-11-04T03:36:54.423
bi_errors
softwareengineering.stackexchange.com
1,102,984
OVH IPMI applet on Linux
Trying to get IPMI from OVH to work on Ubuntu. Getting this error Error: Could not find or load main class ns102103-ip-147-135-36-us-1.jnlp Caused by: java.lang.ClassNotFoundException: ns102103-ip-147-135-36-us-1.jnlp Anyone has gotten IPMI applet to work on Linux?
My guess is that you tried to use [CODE] to start the JNLP file. JNLP files should be used with Java web start, not the Java executable, like this: [CODE] However, Java web start is deprecated, so newer Java version don't contain the executable. The last Java version to have the [CODE] binary is 1.8. Be aware that the ...
-1
1
677
2022-06-10T13:31:46.950
infrastructure
serverfault.com
154,440
C++ Iterator lifetime and detecting invalidation
Based on what's considered idiomatic in C++11: should an iterator into a custom container survive the container itself being destroyed? should it be possible to detect when an iterator becomes invalidated? are the above conditional on "debug builds" in practice? Details : I've recently been brushing up on my C++ and le...
Is using [CODE] to the backing data an unnecessary inefficiency Yes - it forces an extra indirection and an extra allocation per element, and in multithreaded programs each increment/decrement of the reference count is extra expensive even if a given container is used only inside a single thread. All of these might be ...
9
10
8,195
2012-06-27T08:48:59.080
pipeline_ops
softwareengineering.stackexchange.com
323,716
Linux kernel module file size
I'm trying to update the kernel on a CentOS 6 machine with a vanilla 3.1.0-rc10 kernel. It seems to work, except the modules that get created are significantly larger in size than those that come from the distro RPM. Thats an issues, because the [CODE] command ends up creating a initram file that is 100M (because of th...
Run [CODE] on the module to remove extraneous symbols. If that doesn't do it, run [CODE] on both modules to see where the difference lies. Note that this makes debugging somewhat more difficult.
3
3
1,655
2011-10-21T17:39:18.437
infrastructure
serverfault.com
888,400
Why does Apache return a 405 error code on a PUT request to a file or directory that doesn't exist?
I recently discovered that when I make a PUT request to Apache to a file or directory that does not exist I get a 405 Method Not Allowed error instead of a 404 Not Found error. I am curious as to why? PUT request from curl: [CODE] Response from server: [CODE] When making a call to a directory that does not exist, I get...
The evidence you have provided suggests that the 405's occur when a PUT request is directed to the default request handler. (The PUT behavior is different for the PHP handler.) The default handler is checking the request method before it checks whether the resource exists and has the correct permissions. Since the defa...
4
4
15,476
2017-12-16T04:04:05.973
infrastructure
serverfault.com
212,792
windows server 2008 r2 ftp setup help + filezilla server
Hey all i have followed this page to a "T": http://learn.iis.net/page.aspx/321/configure-ftp-with-iis-7-manager-authentication/ in setting up the FTP server. I have also done the firewall thing with the svchost giving that permission. I use the command prompt to test the ftp and i always get [CODE] It never asked me fo...
Firstly, I would recommend that you stop using the command prompt and certainly stop using Internet Explorer for connecting to an FTP. Use a decent FTP program instead, something like FileZilla which will show you the server responses you receive which you can use to resolve your login issues. As for the lonely [CODE] ...
0
3
4,165
2010-12-15T08:04:55.700
api_errors
serverfault.com
517,786
Does backup data go through the backup exec server?
I'm reading over the Backup Exec 2012 manual and planning our deployment. One thing I haven't figured out is if the actual data always goes through the backup exec server to the storage, or if it goes (or can go, if setup properly) directly to the storage like it does now in Backup Exec 2010. eg, I have 3 sites: Site A...
According to Symantec's technical support, all backup data does go through the backup exec server. So you will need to either have sufficient bandwidth to handle that (client side deduplication MAY help), or have a local backup exec server.
2
0
157
2013-06-22T14:31:13.907
pipeline_ops
serverfault.com
61,832
Find the SQL query that caused an event in the past
I have a database in which I noticed that one of my tables is missing. I haven't used this database for over three months and now I want to find out who caused this , when this happened, how it happened and what code was used (or generated by SQLMS) for this action. How can I do that?
This data might still be in the default trace, which can roll over and phase out files based not only on activity but also based on service restarts (so I say it might be there because you may have restarted SQL Server more than 5 or 6 times in three months, even if there hasn't been a lot of activity). Anyway, it is o...
2
4
64
2014-03-26T17:17:55.810
warehouse_errors
dba.stackexchange.com
919,970
Postfix as smart host for Exchange 2016
I am trying to set up [CODE] as a smart host for an Exchange 2016 server. Right now I have it successfully relaying mail in to Exchange from the internet but outbound relay is not working. I'm looking to get the simplest setup to essentially make this box be a mail proxy for Exchange 2016. [CODE] == Exchange server (A ...
Your problem is that you are sending outbound mail back to Exchange: [CODE] Empty your [CODE] , as the indound mail may use [CODE] to find the correct nexthop destination. Another problem with you current configuration is that you now accept mail for [CODE] and don't use connection-stage rejection for non-existing mail...
-1
2
2,439
2018-07-08T02:05:20.823
infrastructure
serverfault.com
180,728
Files on a Windows 2003 share filed server are not releasing locks?
What could be causing a windows 2003 file server to no longer release file locks? The locks are being created and not released by Legacy vendor code (C++ I assume) Legacy code, VB Newer C# code All with separate logging code (all locks are happening in logs so far). The problem has been steadily getting worse for the p...
Please us unlocker assistance to check which process is locking the files. You can download it from http://download.cnet.com/Unlocker/3000-2248_4-10493998.html
3
2
349
2010-09-13T20:57:54.217
infrastructure
serverfault.com
157,665
How do I know an index is used for any queries?
I've found a likely abandoned index in the production database. It's not included into .sqlproj from which this database it usually deployed. Most likely it was created for some experiments and then left there but I'm not sure. It's not mentioned in any [CODE] hints. It's not used for a PK or unique constraint. I want ...
Be careful - if you have usage statistics recently reset or you have an index which is so rarely used its usage statistics was cleared long ago - this solution is useless for your scenario and can cause problems. Make use of [CODE] [CODE] This outputs all indices that recently done any actions to - scans, lookups, seek...
0
0
83
2016-12-09T09:14:50.700
data_quality
dba.stackexchange.com
338,252
Is "static interface" a good practice?
I've just recently noticed there is an option to have static methods in interfaces. Same as with static fields of interface, there is an interesting behavior: These are not inherited. I'm unsure it's any useful in the actual interfaces that are to be implemented. However, it enables the programmer to create interfaces ...
A simple example is just an envelope for global constants. Putting constants on interfaces is called the [CODE] since constants are often merely an implementation detail. Further drawbacks are summarized in the Wikipedia article on the Constant interface . You could also create some utility "class" this way. Indeed the...
13
1
7,370
2016-12-16T02:00:18.953
api_errors
softwareengineering.stackexchange.com
436,000
Linked server issue. Can't use windows authentication as remote login account
I tried to set up linked server. The target server is MS SQL 2008R2. It works fine if I set Remote login by sa account. However, if I use a windows account, it will popup an error. And I get the following message from log. Attempting to use an NT account name with SQL Server Authentication Is there anyway to let linked...
No you can't specify a Windows account for the remote side of things. All you can do is check the Impersonate checkbox, but you can't have a SQL Account on your server connect to the remote machine using a Windows domain account. Nor can you have a Windows user on your server connect to the remote machine using a diffe...
3
5
23,160
2012-10-08T15:06:41.353
database_errors
serverfault.com
420,465
Windows ADSI , WMI and Registry. How Do They All Relate With Each Other?
I have a work task which involves setting up Windows XP machines. I'm not a Windows user normally which is why I ask this question. The tasks involved in setting up one of these machines involve setting network addresses, users and specific 'Group Policies' and currently I do this manually for each machine. Naturally I...
Active Directory Services Interface (ADSI) is layer of WMI for active directory for managing users, groups, members, permissions etc. Windows Management Instrumentation (WMI) is simply the means to access managed data. Windows Query Language (WQL) is dedicated WMI that references CIM tables. The windows registry simply...
2
3
1,678
2012-08-22T08:18:05.887
data_quality
serverfault.com
312,177
How to enable correct charset HTTP-header in NGINX
What is the right way to enable correct charset headers in NGINX? I'm analyzing my website with Google Page Speed. It says that I should specify the charset of HTML files in HTTP-headers. What is the right way to do this? I already tried to set [CODE] in the [CODE] declaration of my NGINX configuration file, but it has...
Adding [CODE] is pretty much everything you need to do. Are sure that you didn't forget to reload nginx after you changed the configuration file? Besides at the moment of writing, [CODE] returns the following result: [CODE] So everything looks ok now.
54
48
84,127
2011-09-16T12:47:55.990
infrastructure
serverfault.com
278,361
cron.daily not executing
I am new to Linux. I put a file in cron.daily to test, but it never got execute, access mod is 755 for the test file. crontab file has the default entry of: -*/15 * * * * root test -x /usr/lib/cron/run-crons && /usr/lib/cron/run-crons >/dev/null 2>&1 cron daemon is there. I can start a "at" job. What do I miss ?
Your script has [CODE] suffix doesn't it? ;) run-parts doesn't run anything with any suffix . Files with suffix are silently ignored. This is a documented but utterly stupid "feature": [CODE]
0
1
165
2011-06-08T16:34:25.980
infrastructure
serverfault.com
1,000,877
Can't Log Into any Virtual User on IMAP (Dovecot) Server: pam_authenticate() failed, unknown user
NOTE: Some of this post contains potentially sensitive information that I've censored out. If you see random piles of asterisks anywhere, that's why. I'm trying to create an email server using Postfix, Dovecot, MariaDB on a cloud instance running Ubuntu 18.04 LTS. To do this, I have been following this tutorial . Previ...
Rubber duck. Turns out I shouldn't have set [CODE] in [CODE] . By commenting it out, Dovecot was able to read the records in the database successfully.
0
0
428
2020-01-29T09:48:06.853
database_errors
serverfault.com
498,335
Debian router drops connection
I have a home network with a debian server running kernel 3.8 setup as a router, doing DHCP, DNS-caching, samba and Squid. The motherboard is a Gigabyte GA-Z77X-UD5H with two ethernet ports, one Intel and one Atheros. After the upgrade to kernel 3.8 both cards are detected. I have configured IPTables with the following...
