/usr/local/cpanel/scripts/gensysinfo
rpm -qf --queryformat '%{VERSION}\n' /etc/redhat-release
Monthly Archives: November 2018
php selector disabled please contact hoster
Need to check cloudlinux license
cldetect --check-license
OK
rpmdb: Thread/process 1159164/140163415340800 failed: Thread died in Berkeley DB library
mkdir /var/lib/rpm/backup
cp -a /var/lib/rpm/__db* /var/lib/rpm/backup/
rm -f /var/lib/rpm/__db.[0-9][0-9]*
rpm --quiet -qa
rpm --rebuilddb
yum clean all
lxc Error creating container test
sudo lxc-create -t download -n test
Error creating container test
sudo lxc-create -t download -n test -o aaa.log
lxc-create: test: confile.c: set_config_net: 258 lxc.net must not have a value
lxc-create: test: parse.c: lxc_file_for_each_line_mmap: 103 Failed to parse config: lxc.network.type = veth
vi /etc/lxc/default.conf
#lxc.network.type = veth
lxc.net.0.type = vet
#lxc.network.link = virbr0
lxc.net.0.link = virbr0
lxc.net.0.flags = up
lxc.net.0.hwaddr = 00:16:3e:xx:xx:xx
413 Request Entity Too Large
vi /etc/nginx/nginx.conf
client_max_body_size 50M;
client_body_buffer_size 1m;
client_body_timeout 15;
client_header_timeout 15;
acme no root
useradd -m -d /var/lib/acme -s /usr/sbin/nologin acme
chmod 700 /var/lib/acme
mkdir -p /var/www/EXAMPLE.com/.well-known/acme-challenge
chown acme.acme /var/www/EXAMPLE.com/.well-known/acme-challenge
chmod 755 /var/www/EXAMPLE.com/.well-known/acme-challenge
location ~ /.well-known {
allow all;
root /var/www/EXAMPLE.com;
}
visudo
acme ALL=(ALL) NOPASSWD: /usr/sbin/service nginx reload
su - acme -s /bin/bash
export HOME=/var/lib/acme
cd /var/lib/acme
git clone https://github.com/acmesh-official/acme.sh.git
cd acme.sh
./acme.sh --install
cd /var/lib/acme
.acme.sh/acme.sh --issue -d EXAMPLE.com -w /var/www/EXAMPLE.com
./acme.sh --issue -w /var/www/EXAMPLE.com -d EXAMPLE.com -d www.EXAMPLE.com
ssl_certificate /etc/nginx/auth-acme/EXAMPLE.com.crt;
ssl_certificate_key /etc/nginx/auth-acme/EXAMPLE.com.key;
ssl_trusted_certificate /etc/nginx/auth-acme/EXAMPLE.com.ca;
service nginx reload
kill cdp_io zombie
rpm -qa | egrep “serverbackup|r1soft”
serverbackup-enterprise-agent-6.8.2-55.x86_64
serverbackup-agent-6.8.2-55.x86_64
serverbackup-async-agent-2-6-6.8.2-55.x86_64
serverbackup-setup-6.8.2-55.x86_64
Remove and install again
vim copy all text to clipboard
gg”*yG
cPanel disable service command line
vim /etc/chkserv.d/chkservd.conf
limit kipmi0 CPU load
echo 10 > /sys/module/ipmi_si/parameters/kipmid_max_busy_us
vi /etc/modprobe.d/ipmi.conf
options ipmi_si kipmid_max_busy_us=10
named (bind) logs centos 7
journalctl –unit=named -f
and
journalctl -u named -f
journal rollforward failed: journal out of sync with zone
journal rollforward failed: journal out of sync with zone
not loaded due to errors.
rm /var/named/zones/proble_zone.com.jnl
service named restart
lvm change cache mode
lvs -o+cache_mode,cache_settings /dev/centos/data
LV VG Attr LSize Pool Origin Data% Meta% Move Log Cpy%Sync Convert CacheMode CacheSettings
data centos Cwi-aoC— <2.54t [lv_cache] [data_corig] 3.16 0.09 0.00 writethrough
lvchange –cachemode writeback centos/data
Logical volume centos/data changed
lvs -o+cache_mode,cache_settings /dev/centos/data
LV VG Attr LSize Pool Origin Data% Meta% Move Log Cpy%Sync Convert CacheMode CacheSettings
data centos Cwi-aoC— <2.54t [lv_cache] [data_corig] 3.72 0.09 0.00 writeback
linux protect directory with password
yum install fuse-encfs
encfs /root/encryptdir /root/decryptdir
he directory “/root/encryptdir/” does not exist. Should it be created? (y,N) y
The directory “/root/decryptdir/” does not exist. Should it be created? (y,N) y
Creating new encrypted volume.
Please choose from one of the following options:
enter “x” for expert configuration mode,
enter “p” for pre-configured paranoia mode,
anything else, or an empty line will select standard mode.
?> p
Paranoia configuration selected.
Configuration finished. The filesystem to be created has
the following properties:
Filesystem cipher: “ssl/aes”, version 3:0:2
Filename encoding: “nameio/block”, version 4:0:2
Key Size: 256 bits
Block Size: 1024 bytes, including 8 byte MAC header
Each file contains 8 byte header with unique IV data.
Filenames encoded using IV chaining mode.
File data IV is chained to filename IV.
File holes passed through to ciphertext.
————————– WARNING ————————–
The external initialization-vector chaining option has been
enabled. This option disables the use of hard links on the
filesystem. Without hard links, some programs may not work.
The programs ‘mutt’ and ‘procmail’ are known to fail. For
more information, please see the encfs mailing list.
If you would like to choose another configuration setting,
please press CTRL-C now to abort and start over.
Now you will need to enter a password for your filesystem.
You will need to remember this password, as there is absolutely
no recovery mechanism. However, the password can be changed
later using encfsctl.
New Encfs Password:
Verify Encfs Password:
mount
encfs on /root/decryptdir type fuse.encfs (rw,nosuid,nodev,relatime,user_id=0,group_id=0,default_permissions)
mv -v /root/secret.tar.gz /root/decryptdir
fusermount -u /root/decryptdir
To access data:
encfs ~/encryptdir/ ~/decryptdir/
EncFS Password: