How to Troubleshoot Server Load and Processes

Size: px
Start display at page:

Download "How to Troubleshoot Server Load and Processes"

Transcription

1 How to Troubleshoot Server Load and Processes Greetings! This is your introductory guide to understanding and troubleshooting a Linux server. This guide will assist you to ensure server stability and efficiency. Please note that this is a crash course and will only provide adequate information for you to complete your tasks. Only through experience will you gain complete understanding. First off, what is load? Server load is technically the number of processes that are waiting to access the server s CPU. However, within a server environment not all processes are identical. Depending on the priority of the process some will instantly be processed while the lower priority processes will wait. How do we know what load values are acceptable or relatively high? The simplest way to calculate the actual load per core is to divide the total load (as displayed by w or uptime commands) divided by the number of cores available to the server. This presents the amount of processes that is being called by each individual core within the CPU. Here the load is To obtain actual load we proceed with 4.23/8 equaling 0.53 per core. Typically a load value of up to 1.0 per CPU/core is acceptable because that value suggests the CPUs or cores are being fully utilized and no processes are waiting long for the CPU to finish. However, due to the multitude of factors that contribute to load, even a value of.75 per core can still cause a server to be sluggish or unresponsive. As mentioned, there are other factors that affect the overall responsiveness of a server. Other things that can affect server performance are physical memory use, swap file utilization and disk usage. For example, if a server does not have sufficient physical memory for an operation, the request will then use a swap file (virtual memory space accessed from the server s hard drive) which places a large amount of strain on the disk to complete the process thus elevating the total load generated by that single process and slowing completion of other processes. This can lead to a snowball effect, causing additional slowness and load until the server eventually becomes unresponsive. The goal is to either stop the issues causing problems before the server becomes unresponsive or diagnose what happened after a server crash to determine what cause the problem, which is far more difficult. 1 H o s t D i m e. c o m

2 What Contributes to Server Load and How to Discern the Origin When you are logging into server that you want to investigate, where do you start? When in a Linux environment you have 3 major points to consider at the start: port connections, server processes, and hardware. Port Connections How do server processes and port connections differ? Technically, though port connections do in fact normally access processes thus spawning process threads, this will not always be reflected when viewing the process list and you must refer to the firewall or port to confirm. Port connections to the server can be made on any port that may be open within the firewall however the following ports are most common: Port Service Port Service 21 FTP 2082/2083 cpanel/ssl 25/26/465 SMTP 2086/2087 WHM/SSL 80/443 HTTP 2095/2096 Webmail/SSL 110/995 POP Remote MySQL 143/993 IMAP 8443 Plesk via SSL The ports on the right will not be displayed when checking on the active connections however are still good to have for general knowledge and practical application. When investigating port connections, we have developed more efficient means such as BASH one liners to assist in providing more organized and refined output such as below. When investigating port connections, as a general policy we do not permit a single IP address to have 30 or more concurrent connections within our shared environments as this is considered to be abusive. However, do not simply suspend or block the IP address as you must investigate what service it is connecting to, what address or domain, and if they are legitimate traffic or simply an external connection that is malicious. Server Processes Not all services require an external connection to spawn them, but there are many internal processes (especially on cpanel servers) that are present and need to be accounted for. The main services you should familiarize yourself with are Apache/PHP (web service), Exim (MTA), Dovecot (POP3/IMAP), MySQL (Databases) and these additional processes: cpsrvd (cpanel), cpbackup (automated backup script), cpanellogd (stat logging), and cpdavd (webdisk). All of these processes will be contributing to the load regularly and will have to be thoroughly investigated (and reconfigured in some cases) to ensure proper server stability and functionality. 2 H o s t D i m e. c o m

3 Apache and PHP All of our shared servers and most of the VPS/dedicated systems that you work with will be running Apache as the web server. The processes spawned by Apache and PHP can be investigated via ps aufx (lists all active processes) and httpd fullstatus (current Apache requests), but can also be investigated in a more efficient manner with further BASH/Linux knowledge. Normally, a domain experiencing a very high amount of connections can be traced back to the IP addresses connecting to the domain, and abusers can be blocked. Also, note that most Apache connections refer to a specific file within the domain and this is one way you can discover certain PHP scripts that are contributing to the current load: The file path for something such as this would be /home/cfarma2/public_html/forums/ There are multitudes of ways to find the largest contributors to load on a server, but it is often simplest just to start with top c to show the process consuming the most CPU resources at that point in time. Do not allow what could be an easy investigation and solution to evolve into a convoluted project. MySQL Queries Typically when an http request is made it will access a file or script. However, many of these requests require additional information which is stored in a MySQL database which is accessible through the MySQL service. Though it may be obvious, a MySQL query cannot be made if the service is not running. MySQL itself can be a highly memory and CPU intensive service depending on the amount of queries, table size, my.cnf configuration and many other variables that affect the functionality of MySQL. Below is the basic MySQL view that you will most commonly be looking at: The command mysqladmin proc displays all active queries with database information and the status allowing pinpointing abusive users. Server load caused by MySQL use is typically simple to locate by checking mysqladmin proc stat and viewing the MySQL server error log at /var/lib/mysql/server.hostname.com.err. This is not a verbose log of MySQL access but will provide information pertaining to the startup, shutdown and errors of the MySQL server. If there is a crashed table, which can sometimes increase load, it will also be listed here and should be repaired with mysqlcheck r database. 3 H o s t D i m e. c o m

4 cpanel/whm Services The developers of cpanel have worked to ensure that their control panel is stable and efficient as possible, but there may be times that certain cpanel initiated processes overload a server. Thankfully, cpanel also includes tools to help deal with problems when they arise. The current cpanel/whm version information and installers can be found at You can check a server s currently installed cpanel version at /usr/local/cpanel/version such as below: We keep all of our shared servers on the latest STABLE build of cpanel. We find that this offers our clients the best security and stability as this version has been thoroughly tested and verified. There are 3 other cpanel versions available as well which are RELEASE, CURRENT, and EDGE. All new installations of cpanel default to RELEASE which is similar to STABLE however with less testing. The CURRENT version of cpanel would be referred to as the release candidate for cpanel but does not have full functionality as the RELASE or STABLE versions. The final version which is not typically utilized is the EDGE release. This version has little previous testing and is normally subject to modification without official public documentation. One of the most intensive process that cpanel currently utilizes is cpbackup, the cpanel backup program. This will normally be launched via cron at 1AM on most servers but it can also be launched manually at any time by executing /scripts/cpbackup. While cpbackup is running it may be compressing, copying and overwriting files onto a backup drive or sending compressed backups to a remote server via FTP. That makes cpbackup very CPU and disk I/O intensive. cpanel includes a special tool called cpuwatch at /usr/local/cpanel/bin/cpuwatch that is designed to try to limit the amount of load a script or command can place on the server. It does this by monitoring the load on the server and pausing the command or script it is running if the load gets too high. The cpbackup script automatically calls cpuwatch with a load cutoff value of the number of CPUs as listed in /proc/cpuinfo multiplied by the number of extracpus listed in /var/cpanel/cpanel.conf (or Tweak Settings in WHM). So, for example, if /proc/cpuinfo says there are 4 CPUs/cores and the extracpus value is 2, cpbackup will be paused if the load on the server goes over 8.0 (4 cpus x 2). Generally it is best to leave extracpus set to 0 so cpbackup cannot overload the server. The other cpanel-initiated process that can greatly increase the load on the server is cpanellogd, the cpanel domain log processing daemon. It is responsible for turning the raw Apache domain logs into the stats that are used by Awstats, Webalizer and Analog. Most servers will be utilizing the Awstats and Webalizer logging software and all shared servers that are seen running Analog should have it disabled as Analog is deprecated and can be inefficient with CPU resources. Currently Spam Assassin is the spam filter that cpanel is offering which will result in the process of spamd being present on the server. Spam Assassin is constantly running and can be load intensive if it is processing a large amount of mail. This can be constricted by editing the /etc/cpspamd.conf file to limit the permitted children for the process. You will be able to locate if a server is experiencing issues from spamd processes by viewing top -c as it will frequent the top of your monitoring. 4 H o s t D i m e. c o m

5 I mentioned cpsrvd and cpdavd previously. The cpsrvd process is cpanel s custom Apache web server that handles serving both cpanel and WHM on their respective ports. It is not often a source of high load. However, if you think there may be issues, you can try restarting the cpanel service: service cpanel restart. That will shut down and restart cpsrvd and other related services that cpanel directly controls. cpdavd is the cpanel webdisk (WebDAV) software which can at times leave open connections to the server and can be located by command of ps aufx grep cpdavd providing the active connections. If the date on these processes are 24 hours or older then they are simply a hanging connection and should be closed which can be completed by /scripts/restartsrv_cpdavd instead of killing the PIDs individually. Exim & Daemons Considering that all cpanel servers utilize Exim as the MTA (Mail Transfer Agent), you will quickly become familiar with it. There are a large variety of sources that can cause the mail server to experience a high amount of activity such as mailing scripts, exploited scripts or accounts. A server with a large volume of mail in the queue can undergo very high load spikes while Exim attempts to deal with the messages. Exim handles receiving, sending and delivering messages, but it does not handle interfacing with mail clients via the IMAP or POP3 protocols and it does not handle client authentication. cpanel supports two different mail services for handling authentication and IMAP/POP3 communication, Courier and Dovecot. Courier is a slightly older mail service but remains stable at elevated load. Dovecot is a newer mail service and it has faster IMAP performance and supports push IMAP service. Most of our shared servers are utilizing Dovecot. The primary issue with Dovecot is that it is not as stable as Courier under an elevated load. Locating the origin of Exim load is normally quite simple as the load Exim generates is generally proportional to the amount of incoming and outgoing mail requests it is handling. The Exim mail queue contains messages that have not yet been processed or that could not be delivered. The current mail queue size can be checked with the command exim -bpc. A server with a large mail queue such as one of 1000 or higher is still worthy of investigation even if the server at the time is stable as this can indicate underlying issues (like spammers trying to abuse the server). Hardware Though hardware is not the most common issue, it still warrants investigation when the server is either overloading unexpectedly or experiencing unusual instability. When taking hardware into consideration you will be investigating disk I/O wait, hard drive health, RAID status, memory usage and in rare occasions CPU temperatures. All of the above can hinder the CPU s processing abilities thus causing processes to snowball and begin to overload the server. To discern that the servers load origin is in fact hardware related typically will only come after you have ruled out other issues. As previously stated, hardware issues are not common however still need to be taken into consideration when all options have been exhausted or of course that they are blatantly obvious. Such scenarios would be if the I/O wait on the disk drive is consistently above 50% or that a RAID configuration is either being rebuilt or verified, as both of these would constitute a hindrance to the overall server performance. Both of these issues can be diagnosed with basic commands that will be explained in the following section. 5 H o s t D i m e. c o m

6 How to Stabilize an Overloaded Server and Optimize Service Efficiency Throughout the rest of this guide I will provide a straightforward method to completely sweep a server and discern the origin of any issues that may be present. Further information for the commands and one liners utilized will be available in the appendix. The sar Log The first step is to get an overview of the server status which can be done with the sar log that covers average server load, memory consumption and disk activity which can be seen below: When checking sar r the most important variable here is %swpused as this is referring to the amount of swap files utilized where memory has been exhausted. If the load is elevated and swap usage is displayed then you can infer that memory use is high at the first point in the log. The memory allocated to swap will not clear the current usage unless manually cleared or all of the processes relying on that data quit or request that data again when memory use is no longer high. The command free mt will display the currently free/used memory for the server. Typing sar q shows you the load average over a period of 1/5/15 minutes allowing you to view any spikes throughout the day and provide possible correlation with other processes that may be present on the server causing the server load to be elevated. The output of sar -u specifically indicates the overall percentage of disk usage for the server and allows us to quickly discern if I/O is an issue on the server as indicated by %iowait (consistent values of 25 or more may indicate problems). If the value does exceed 25% or higher consistently then you may want to proceed to check mount options which is discussed later in the Hardware section of this guide. If no issues are located then continue with the investigation. 6 H o s t D i m e. c o m

7 Processes You should check if there are any processes running that are experiencing a large volume of connections, simply hanging (refusing to close) or are simply intensive and utilizing a large amount of resources. When viewing ps aufx the process list that is shown will provide all of this information including username, start time and process name as well as any threads spawned. The information will be displayed similar to this: In the example presented the user nobody is present for Apache processes and as users initiate process threads, they are displayed under the origin process. If there are a large amount of connections to a particular user or process then you should proceed to check the port connections as provided under Port Connections within the What Contributes to Server Load section of the guide to locate the IP address opening the connections. Intensive processes that are known to cause strain on the server such as tar, gzip or rsync (all part of the cpbackup process) should be noted when running ps aufx however you can use top to see the highest CPU using processes. The output will be similar to this: As you can see from the array of information provided, top is a powerful tool in checking the allocation of server resources as well as the complete path to the highest CPU intensive process which in this case is showing as the MySQL service. Depending on what you find, you may want to try killing or restarting an intensive process, checking the firewall for port connections or checking for domain connections. cpanel Processes As previously discussed, cpanel can cause an extensive amount of load on the server that can originate from a wide variety of services or tasks, including cpbackup, cpanellogd, or cpdavd. These processes can easily be traced with a grep command on ps aufx to ascertain if they are running and if so then the load they generate can be measured by viewing top over a short period of time. However, please note that cpbackup will be intensive in more ways than simply load and will stress the drives and the CPU so top will not be the ideal tool to measure the effects of cpbackup on the server. When investigating a server in regards to the impact of the cpbackup process, the process is reading, copying then writing to the drives which you can view with the iostat command showing real time I/O on the server. If I/O is already high prior to cpbackup running then it can be assumed that there is a large amount of processes being held. In this instance you should kill the cpbackup service. cpbackup can be killed if 7 H o s t D i m e. c o m

8 required by pkill cpbackup but this will still allow the current children processes to complete (or you will need to kill those separately. The Firewall Checking the firewall is done with the iptables or csf commands however the netstat commands query the network connections such as processes, ports, and TCP/UCDP connections which provides the output in relation to the services you request. This can either be done manually or with a provided one-liner. The one liners provided in the Appendix will provide you a list of the ports with all of the active IP addresses connected to the server for the request services. This allows the connections to be traced back to the active services so you can take action as appropriate. For example, connections to mail services on ports 25/26 (SMTP) incoming or 110/143 (POP3, IMAP, insecure) outgoing would lead you to check the /var/log/exim_mainlog (SMTP) or /var/log/maillog (IMAP/POP3). Also, all incoming connections to the firewall, if they try to make connections on a particular port, will be logged at /var/log/messages. You can use the information in these logs to track down abusers. If you want to block an abusive IP address you can use CSF or iptables. When blocking an abusive IP address it is not suggested to do it permanently as this should only be used for repeated offenders. Currently nearly all of servers are installed with ConfigServer Firewall (CSF) which allows an easy backend management of the firewall. Instead of using csf d IPaddress reason to permanently block an IP address you can safely temporarily block an IP address with csf td IPaddress reason to ensure that the user does not experience issues in the long term. All of these IP addresses and reasons are available at /etc/csf/csf.deny (permanent) and /etc/csf/csf.tempban (temporary) Apache and PHP While checking the firewall you may notice a large number of connections on port 80. These are connections to Apache and can be traced to the exact file or site with /usr/local/apache/bin/httpd fullstatus which will provide you with the IP address where the connection is coming from, but also the file location and/or domain name to investigate. When investigating any file you must ensure that it is not malicious in nature. Please note that if you have any questions in this regard then you should contact a senior technician or a member of the Security team. If the file is benign then you can check the account via /etc/httpd/domlogs/domain.tld for how much traffic they have been receiving or /usr/local/cpanel/bin/dcpumonview to obtain how many resources have been utilized on average by that particular domain. MySQL The MySQL service can be quite resource intensive. The ideal configuration of MySQL is specific to the server that it is being run on as there are many variables that are dependent on the physical configuration of the server (amount of RAM, the type of CPUs, hard drive configuration, etc.) 8 H o s t D i m e. c o m

9 To the left is the output of /etc/my.cnf (the main MySQL configuration file) on one of our shared servers. This particular server has a total 8GB of memory so the key_buffer is configured for 1/8 th of the total memory to ensure efficient functionality for MySQL to utilize and the following values allow for only particular parameters to be met. An optimized MySQL configuration can be the difference between an unstable and stable server, so please ensure that this configuration is correct, however do not make changes to this file and ensure to inform your senior technician on staff. As a general rule, if a particular MySQL user as shown in mysqladmin proc has more than 15 concurrent connections then this is considered abusive and the client should be contacted by the Abuse team. When overloaded, MySQL can become unstable and unresponsive, leading to errors or corrupted data. When checking the /usr/local/cpanel/bin/dcpumonview function you will note there is a MySQL column as well. This number should be below 2 for each cpanel user or process, ideally. The MySQL server has its own log at /var/lib/mysql/server.hostname.com.err which will show you any crashed databases that have been accessed or other critical issues with the service. When a crashed database is being queried it will decrease the overall service performance which can be resolved by checking the error log then proceeding to repair all crashed or damaged databases. Repairing MySQL databases can be done through multiple means however the simplest manner to accomplish this is mysqlcheck the database or myisamchk the corrupt table. To complete a mysqlcheck you must ensure that the MySQL service is online and run mysqlcheck r database_name. This will check and repair all tables within the specified database, however if there are a large amount of tables present this can take an extended period of time. If you are aware of the specific table which requires repair then completing a myisamchk will be much more efficient. This can be completed by cd /var/lib/mysql/database_name then executing myisamchk r table_name.myi. If a database cannot be repaired or if MySQL is down and resists attempts at being restarted, please contact your supervisor or a member of the third level team to have them try more advanced repair techniques. Exim Though you may not expect it, mail services can be the some of the most intensive processes for a server to complete. There are many ways to detect high mail traffic or volume. Running ps aufx will allow you to see the active processes for the mail services but large numbers of active processes do not always mean that there are problems. An example of Exim processes would typically appear as: 9 H o s t D i m e. c o m

10 Checking Exim for issues should start with the volume of the mail queue, which can be checked with exim - bpc providing a total count of the messages waiting to be processed. The volume of the queue should generally be less than about 300, as any higher probably means that the queue is experiencing issues processing what is present or that there has been a large influx of mail recently. If it is found that the queue is higher than 300 then you should proceed to ensure that there are not any spammers or problems with the mail server. Messages provided by exim -bp displays the time spent in the queue, message ID, sending and receiving address. This is shown such as below: 6h 9.3K 1RAhtO-0005mF-Gl <root@server.hostname.com> root@server.hostname.com If a particular domain or user is showing up frequently then there may be an issue with spam and this should be investigated by a senior technician or member of the Abuse & Security team. You can check message information from the Exim queue directly as well such as via exim -Mvh msgid. Continuing the previous example, you would execute exim -Mvh 1RAhtO-0005mF-Gl to see the header of the message. This information is important to determine if there is abuse or not. Though frozen messages are not able to be sent, they should not be removed from the queue immediately but should be investigated as they hold very important information as to their. Not all frozen messages are a problem however. Exim is set to try to attempt to resend any message that fails to be delivered from at least 3 days. Sometimes remote mail servers have temporary issues and this ensures that a real effort is made to deliver a message before Exim gives up and deletes the message. When encountering frozen messages or a large volume of mail sent by a particular script, then the offending script should be examined. Our Exim configuration includes the user/script that is sending the message within the header under the X-PHP-Script entry which can be displayed as I noted in the previous paragraph. This information provides the ability to trace the script and ensure that it is not malicious in nature. When checking for mail connections via ps aufx it should be noted that Dovecot is currently the default for all cpanel servers and Courier is present only on servers if manually configured. Dovecot provides more efficient IMAP performance as it was specifically generated for IMAP support but the main feature is cpanel supports push IMAP with Dovecot, but not Courier. There are only specific situations where servers are currently running Courier and should be left as is unless otherwise modified by a senior technician. If there are any doubts in these regards please contact a senior technician. Hardware At this point you should have exhausted all other options in regards to server processes, services, and software. If there are still ongoing server load issues then you should take a closer look at the server hardware. 10 H o s t D i m e. c o m

11 Most of the time, high load caused by hardware problems is going to be related to either the disk drives or memory as these have a direct effect on the server s ability to process information. The most common will be the disk drives which can be viewed quickly by the sar -u command for I/O wait percentage which can be a symptom of additional issues. If you find that this is running above 25% consistently then you should first examine the drive mount attributes which can be done with the mount command. Left is an example of the output with you would receive. The attribute that you should be looking for here is the noatime attribute which removes the need for the system to make a write to the drive when simply reading information. Though this is technically a software issue as it is part of the file system, not particularly hardware, this will increase performance especially on servers which with a large amount of traffic. This should be enabled for the /, /tmp and /backup partitions to ensure proper I/O balancing. This can be completed with few very simple steps. For example if we found that /tmp did not have noatime enabled then we would open /etc/fstab with our editor of choice, add noatime to its line of attributes and save the file. Please note the syntax of this file is all a single line for each partition and there are no spaces but simply commas as delimiters (i.e. noexec,nodev,nosuid,noatime). Once this is saved then you have to apply the new attribute which can be done with the mount command via mount -o remount /tmp and remember you must remount the partition or it will no longer be present for access and remounting the partition without taking the proper precautions can be problematic. In this case all processes using /tmp must be stopped prior to remounting which can be listed via lsof /tmp though if you have questions or difficulties then you should contact a senior technician prior to proceeding with the remount. The next variable that should be taken into consideration is if the server has a RAID configuration. If the server does in fact have a RAID configuration then you should check the RAID drive status and if there is any active rebuild or verification. This can be done with the 3ware /c0 show command as it will provide the following output: If there is a degraded drive it will be listed as degraded under Status which the system administrators should be notified immediately to alleviate downtime and expedite a resolution. If a drive is degraded and requires a replacement then the RAID will undergo a rebuild to integrate the new drive. Depending on the number of drives, data capacity and current data stored this process can take H o s t D i m e. c o m

12 hours or more. During this time the server load may be quite a bit higher than normal (high I/O wait). RAID verification takes place to check the integrity of the RAID configuration for stability purposes. This has the same effect as the RAID rebuild however will not take place for such an elongated period of time. There are other variables that may affect the servers load or overall stability that can be monitored however these are normally handled by the system administrators as they can only be resolved with hardware access. Some of these tools for drive integrity (i.e., smartctl) or overall system functions (i.e. sensors) can provide insight to assist in expediting a resolution however will not be covered here. This is the conclusion of the guide and as stated in the beginning, it is merely a crash course for you to have the ability to complete your tasks. Only through practical application of the information here will you obtain experience to further your personal knowledge and technical skill level. Best of luck on all of your endeavors! 12 H o s t D i m e. c o m

13 Appendix Port Connections Display all current port connections: a=$(date +%s); touch /root/$a; netstat -plan grep ":21\ :25\ :26\ :80\ :110\ :143\ :443\ :965\ :995\ :993" grep -v " " grep -v ":::" grep -v " " grep -E "[[:digit:]]{1,3}\.[[:digit:]]{1,3}\.[[:digit:]]{1,3}\.[[:digit:]]{1,3}" > /root/$a; printf "FTP (21):\n"; grep :21 /root/$a awk '{print $5}' cut -d: -f1 sort uniq -c sort -n tail -n5; printf "\nsmtp (25):\n"; grep :25 /root/$a awk '{print $5}' cut -d: -f1 sort uniq -c sort -n tail -n5; printf "\nsmtp (26):\n"; grep :26 /root/$a awk '{print $5}' cut -d: -f1 sort uniq -c sort -n tail -n5; printf "\nhttp (80):\n"; grep :80 /root/$a awk '{print $5}' cut -d: -f1 sort uniq -c sort -n tail -n 5; printf "\npop3 (110):\n"; grep :110 /root/$a awk '{print $5}' cut -d: -f1 sort uniq -c sort -n tail -n 5; printf "\nimap (143):\n"; grep :143 /root/$a awk '{print $5}' cut -d: -f1 sort uniq -c sort -n tail -n5; printf "\nhttps (443):\n"; grep :443 /root/$a awk '{print $5}' cut -d: -f1 sort uniq -c sort -n tail -n5; printf "\nsmtps (965):\n"; grep :965 /root/$a awk '{print $5}' cut -d: -f1 sort uniq -c sort -n tail -n5; printf "\npop3s (995):\n"; grep :995 /root/$a awk '{print $5}' cut -d: -f1 sort uniq -c sort -n tail -n5; printf "\nimaps (993):\n"; grep :993 /root/$a awk '{print $5}' cut -d: -f1 sort uniq -c sort -n tail -n5; rm -f /root/$a; Display all current port connections (modified with colors): PORTS=([80]=Apache [110]=POP3 [143]=IMAP [25]=SMTP [26]=SMTP [21]=FTP); netstat -plan > /root/stats.txt; for port in ${!PORTS[*]}; do echo "$(tput bold)${ports[$port]}($port):$(tput sgr0)"; grep $port /root/stats.txt awk {'print $5'} grep -Po "\d{1,3}(?:\.\d{1,3}){3}" sort -n -t. -k 1,1 -k 2,2 -k 3,3 -k 4,4 uniq -c sort -nk 1 grep -v " " tail -5 awk '{ if ( $1 > 35 ) { printf "\033[1;31m" } else if ( $1 > 25 ) { printf "\033[1;33m" } else { printf "\033[1;32m" } ; print " ", $1, "\033[0;39m", $2 }'; done; rm -f /root/stats.txt; Display only connections to port 80 (httpd): netstat -plan grep :80 awk '{print $5}' cut -d: -f1 sort uniq -c sort -n tail -10 Apache Connections Display all of the domains that have active connections and the count: lynx -dump -width=200 localhost/whm-server-status grep 'POST\ GET' awk '{print $12}' sort uniq -c sort n Display a formatted httpd fullstatus to view file paths as well: MySQL lynx localhost/whm-server-status --dump --width=160 Display all MySQL queries sorted by MySQL database connection: mysqladmin proc stat grep localhost awk '{ print $8 }' sort uniq -c sort -n tail -5 Display all MySQL queries sorted by MySQL user connections: mysqladmin proc stat grep localhost awk '{ print $4 }' cut -d_ -f1 sort uniq -c sort -n tail H o s t D i m e. c o m