I updated my kernel to 3.8.7 and the problem disappeared.
0
1
312
2013-04-11T10:08:51.903
infrastructure
serverfault.com
310,042
PDB Oracle DB ORA-40365
The essence of the problem is this. I'm trying to open pluggable database but it opens with Warning: PDB altered with errors. An error occurs in pdb_plug_in_violations (Sync PDB failed with ORA-40365 while performing 'alter user sys account lock pas sword expire'05-FEB-22 03.01.33.629000 PM) about password sen for user...
You may try to reset SYS's password. Switch to root container. [CODE] Expire SYS's password for all containers. [CODE] Set a new password for SYS. [CODE] Then test the result.
1
1
2,163
2022-03-22T19:49:25.260
api_errors
dba.stackexchange.com
277,549
Selecting between multiple actions in PHP
I have been programming for a number of years now and in PHP for about 4 of those years. I have always wondered what is the best approach when it comes your program deciding what action to take based on a user action. Let me narrow this down a little bit. I have a small custom built CMS running, one of the pages allows...
I recommend looking at the router code in most modern MVC frameworks. The prevailing approach is to use reflection to invoke a particular function named after the action. Here's the relevant code from Yii: https://github.com/yiisoft/yii/blob/master/framework/web/CController.php#L413 https://github.com/yiisoft/yii/blob/...
0
1
875
2015-03-27T12:09:13.493
api_errors
softwareengineering.stackexchange.com
827,571
setting up gitolite repository hook
I have set up a gitolite repository specific hook according to the documentation on page http://gitolite.com/gitolite/non-core.html#hooks I have enabled the [CODE] feature in the [CODE] file. I have created a directory [CODE] with the hook script within the gitolite-admin repository and added a [CODE] line to the repo ...
It turned out that the information on the page http://gitolite.com/gitolite/non-core.html#hooks is actually wrong for version 3.6. The correct setup procedure is described on the page http://gitolite.com/gitolite/cookbook.html#v3.6-variation-repo-specific-hooks The directory must be created as [CODE] not as [CODE] .
1
2
1,185
2017-01-20T15:12:57.553
infrastructure
serverfault.com
65,818
DB2 Query Error SQL0204N Even With The Schema Defined
I'm using Python to access tables in DB2 10.1.0 I have a login account named foobar and a schema with the same name. I have a table named users under the schema. When I'm logged in as foobar, I can run the following query successfully from the command line: [CODE] I have a small Python script that I'm using to connect ...
Maybe there is a problem with upper and lower case. I created a table using the following statement: [CODE] If I try try to run on of the following statements at the CLP I get an error SQL -204 [CODE] [CODE] [CODE] Always the error message SQL0204N "DB2ROOT1.USERS" is an undefined name. SQLSTATE=42704 is returned. I wo...
3
0
5,430
2014-05-24T02:49:18.607
warehouse_errors
dba.stackexchange.com
139,147
Why can't I set oracle sessions value to 35?
I want to simulate the error "ORA-00018.Maximum number of sessions exceed", so I want to limit the number of sessions to 35, and open serverl sqlplus to simulate this error, but sessions number didn't change [CODE] change sessions from 248 to 35 [CODE] restart oracle instance [CODE] Nothing changed [CODE] Can anyone te...
SESSIONS Default value Derived: (1.5 * PROCESSES) + 22 ... Oracle uses the default value of this parameter as its minimum. Values between 1 and the default do not trigger errors, but Oracle ignores them and uses the default instead. If you want to decrease [CODE] , you need to decrease [CODE] as well. Still, if you dec...
2
1
1,249
2016-05-21T03:33:00.897
database_errors
dba.stackexchange.com
184,042
2003 disk check fails using standard UI tools
I'm trying to check a volume with the standard UI tools (right-click, tools, check now), and this is failing with the error: windows was unable to complete the disk check As recommended by a random forum post Google found, I tried to force a check on boot with chkntfs, however no check happened. How can I check (and at...
Try this, open a command prompt, and type "chkdsk c: /r" It will tell you the volume is in use, and ask if you would like it done on the next restart. Hit "Y" and do a normal restart.
0
1
713
2010-09-23T16:46:00.823
infrastructure
serverfault.com
78,074
Subset sum problem is NP-complete?
If I know correctly, subset sum problem is NP-complete. Here you have an array of n integers and you are given a target sum t, you have to return the numbers from the array which can sum up to the target (if possible). But can't this problem be solved in polynomial time by dynamic programming method where we construct ...
Your logic is correct - and what you described is a valid subset-sum algorithm that solves it in [CODE] . However, this type of algorithm is pseudopolynomial , meaning that it is exponential to the number of bits used to represent the input. What that means is, if your [CODE] is 1000, then I can make your program 10 ti...
9
13
1,100
2011-05-21T07:44:49.760
api_errors
softwareengineering.stackexchange.com
971,790
Port-forwarding iptables rule
I have not used iptables before aside from following pre-made instructions, so I am expecting that I've overlooked something basic! I've applied the below rule, but when trying to look it up it is not listed and is not working as expected. [CODE] The firewall is setup at the gateway level (Azure firewall), but on my Ub...
