I was recently working on a server where a user on the server was concerned with these log messages:
In some situations with dovecot running on your server, you may receive a message from your e-mail client stating that the “connection was interrupted with your mail server” or the “login process failed”.
On brand new Plesk 8.
I’ve seen quite a few situations where the Horde login process can take upwards of 45 minutes to log a user into the webmail interface.
·88 words·1 min
One of the most annoying (and explosive) changes in Plesk 8.
·170 words·1 min
If you want to convert a MyISAM table to InnoDB, the process is fairly easy, but you can do something extra to speed things up.
·352 words·2 mins
Yet another weird Plesk error with terrible grammar popped up on a server that I worked with this week:
·154 words·1 min
Normally, this error will pop up when you attempt to restart a Plesk-related service, like httpsd, psa-spamassassin or qmail:
Some users will want to parse HTML through the PHP parser because one of their applications requires it, or because they think it’s a good idea.
Since AOL sends their users’ traffic through proxy servers, this can cause problems with Horde’s session handling in Plesk.
·73 words·1 min
In the event that your system is running out of file descriptors, or you simply want to know what your users are doing, you can review their count of open files by running this command:
·49 words·1 min
So, you might be saying: “where the heck are the updates for RackerHacker lately?
·61 words·1 min
I’ve been hard at work on the boxcheck.
·69 words·1 min
If you want to adjust how long postfix will hold a piece of undeliverable mail in its queue, just adjust bounce_queue_lifetime.
·48 words·1 min
With RHEL 5 ditching up2date for yum, many Red Hat users might find themselves confused with the new command line flags.
·44 words·1 min
If you have SpamAssassin installed, but you want to make sure that it is marking or filtering your e-mails, simply send an e-mail which contains the special line provided here:
When you create a CSR and private key to obtain an SSL certificate, the private key has some internal data called a modulus.
·305 words·2 mins
By default, Red Hat Enterprise Linux 2.
·45 words·1 min
When you find yourself in a pinch, and you don’t know the limits of a certain Red Hat Enterprise Linux version, you can find this information in one place.
·124 words·1 min
So, this is not really related to the normal system administration topics discussed here, but it’s Sunday, so I feel like something different.
·118 words·1 min
We all enjoy having the GoogleBot and other search engine robots index our sites as it brings us higher on search engines, but it’s annoying when some user scrapes your site for their own benefit.
·71 words·1 min
If you’ve run MySQL in a replication environment, or if you’ve enabled binary logging for transactional integrity, you know that the binary logs can grow rather quickly.
I rolled out a new MySQLTuner update tonight and made the following changes:
I hear a lot of complaints about Plesk’s backup routines and how they can bring a server to its knees.
·21 words·1 min
In the spirit of Labor Day, there will be no new items today.
·209 words·1 min
If an .
·153 words·1 min
Let’s say you have a user who can’t receive e-mail.
Lots of PCI Compliance and vulnerability scan vendors will complain about TRACE and TRACK methods being enabled on your server.
If you find yourself in a pinch and you need a temporary fix when your primary IP is blacklisted, use the following iptables rule:
One of these errors might appear on your website without warning:
This error completely stumped me a couple of weeks ago.
This error will pop up when binary logging is enabled, and someone thought it was a good idea to remove binary logs from the filesystem:
·106 words·1 min
When connecting to your server’s POP3 service, your client might provide this error just after authentication:
It’s not abnormal for qmail act oddly at times with Plesk, and sometimes it can use 100% of the CPU.
·145 words·1 min
If you have to use short e-mail usernames in Plesk (which is a bad idea), and someone accidentally sets the server to use full usernames, you can force Plesk to go back.
·158 words·1 min
While running into MySQL’s open files limit will manifest itself into various error messages, this is the standard one that you’ll receive during a mysqldump:
By default, views in MySQL 5.
·192 words·1 min
Sometimes MySQL’s process list will fill with unauthenticated login entries that look like this:
·52 words·1 min
Help me out!
I’ve been flooded with requests for MySQLTuner and I’ve answered them this weekend.
·130 words·1 min
In some situations, you may want to have domain.
With Plesk 7.
·112 words·1 min
Urchin sometimes takes it upon itself to do some weird things, and this is one of those times.
·885 words·5 mins
An often misused and misunderstood aspect of MySQL is the query cache.
Should you find yourself in the situation where you’ve forgotten the Urchin admin password, don’t worry.
·185 words·1 min
When Urchin’s task scheduler fails, you’ll notice big gaps in your data within Urchin.
·214 words·2 mins
One question I hear quite often is “how do I add IP aliases in FreeBSD?
·403 words·2 mins
Using the InnoDB engine can be tricky due to the ibdata files’ rather untraditional behavior.
·539 words·3 mins
MySQL documentation can be awfully flaky - extremely verbose on issues that don’t require such verbosity, and then extremely terse on issues that need a lot of explanation.
Plesk has a (somewhat annoying) default firewall configuration that you can adjust from within the Plesk interface.