14 Exim Sort all mail addresses in the queue by volume: exim -bp awk {'print $4'} cut -d "<" -f2 cut -d ">" -f1 sed '/^$/d' sort uniq -c sort n Remove all frozen messages from the queue: exim -bp grep frozen awk '{print $3}' xargs exim Mrm Remove all mail for the provided user from the Exim queue: exiqrep if @address.com xargs exim Mrm Hardware Display the overall RAID information on the server: 3ware /c0 show Current IO wait on the server with a 3 second delay: iostat -xn 3 Display the current smartctl status for the RAID: smartctl -a -d 3ware,0 /dev/twa0 14 H o s t D i m e. c o m

Mail Service Turned On

Mail Service Turned On VPS Mail Server Troubleshooting VPS Virtuozzo server customers run a private mail server as part of their default server setup. Since you are in control of the server configuration, this means that mail

More information

How to Install SMTPSwith Mailer on Centos Server/VPS

How to Install SMTPSwith Mailer on Centos Server/VPS How to Install SMTPSwith Mailer on Centos Server/VPS SMTPSwitch Mailer User Guide V4.0 SMTPSwitch Mailer is a web based email marketing software that runs on a web server or online server. An online server

More information

Linux VPS with cpanel. Getting Started Guide

Linux VPS with cpanel. Getting Started Guide Linux VPS with cpanel Getting Started Guide First Edition October 2010 Table of Contents Introduction...1 cpanel Documentation...1 Accessing your Server...2 cpanel Users...2 WHM Interface...3 cpanel Interface...3

More information

Manual Prepared by GalaxyVisions Customer Care Team

Manual Prepared by GalaxyVisions Customer Care Team Toll Free: 1.866-GVHOST1 (484-6781) 882 3rd Ave, 8th Floor, Brooklyn, Ny 11232 Manual Prepared by GalaxyVisions Customer Care Team Topics Covered The problem How to prevent spammers from using my server

More information

What is included in the ATRC server support

What is included in the ATRC server support Linux Server Support Services What is included in the ATRC server support Installation Installation of any ATRC Supported distribution Compatibility with client hardware. Hardware Configuration Recommendations

More information

Parallels Plesk Panel

Parallels Plesk Panel Parallels Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GMbH Vordergasse 49 CH8200 Schaffhausen Switzerland Phone: +41 526320 411 Fax: +41 52672 2010 Copyright 1999-2011

More information

WHM Administrator s Guide

WHM Administrator s Guide Fasthosts Customer Support WHM Administrator s Guide This manual covers everything you need to know in order to get started with WHM and perform day to day administrative tasks. Contents Introduction...

More information

Fifty Critical Alerts for Monitoring Windows Servers Best practices

Fifty Critical Alerts for Monitoring Windows Servers Best practices Fifty Critical Alerts for Monitoring Windows Servers Best practices The importance of consolidation, correlation, and detection Enterprise Security Series White Paper 6990 Columbia Gateway Drive, Suite

More information

Dedicated Servers InfoGuide

Dedicated Servers InfoGuide Dedicated Servers InfoGuide Who is this Product for? ü Resellers who serve clients who need Dedicated Servers to host their Applications ü Those who want to Resell Hosting to thousands of customers using

More information

Web Hosting: Pipeline Program Technical Self Study Guide

Web Hosting: Pipeline Program Technical Self Study Guide Pipeline Program Technical Self Study Guide Thank you for your interest in InMotion Hosting and our Technical Support positions. Our technical support associates operate in a call center environment, assisting

More information

Parallels Plesk Panel

Parallels Plesk Panel Parallels Plesk Panel Copyright Notice ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2009, Parallels, Inc.

More information

Do it Yourself System Administration

Do it Yourself System Administration Do it Yourself System Administration Due to a heavy call volume, we are unable to answer your call at this time. Please remain on the line as calls will be answered in the order they were received. We

More information

WebHost Manager 7 User Guide DOCUMENTATION VERSION: 1.2

WebHost Manager 7 User Guide DOCUMENTATION VERSION: 1.2 WebHost Manager 7 User Guide DOCUMENTATION VERSION: 1.2 Table of contents 1 What is WebHost Manager? 10 2 How do I use WebHost Manager? 11 2.1 Installation..............................................

More information

Partek Flow Installation Guide

Partek Flow Installation Guide Partek Flow Installation Guide Partek Flow is a web based application for genomic data analysis and visualization, which can be installed on a desktop computer, compute cluster or cloud. Users can access

More information

ENTERPRISE INFRASTRUCTURE CONFIGURATION GUIDE

ENTERPRISE INFRASTRUCTURE CONFIGURATION GUIDE ENTERPRISE INFRASTRUCTURE CONFIGURATION GUIDE MailEnable Pty. Ltd. 59 Murrumbeena Road, Murrumbeena. VIC 3163. Australia t: +61 3 9569 0772 f: +61 3 9568 4270 www.mailenable.com Document last modified:

More information

Monitoring Microsoft Exchange to Improve Performance and Availability

Monitoring Microsoft Exchange to Improve Performance and Availability Focus on Value Monitoring Microsoft Exchange to Improve Performance and Availability With increasing growth in email traffic, the number and size of attachments, spam, and other factors, organizations

More information

Detailed Revision History: Advanced Internet System Management (v5.07)

Detailed Revision History: Advanced Internet System Management (v5.07) Detailed Revision History 1 Detailed Revision History: Advanced Internet System Management (v5.07) This detailed revision history document identifies the differences in Advanced Internet System Management

More information

WHY USE ILLUMIN8 MARKETING FOR HOSTING YOUR WEB SITE?

WHY USE ILLUMIN8 MARKETING FOR HOSTING YOUR WEB SITE? QUESTIONS OR COMMENTS? email info@illumin8marketing.com or call 608-796-1990 WHY USE ILLUMIN8 MARKETING FOR HOSTING YOUR WEB SITE? Yes, there are cheaper (even free) alternatives out there. What we will

More information

Configuring, Customizing, and Troubleshooting Outlook Express

Configuring, Customizing, and Troubleshooting Outlook Express 3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane

More information

A candidate following a programme of learning leading to this unit will be able to:

A candidate following a programme of learning leading to this unit will be able to: Unit 24: Linux+ Learning Outcomes A candidate following a programme of learning leading to this unit will be able to: Demonstrate knowledge of planning the implementation Show knowledge of how to install

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

Parallels Plesk Automation

Parallels Plesk Automation Parallels Plesk Automation Contents Get Started 3 Infrastructure Configuration... 4 Network Configuration... 6 Installing Parallels Plesk Automation 7 Deploying Infrastructure 9 Installing License Keys

More information

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and

More information

Advanced 100 GB storage space. Unlimited monthly bandwidth. Pro 150 GB storage space. Unlimited monthly bandwidth. Horde Squirrelmail Round Cube Mail

Advanced 100 GB storage space. Unlimited monthly bandwidth. Pro 150 GB storage space. Unlimited monthly bandwidth. Horde Squirrelmail Round Cube Mail Name Storage capacity and bandwidth allowance Email features Digital Pacific (Business ) Basic 25 GB storage space. 100 GB monthly Standard 50 GB storage space. Advanced 100 GB storage space. Pro 150 GB

More information

SERVICE SCHEDULE PULSANT ENTERPRISE CLOUD SERVICES

SERVICE SCHEDULE PULSANT ENTERPRISE CLOUD SERVICES SERVICE SCHEDULE PULSANT ENTERPRISE CLOUD SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied

More information

System Administration Guide

System Administration Guide www.novell.com/documentation System Administration Guide Data Synchronizer 1.2 August 22, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this

More information

Domain Name. Domain Registrar. Web Site cpanel. www..com. www..net. www..biz URL: Username: Password: www.mydomain.com/cpanel. Username: Password:

Domain Name. Domain Registrar. Web Site cpanel. www..com. www..net. www..biz URL: Username: Password: www.mydomain.com/cpanel. Username: Password: 314 Main Street Onalaska, WI 54650 608-787-8887 Why Use The Idea Center for Hosting Your Web Site? Yes, there are cheaper (even free) alternatives out there. What we will offer you is a reliable service,

More information

ServerPronto Cloud User Guide

ServerPronto Cloud User Guide ServerPronto Cloud User Guide Virtual machines Virtual machines are based on templates and are deployed on hypervisors. Hypervisors give them access to CPU, disk and network resources. The ServerPronto

More information

SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010

SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010 SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010 This Service Level Agreement (SLA) ( Service Level Agreement or Agreement or SLA ) is by and between Bizcom Web Services, Inc. (the "Company")

More information

System i and System p. Customer service, support, and troubleshooting

System i and System p. Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting Note Before using this information and the product it supports,

More information

How To Install An Aneka Cloud On A Windows 7 Computer (For Free)

How To Install An Aneka Cloud On A Windows 7 Computer (For Free) MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the

More information

AXIGEN Mail Server. Quick Installation and Configuration Guide. Product version: 6.1 Document version: 1.0

AXIGEN Mail Server. Quick Installation and Configuration Guide. Product version: 6.1 Document version: 1.0 AXIGEN Mail Server Quick Installation and Configuration Guide Product version: 6.1 Document version: 1.0 Last Updated on: May 28, 2008 Chapter 1: Introduction... 3 Welcome... 3 Purpose of this document...

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

Customer Control Panel Manual

Customer Control Panel Manual Customer Control Panel Manual Contents Introduction... 2 Before you begin... 2 Logging in to the Control Panel... 2 Resetting your Control Panel password.... 3 Managing FTP... 4 FTP details for your website...

More information

Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions.

Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions. Vmware ESX 4/5/6 - Provision virtual machines through vsphere, assign available resources and install operating systems. - Configure the various built in alarms for monitoring, configure alarm thresholds

More information

The current version installed on your server is 2.6.32-431.5.1.el6.x86_64 and it's the latest available.