Ubuntu 18.04 does not install the iptables-persistent package by default as far as I'm aware. Please look at the first answer of https://askubuntu.com/questions/1052919/iptables-reload-restart-on-ubuntu-18-04 to see if it solves your problem.
0
0
524
2019-06-17T21:29:18.460
infrastructure
serverfault.com
963,226
Error related to disk while changing instance type from c4.large to c5.xlarge for ubuntu linux machine
I am providing user data to linux machine by cloudformation and its working fine when i am using c4 class type(example: c4.large, c4.xlarge) while it stop working when i am changing instance type in cloudformation and deploying on server by running jenkin job. i am using c4.large and when i changed instance type to c5....
The error message stated could not found the device name [CODE] . You may want to check if the device name is still [CODE] , most of the newer version of EC2 are using NVMe EBS, so the naming convention has changed to [CODE] , refer to here https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/device_naming.html You need...
0
0
223
2019-04-16T06:12:38.073
infrastructure
serverfault.com
3,823
AWS REST API Query
How to authenticate against AWS to make API query ? [CODE] and getting: [CODE]
Got it working by aws curl https://github.com/okigan/awscurl [CODE]
1
2
990
2018-04-06T13:02:15.957
api_errors
devops.stackexchange.com
733,869
MariaDB won't start - fails to check integrity
I have a MariaDB installed with [CODE] in my macbook. Worked fine till today. All of a sudden it wound not start: [CODE] also, if I issue [CODE] or any other mysql command I'm getting [CODE] which was pretty confusing and I spent hours figuring out where [CODE] went. When in reality it simple wasn't created since DB ne...
The errors indicate a corrupted database indeed, so it's best to start and troubleshoot from the bottom. I would try (re)moving all your databases and then see if MariaDB starts up again (it should). Then import your databases 1 by 1 until you find the problematic database and use your last good backup to restore that ...
1
1
491
2015-11-04T14:54:33.583
database_errors
serverfault.com
262,446
mysql separate email and cellphone from user table to avoid extra unused-space usage
i have a question about putting some string (fixed-length and variable (which Might be always null)) into a table or separate them (Because of space-usage even if it's null) ... for example, my user register with cellphone number or an email address this is for cellphone number: [CODE] and this is for email address: [C...
Use InnoDB, not MyISAM. Use [CODE] only for columns that are truly fixed length (country_code, uuid, postal_code, md5, etc). [CODE] is not likely to be such. I recommend against using a numeric field for a phone number. What if the user has an extension? Or needs a leading 0? Or enters dashes, etc? How many users are y...
0
0
60
2020-03-21T19:47:34.987
database_errors
dba.stackexchange.com
964,694
Ethetnet PMC driver Selftest
How to I convince an Ethernet driver to sent the data packet via an external cable, though the data packet is sent from IP 'A" to IP 'A'? The driver optimizes and does not take the route via an external cable. I need to either use Routing or low level functions of Vx-works 5.5(either TCP/IP or UDP) to solve the Etherne...
So you'd like to receive a packet via a cable, but the packet is to be prepared on the same machine. Connect Router to another end of the cable. It can be a Linux PC. Or just a home router. On your machine set static arp with [CODE] , so that UDP packet is sent to the Router's MAC address. The Router will return the sa...
-3
1
24
2019-04-26T08:24:27.033
infrastructure
serverfault.com
12,668
od output is confusing
This isn't a deploy related question, but I believe it belongs here. I've found out about the [CODE] tool yesterday, and began to fiddle with it. The question is about [CODE] encoding. See the examples: [CODE] So [CODE] translates to [CODE] correctly in each test besides the last, which begins with an [CODE] char. Why ...
Problem solved: It's because of endianess of output. There is an option [CODE] which by default is [CODE] . The example string was [CODE] , which translates to [CODE] [CODE] encoded: [CODE] (The [CODE] prevents [CODE] in the end of string, making last byte [CODE] ) So it's exactly the same output, but with bytes invert...
1
1
50
2020-10-30T14:17:52.173
pipeline_ops
devops.stackexchange.com
117,480
Should non-interface code be hidden from the client?
I am working on a library which had several headers that are meant to only be used by the library itself. I also have a few classes and functions in headers that I do not want the client to use. For instance, I have a header that contains debugging functions, but they should not be used outside of the library as it cou...
A common way to handle this is public and private headers. Given that some things must appear in a header file, either for physical implementation reasons, or for performance/inlining reasons, you need to split somehow. Have your public header include the private header; and add comment(s) nearby that this is an implem...
2
3
2,381
2011-11-02T14:29:02.430
api_errors
softwareengineering.stackexchange.com
163,850
Datapump export taking too much time to complete
I've scheduled to take a backup of my oracle11g database, daily at 11pm via Windows Task Scheduler. At this time, I'm not letting my database to go down. Also, my database is in noarchivelog mode. Although my dump size is 7GB only, this export is taking more than 11 hours to complete. It consists of 15 to 16 schemas. E...
By having your database is no archive log mode and doing a daily warm backup, you are saying that is acceptable to lose a day's worth of data. If that is the case then fine, you don't need archive log mode. Doing a data pump export will give you a logical backup of your database at a point in time. The next question th...
2
2
8,912
2017-02-10T07:51:54.263
database_errors
dba.stackexchange.com
485,348
hypervisor performance when running from USB
Just wondering if there is any performance impact / degradation when running from USB key I'm planning on using KVM or xen, since my servers doesn't have on board raid controller, I'm planning on cutting the cost down and use USB keys. Thank you
Assuming you are: Using a quality USB drive Not using the host's filesystem for the virtual machines Not actually running anything but virtual machines from the host you should be ok. A few things I would look out for however are: USB drives can easily get knocked around, snapped off, caught on cables, etc. Make sure i...
1
6
1,326
2013-03-06T19:56:16.730
infrastructure
serverfault.com
345,263
Proxy Auto config (PAC) exception
I want to configure a proxy pac file that has the same list of exception as the ones I have on IE -> Internet Options -> Connections -> LAN settings -> Advanced and after I can see the exception in the part that reads: "Do not use proxy server for addresses beginning with:" "*.blabla.com;" I've tried using DnsDomainIs,...
Found the solution with this http://code.google.com/p/pacparser/ .
1
0
4,187
2011-12-30T09:50:24.760
infrastructure
serverfault.com
930,903
GCP firewall only allowing SSH access from Google's own IP ranges
I've been experimenting with GCP and have configured GCP's firewall rules to allow my company's public IP and my own dynamic IP to be able to SSH into the instances (on their respective static public IPs). It's been working fine for a week or so. Today, I've been unable to SSH into the instances via PuTTY, or even Goog...
sigh After making some lunch and returning, the original rule is working again now. Unfortunately, GCP's firewall must be buggy/temperamental.
0
0
702
2018-09-14T11:43:55.617
infrastructure
serverfault.com
73,271
Google DataFlow
I'm trying to build a Google dataflow pipeline through one of the posts in Medium. https://levelup.gitconnected.com/scaling-scikit-learn-with-apache-beam-251eb6fcf75b However, it seems like I'm missing one of the project argument and it throws the following error. I'd appreciate your help to guide me through. Error: [C...
The error tells you to specify the project ID associated to the project in which you want to run the Dataflow job in. In the Python SDK, you can set this and other Google Cloud related variables in the following way: [CODE] For the full snippet, you can check the Dataflow documentation .
0
0
389
2020-04-30T06:10:31.927
pipeline_ops
datascience.stackexchange.com
240,922
Slow Web Performance on two Windows 2008 R2 Terminal Servers
We have two Windows 2008 R2 servers that we use for agents to log into to access our customers systems. Saturday morning we received complaints that on both servers the web is running horribly slow. This happens on all websites and the majority of the time the web site times out trying to load. Other users located at t...
I recommend you RDP into servers and run Network Monitor while trying to browse the slow sites and see if you get retransmits, syn retransmits, etc. Also narrow your issue by trying non HTTP protocols out to Internet and see if it's just web browsing. If your using a web proxy that would be a place to troubleshoot as w...
0
0
2,292
2011-02-27T20:36:40.460
infrastructure
serverfault.com
779,263
Single front NGINX to proxy pass SSL to sites with their own certificates
Current setup: Front NGINX proxy passes 80 and 443 to local VM Local VM's NGINX redirects everything to HTTPS (if request is HTTP/80) Local VM's NGINX listens to 443 and proxy passes to the upstream backend Front NGINX: [CODE] Domain1.com's NGINX: [CODE] Problem: Domain1 is a local network VM. This is currently the VM ...
You can't just declare "ssl" without setting SSL up properly. You need to provide certificates and private keys. I have a tutorial on how to do that with Let's Encrypt here , or you can google "Nginx how enable SSL" and follow a beginners tutorial. Config should end up looking something like this [CODE]
0
0
1,923
2016-05-26T19:03:28.143
infrastructure
serverfault.com
115,459
Is it possible to train a Support Vector Machine to a specific accuracy?
From my understanding, support vector machines run on the premise of minimizing some error function, usually with the goal of maximizing accuracy overall. However, there are a lot of contexts, particularly in the social sciences, where people don't aim for 99%+ accuracy, but instead aim for 95% accuracy (e.g., 95% CI, ...
There is no deterministic way to trade accuracy for generalizability. Integral part of machine learning is splitting your available data into a training set and test set (or even an intermediate validation set, depending on the amount of available data). With that said you train the model on the training set and then a...
0
1
36
2022-10-21T17:21:36.610
data_quality
datascience.stackexchange.com
308,762
Remote 2003 Active Directory - DNS server issues
Our main HQ has two DC's with DNS running on Windows 2003 SP2. We added a remote site so I took a member server at the remote site (linked to the main site using hardware VPN) and ran dcpromo on it and it upgraded it to a domain controller. But I realized it did not install a DNS server nor did it ask me to. Thinking I...
The DNS zone is configured by default (although I guess you can reconfigure it differently) to replicate to all DCs in a domain. DC replication is also set by default to replicate across sites every 3 hours. Practice patience and you'll notice the DNS zone automagically appear. If it's not, run dcdiag, check your DNS s...
