Most Popular

1500 questions
65
votes
4 answers

Suspicious symbols on nginx config

I have the following nginx config, e.g. server { listen 80; server_name example.com allow 127.0.0.0/8; When I restart, it warn me: Restarting nginx: nginx: [warn] server name "127.0.0.0/8" has suspicious symbols in…
Ryan
  • 6,021
65
votes
4 answers

How do I change the NGINX user?

I have a PHP script that creates a directory and outputs an image to the directory. This was working just fine under Apache but we recently decided to switch to NGINX to make more use of our limited RAM. I'm using the PHP mkdir() command to create…
David
  • 885
65
votes
1 answer

Why are my XFS filesystems suddenly consuming more space and full of sparse files?

I've run XFS filesystems as data/growth partitions for nearly 10 years across various Linux servers. I've noticed a strange phenomenon with recent CentOS/RHEL servers running version 6.2+. Stable filesystem usage became highly variable following…
ewwhite
  • 198,150
65
votes
2 answers

Executing a command as a nologin user

I've recently set up my server so that my suPHP 'virtual' users can't be logged into by using this article My issue now is that before when I ran a rake command for my Ruby on Rails application running on the server, I used su to go into www-data…
user82250
65
votes
4 answers

How to manage my .ssh/known_hosts file

I run an Ubuntu desktop with a bunch of virtual servers in Virtual Box to test stuff out, etc. In the past I have also been connecting to other kinds of remote VPS Linux boxes. Currently my .ssh/known_hosts file has a whole bunch of keys in it, most…
Luke
  • 3,856
  • 8
  • 36
  • 42
65
votes
7 answers

How do you wait for an exe to complete in batch file?

I'm trying to create a script to execute an exe on shutdown in order to install sp1. my script goes something like (not actual bat script). If installed GOTO END Install.exe END: My problem is that when it runs, it starts the installer, then…
Kravlin
  • 765
65
votes
6 answers

Hostnames - What are they all about?

I've recently been "forced" to perform some sysadmin work, while this isn't something that I absolutely love doing I've been reading, experimenting and learning a lot. There is one fundamental aspect of server configuration that I've not been able…
Alix Axel
  • 2,813
65
votes
6 answers

How to rename a MySQL database?

How to rename a MySQL database? The MySQL online manual has said about the RENAME DATABASE command (this documentation page has been removed by Oracle some time ago): This statement was added in MySQL 5.1.7 but was found to be dangerous and was…
nalply
  • 1,107
  • 1
  • 11
  • 19
65
votes
11 answers

Denyhosts vs fail2ban vs iptables- best way to prevent brute force logons?

I'm setting up a LAMP server and need to prevent SSH/FTP/etc. brute-force logon attempts from succeeding. I've seen many recommendations for both denyhosts and fail2ban, but few comparisons of the two. I also read that an IPTables rule can fill the…
spiffytech
  • 1,093
65
votes
12 answers

Subversion error: (405 Method Not Allowed) in response to MKCOL

I am getting the following error while trying to commit a new directory addition. svn: Commit failed (details follow): svn: Server sent unexpected return value (405 Method Not Allowed) in response to MKCOL request for '.... I have never seen this…
65
votes
16 answers

What is the correct temperature for a server room?

When I was working in our server room, I noticed that it was very cold. I know that the server room has to be cold to offset the heat of the servers, but perhaps it is TOO cold. What is an appropriate temperature to keep our server room at?
65
votes
37 answers

What is the single most influential book every sysadmin should read?

For software developers, there are some books you must absolutely read. What is the single most influential book every programmer should read? How about for sysadmins? Is there a similar list of books?
Gulzar
  • 381
64
votes
5 answers

Optimal value for Nginx worker_connections

Nginx worker_connections "sets the maximum number of simultaneous connections that can be opened by a worker process. This number includes all connections (e.g. connections with proxied servers, among others), not only connections with clients.…
Aarti
  • 719
64
votes
13 answers

Linux: productive sysadmins without root (securing intellectual property)?

Is there any way to make a seasoned Linux syadmin productive without giving him full root access? This question comes from a perspective of protecting intellectual property (IP), which in my case, is entirely code and/or configuration files (i.e.…
Matt
  • 1,047
64
votes
1 answer

Server Aliases on NGINX

I'm moving a site to a new server running on NGINX. The old site's Apache2 VirtualHost has ServerAlias configured that I want to replicate in the NGINX configuration. From what I've read on the NGINX Docs this seems to be simply achieved with…
Holly
  • 1,037