2
2
90
2011-09-06T22:49:26.370
infrastructure
serverfault.com
1,005,996
compute engine loading screen after enabling billing
This feels like an odd question to be asking here. I get a loading circle when I enable billing on Google Cloud Platform > Compute Engine > VM Instances. I cannot access my VM Instances. I do not know why. I would like to know some command I can use in my cloud shell. So far the only way I've fixed this before is sendi...
For Bronze support level users of Google Cloud: I was able to solve my own problem with the gcloud console . What I did was [CODE] . From there I was able to choose the project that had the frozen web-page with the instance that was running. Then I was able to run [CODE] This showed the instance that was running and I ...
0
1
372
2020-03-07T14:34:01.227
infrastructure
serverfault.com
165,137
PHP 5 windows install problem: http://localhost/info.php
I downloaded the php-5.3.3-Win32-VC6-x86.msi file from php's download page. I have a working apache2 server running. On the setup window I selected the apache 2.2.x Module and on the Apache Configuration directory I selected the conf file. The info.php page isn't appearing on my browser (404 Not Found), why?
sorry I would leave this as a comment but I can't: if you don't need version 5.3.3 and version 5.3.1 is fine too then I'd suggest that you stick with XAMPP which does all the setup work for you
1
1
2,225
2010-07-28T16:05:09.667
infrastructure
serverfault.com
739,531
Arch cryptsetup hangs on 'waiting for zero'
Cryptsetup was working flawlessly for months, but something I did today on my system now makes it hang: [CODE] Also when I do [CODE] , I used to get UUIDs for all of the devices (including [CODE] ) but now I only get a UUID and FSTYPE for the rootfs (every other device is listed, but FSTYPE, LABEL, and UUID are empty)....
Stupidity in my [CODE] : [CODE] Deleted the horrible horrible symlinks and everything's fine now. I accidentally ran the above links on the main system rather than inside the LXC container. ( https://wiki.archlinux.org/index.php/Linux_Containers#Systemd_conflicts_in_the_.2Fdev_tree )
3
1
2,584
2015-11-28T22:30:33.587
infrastructure
serverfault.com
274,444
Integrating QA within agile sprints
I've been working in "Agile" for a while and am working to move more towards agile at a new company. One of the problems I have always sort of encountered is effective integration of QA within the sprint. We've done better at getting stories to QA earlier and shortening that feedback loop, but in the example of a 2-wee...
Developers and QA should both work up until the end of the sprint. Developers can spend the last day/few hours working on QA feedback, performing their own unit tests, reviewing or refactoring code, etc. assuming there is not enough time to pull in any stories from the backlog. QA will of course spend the last time in ...
1
2
203
2015-02-25T16:39:55.407
api_errors
softwareengineering.stackexchange.com
410,262
What's the origin of the term "dirty" in regards to unsaved progress?
Oftentimes, "dirty" is used to represent unsaved code, memory, or files. For example, a file can be "dirty", meaning it's unsaved, memory can be "dirty", meaning it's been modified but hasn't been written to RAM, and Git reports its working tree as "clean" when there are no uncommitted changes. I understand why you wou...
Taking a careful look back, it seems that dirty has been used for quite a long time now. Check, for example, the book: Inside Windows 2000 Server , page 800). Also, in (1999) Encyclopedia of Computer Science and Technology: Volume 41 - Supplement 26 , page 22, Dirty has a clear definition. In Volume I of the IEEE Proce...
10
12
2,146
2020-05-18T01:24:05.430
api_errors
softwareengineering.stackexchange.com
14,914
If i issue a rollback when recovery mode is bulk logged, will my bulk operations be rolled back?
If my recovery model is BULK LOGGED, I'm in a transaction, and I've issued some statements that are minimally logged like SELECT * INTO, will a ROLLBACK undo those minimally logged statements?
Yes. I decided asking here was just being ultra-lazy so tested it myself. [CODE] This shows that the rollback does remove the table tmp_test and the row from tmp_test2, so the answer is that minimally logged operations are still rolled back. Hmm... so how come using them prevents the transaction log from getting really...
3
1
356
2012-03-13T14:22:58.223
warehouse_errors
dba.stackexchange.com
337,900
When to use structured record/object, when to use list of strings?
I've written some apps using simple imperative way - now I want to learn more about building software the object oriented way. My goal is to take an Excel file and load one of the tables into memory. I can do this by: Creating a list of strings for each row, and store the table in list Creating a structure/ class for t...
I guess you are talking about one two-dimensional table in an Excel sheet, where each column has a certain meaning, not a full excel document with all possible meta information. If you know the specific columns and their meaning beforehand, at compile time, (typically the columns have headers with some header titles), ...
-1
1
80
2016-12-10T09:18:26.160
api_errors
softwareengineering.stackexchange.com
229,697
Where to put comments, class declaration or constructor?
For a given class, where should the comments about the purpose of the class go? [CODE] If I go with the first option, the purpose of the class is very easy to find when I open the file, it's in the same place, on approximately the same line. When you have lots of classes, this is easier for the eyes. You don't have to ...
The purpose of the class should be described above the class name. A documentation above the constructor is to document differences between the different constructors of the class and what the parameters passed to the constructor(s) do.
3
12
2,732
2014-02-20T11:39:50.467
data_quality
softwareengineering.stackexchange.com
696,131
Weird authentication error from Active Directory Win 2008R2
I am trying to do a ldap query from a OpenBSD client to windows 2008R2 active directory and I am getting this error,"49: Invalid credentials". I don't understand why if I tried the same username and password from a windows 7 client and it worked. here is a screenshot of my login.conf and the error I am getting. https:/...
I haven't set up a *nix client but you can try specifying the username in the following formats: domain\user user@domain.com distinguished name Also, the connection is occurring over TCP389 which means your credentials may be traversing the network in clear text. This will be helpful for troubleshooting but when everyt...
0
0
66
2015-06-02T15:37:42.317
api_errors
serverfault.com
584,246
Expand Amazon EC2 HVM root partition
I created a VM with the Amazon AMI HVM. In the partition configuration I changed the default 8GB root partition to something bigger (10 in my example). Once up, I'm trying to resize but it's not working as it was with Paravirtual. [CODE] Why is resize2fs not working with HVM ? I know how to expand the root partition, b...
Since HVM is using GPT formated partition, use gparted / gdisk instead of fdisk. This can't be automated, but you can create an AMI once resized and use it, not ideal though.
0
0
522
2014-03-24T20:46:51.960
infrastructure
serverfault.com
1,108,186
Runing portainer on a new docker/docker compose install
Here is my .env file : [CODE] Here is my composer file : [CODE] WHen I start portainer I have the following logs : [CODE] I start with : [CODE] I see logs using : [CODE] I think my problem is that I followed a tutorial that use Nginx Proxy Manager (NPM) and I am trying to not use it (I have a 5G home internet). WHat is...
If there is no reason as to why have you commented the command line when defining Portainer service, Please uncomment it. This will allow portainer to use Unix socket. In summary, the following line should be uncommented. [CODE] Alternatively, In the event you have socket proxy enabled. This should work. [CODE] See thi...
-1
0
427
2022-08-14T18:39:10.557
pipeline_ops
serverfault.com
734,213
Transform Two Server Connections Into One P2P Connection
I would like to create a match making server framework for online communication between multiple machines in different LANs. To keep the delays add low as possible I want to be able to create a peer to peer connection, but based on what I know about TCP you would need to forward ports to make this happen; I don't want ...
After doing more research it appears that I want to implement a "hole punching" system. While this will not preserve the current streams/sessions it will do what I want.
1
0
102
2015-11-05T17:18:33.843
infrastructure
serverfault.com
236,933
Dropping the automatically created NT AUTHORITY and NT SERVICE accounts
So I recently moved jobs - one piece of code I've spotted in our build scripts for new SQL Server installations is below. [CODE] These accounts are created during the SQL Server installation process by default. Are dropping the above logins recommended? Are there any side effects this could cause? What are these logins...
Before you downvote, here is formal documentation you can reference for a legitimate reason why these accounts would be scripted as you see: STIG Rule SV-53421r2_rule . These controls are SQL Server version specific, but there are a number of other controls in the more recent versions as well. If you work for an organi...
10
4
2,332
2019-04-29T12:46:36.887
database_errors
dba.stackexchange.com
1,078,993
download newest build of an artifact using maven in the command line
All I want at the end of the day is for the puppet-managed servers in our development environment to always pull the latest build of the latest version of whatever application they are running. While maven isn't exactly intended for that, since all the shadowjars live in the same repository as their dependencies, and a...
Maven is very efficient in dependency management. Thus is never re-downloads release jars. Option 1 Make the version to be [CODE] Option 2 specify a version range [CODE] At the end run [CODE]
0
0
420
2021-09-29T07:37:01.543
pipeline_ops
serverfault.com
878,530
Nvidia driver breaks vncserver on CentOS 7.4, is there a work around?
[CODE] When using the Nvidia graphics card driver with the Nvidia GeForce GT 720 graphics card on CentOS 7.4 it works fine for the wired computer monitor on the console. However, when attempting to connect to the vncserver, you only get a blank black screen on connection. I have removed the Nvidia driver, and VNC works...
TurboVNC + VirtualGL is a good alternative. Pros: Good performance. Works with desktop environments, that require 3D acceleration ( like Gnome3 ), with [CODE] . Remote 3D rendering works even with headless GPUs . The cons is that it might be tricky to config. I've just finished setting it up on my CentOS 7 and NVidia K...
2
2
5,328
2017-10-15T09:23:17.537
infrastructure
serverfault.com
858,750
Java Servlet not found on Google App Engine deploy
I am working on an Apache Maven dynamic web project on eclipse. It uses static files (html, css, js) and a Java servlet. When I deploy my project to the google app engine, the Java servlet does not handle http requests. The project runs perfectly locally. The servlets use @WebServlet, but adding url-mapping to the xml ...
I was able to reproduce your issue. It seems you are missing the cloud tools plugin. To resolve it, add the following on your [CODE] : [CODE] If the above does not mitigate your issue, please post full error logs. Thanks
1
0
1,560
2017-06-30T13:21:26.647
infrastructure
serverfault.com
40,964
Unable to get the private bytes memory limit for the W3WP process
We run several ASP.NET applications on our webfarm, but we noticed a lot of error entry in the event log: Unable to get the private bytes memory limit for the W3WP process. The ASP.NET cache will be unable to limit its memory use, which may lead to a process restart. We stores the web site files on a network share and ...
Did you restart the IIS service after having executed the scripts? This blog post also recommends using this statement for granting permissions to the filters: [CODE] This error is caused by a known issue with insufficient permissions in your IIS metabase.
2
2
1,653
2009-07-15T10:37:55.090
infrastructure
serverfault.com
1,156,034
getopts does not find missing arguments on multiple options
Bash 5.1.16 The following code doesn't work for me: [CODE] If I provide '-l' without a value, showhelpscreen (:) is called (OK) If I provide '-l' with a value, all is going well and "went through" is printed (OK) If I provide '-l -s', "went through" is printed. Either of the options need a value but none is given. In m...
As larsks said, getopts interpretes a second 'option' (in this case -s) as a value of the preceding option. You'll need to care on error handling on your own if values are missing.
0
0
39
2024-03-11T04:08:21.520
infrastructure
serverfault.com
1,125,122
fail2ban: how to combine multiple failregex?
I'm having problems with adding multiple [CODE] lines in my [CODE] file. It works if I have one line but doesn't work if I have two. This is my my jail.local config: [CODE]
Figured it out, remove the second [CODE] : failregex = %(known/failregex)s ^Bad protocol version identification '.*' from ^runcloud[\d+]: echo: http: TLS handshake error from :\d+
0
0
324
2023-03-02T11:10:21.127
infrastructure
serverfault.com
924,647
Sync of SYSVOL content between Windows 2016 Domain Controllers
I have the following setup: Two Domain Controllers in different sites (both Windows Server 2016) -The sites are permanently connected via a VPN (so the servers can directly reach each other) The Domain Controllers are in different subnets The Domain Controllers are both Global Catalogs The problem I have is with the sy...
Have you checked the Event log under Application and Services Log in event viewer it could be related to file replication service and the DC could be in one of the following states: Assertions in the FRS service Corruption of the local jet database Journal wrap errors FRS replication failures This article might be able...
0
0
2,198
2018-08-02T15:22:08.687
database_errors
serverfault.com
172,541
Nested Cursors in Mysql problem with FETCH
I have the problem with my nested cursors in MySQL. My second cursor only advances 1 single record of the first courses and then shows me message indicating. Below is a sample of the response from my Mysql Workbeanch. OPEN queryLegalArticleSource; queryLegalArticleSource_LOOP : LOOP -- PARSED VARS FETCH queryLegalArtic...
You are trying to close the cursor after it is already closed. If no more rows=1 is true, it closes the cursor. Then exists the loop. Then tries to close the cursor again.
2
1
1,604
2017-05-02T17:56:09.543
database_errors
dba.stackexchange.com
1,056,851
How to point external DNS record to GCP VM instance without static external IP?
I have many VMs in Google Cloud that are required seldomly for debugging. Running them all the time would cost quite a lot, so they're shutdown most of the time. The problem is that Ephemeral IP addresses change if machine is rebooted and DNS records will mismatch. I know one can use static IP addresses, but IP Static ...
hope you are well. To add a little bit to the previous answer from @Sergiusz, here is what I did. Configured a zone in Cloud DNS (outside of the scope of the question) Created a service account with DNS Administrator role/permissions assigned (can be tightened a bit), then downloaded the json key for the service accoun...
0
1
3,185
2021-03-12T13:40:56.650
infrastructure
serverfault.com
638,988
Supervisord - ini file error on CentOS
I installed Supervisor on CentOS 6.5 and currently experiencing some weird error that I can't seem to fix. I created a [CODE] file in [CODE] directory and call supervisor like this: [CODE] Which looks pretty basic. But this error keeps appearing: [CODE] My supervisord.conf file looks like: [CODE] Does anybody know what...
You're probably missing the [CODE] section in the file. See this . For example , [CODE]
25
28
38,450
2014-10-23T01:40:11.863
infrastructure
serverfault.com
69,933
set date value based on other row values
Sorry for the Header, I can't find the right way to describe what I want, possibly the reason why I can't get a solution by googling :) ... Here my problem: I've got a table with the following structure and some example data: [CODE] So my Table should look like this: [CODE] What I would like to accomplish now is to set...
You can calculate the [CODE] in a [CODE] and use [CODE] to add it to [CODE] in the main query. [CODE] SQL Fiddle Update: I am not really sure how you want to deal with different [CODE] within a [CODE] . The above query groups on [CODE] and [CODE] but I guess an alternative would be to use the lowest [CODE] per [CODE] i...
1
1
984
2014-07-08T11:22:02.710
warehouse_errors
dba.stackexchange.com
1,029,003
EAP / MSCHAPv2 authentications fails (only) on Windows with custom authenticator
I have a project that involves custom client authentication for the StrongSwan IKEv2 server implementation on Linux. I am running: StrongSwan 5.4.0 with eap-radius plugin Currently, we use FreeRadius to speak EAP-MSCHAPv2 with various client platforms (Windows, Mac, Linux). Due to some limitations, we need to implement...
The combination of StrongSwan and Windows is problematic in my experience. And you have quite a few variables. I may not provide you exact answer as I don't know the whole setup. Microsoft likes retro ciphers and hashing algorithms. Ensure the dh-group is as expected, and seems there is difference in password format, t...
3
0
4,076
2020-08-05T18:42:59.490
api_errors
serverfault.com