The current version installed on your server is 2.6.32-431.5.1.el6.x86_64 and it's the latest available. IP : nnn.nnn.nnn.n 173.255.141.4 Hostname : example.domain.com webserver.theewfinc.org OS : CentOS release 6.6 (Final) The following is a report on the security and performance of your server. It includes

More information

Troubleshooting Citrix MetaFrame Procedures

Troubleshooting Citrix MetaFrame Procedures Troubleshooting Citrix MetaFrame Procedures Document name Troubleshooting a Citrix MetaFrame environment v1.0.doc Author Marcel van As Last Revision Date 28 February 2006 Edited and released by: www.dabcc.com

More information

AXIOM 4 AXIOM SERVER GUIDE

AXIOM 4 AXIOM SERVER GUIDE AXIOM 4 AXIOM SERVER GUIDE iconcur Software Corporation 1266 West Paces Ferry Road Atlanta, GA 30327-2306 Axiom is a trademark of iconcur Software Corporation. All other product and company names are trademarks

More information

Our great. little. Hosting. Packages FEBRUARY 2015. www.littleblackbox.uk.com

Our great. little. Hosting. Packages FEBRUARY 2015. www.littleblackbox.uk.com Our great little Hosting Packages FEBRUARY 2015 www.littleblackbox.uk.com Website & Email Hosting 8 Bronze Ideal for small or personal websites with only a few visitors per month. THIS LITTLE PACKAGE INCLUDES:

More information

SERVICE SCHEDULE PUBLIC CLOUD SERVICES

SERVICE SCHEDULE PUBLIC CLOUD SERVICES SERVICE SCHEDULE PUBLIC CLOUD SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a Contract

More information

42goISP Documentation

42goISP Documentation 42goISP Documentation 42goISP Documentation I Table of Contents General...1 1 What is 42goISP?...1 2 Terms and structure of the manual...1 3 Installation/Upgrade/Deinstallation...1 3.1 Installation...1

More information

ISP Best Practices. Addressing a DDoS Attack on a Host. Hervey Allen Network Startup Resource Center

ISP Best Practices. Addressing a DDoS Attack on a Host. Hervey Allen Network Startup Resource Center ISP Best Practices Addressing a DDoS Attack on a Host Hervey Allen Network Startup Resource Center June 28, 2010 PacNOG 7 Conference Pago Pago, American Samoa Distributed Denial of Service Attack Summary

More information

Monitoring System Status

Monitoring System Status CHAPTER 14 This chapter describes how to monitor the health and activities of the system. It covers these topics: About Logged Information, page 14-121 Event Logging, page 14-122 Monitoring Performance,

More information

McAfee Web Gateway 7.4.1

McAfee Web Gateway 7.4.1 Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this

More information

Introduction to Operating Systems

Introduction to Operating Systems Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

Moving Drupal to the Cloud: A step-by-step guide and reference document for hosting a Drupal web site on Amazon Web Services

Moving Drupal to the Cloud: A step-by-step guide and reference document for hosting a Drupal web site on Amazon Web Services Moving Drupal to the Cloud: A step-by-step guide and reference document for hosting a Drupal web site on Amazon Web Services MCN 2009: Cloud Computing Primer Workshop Charles Moad

More information

JAMF Software Server Installation Guide for Linux. Version 8.6

JAMF Software Server Installation Guide for Linux. Version 8.6 JAMF Software Server Installation Guide for Linux Version 8.6 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate.

More information

Increased operational efficiency by providing customers the ability to: Use staff resources more efficiently by reducing troubleshooting time.

Increased operational efficiency by providing customers the ability to: Use staff resources more efficiently by reducing troubleshooting time. , page 1 This chapter provides an overview of the Cisco Cisco Unified Communications Manager service and describes how to configure the Cisco Cisco Unified Communications Manager feature. The feature allows

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

Plesk 8.3 for Linux/Unix System Monitoring Module Administrator's Guide

Plesk 8.3 for Linux/Unix System Monitoring Module Administrator's Guide Plesk 8.3 for Linux/Unix System Monitoring Module Administrator's Guide Revision 1.0 Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 600 Herndon VA 20171 USA Phone: +1 (703) 815 5670

More information

Bitrix Site Manager. VMBitrix Virtual Machine. Quick Start And Usage Guide

Bitrix Site Manager. VMBitrix Virtual Machine. Quick Start And Usage Guide Bitrix Site Manager VMBitrix Virtual Machine. Quick Start And Usage Guide Contents Introduction... 3 Chapter 1. Starting The VMBitrix Virtual Machine... 4 Minimum Requirements For VMWare Player / VMBitrix...

More information

4PSA Total Backup 3.0.0. User's Guide. for Plesk 10.0.0 and newer versions

4PSA Total Backup 3.0.0. User's Guide. for Plesk 10.0.0 and newer versions 4PSA Total Backup 3.0.0 for Plesk 10.0.0 and newer versions User's Guide For more information about 4PSA Total Backup, check: http://www.4psa.com Copyright 2009-2011 4PSA. User's Guide Manual Version 84359.5

More information

ISPConfig Documentation

ISPConfig Documentation ISPConfig Documentation ISPConfig Documentation I Table of Contents General...1 1 What is ISPConfig?...1 2 Terms and structure of the manual...1 3 Installation/Upgrade/Deinstallation...1 3.1 Installation...1

More information

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0 EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0 Copyright 2011 ECDL Foundation All rights reserved. No part of this publication may be reproduced in any form except as permitted

More information

Troubleshooting: 2 Solutions to Common Problems

Troubleshooting: 2 Solutions to Common Problems www.novell.com/documentation Troubleshooting: 2 Solutions to Common Problems GroupWise 8 August 31, 2009 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or

More information

Application Performance Testing Basics

Application Performance Testing Basics Application Performance Testing Basics ABSTRACT Todays the web is playing a critical role in all the business domains such as entertainment, finance, healthcare etc. It is much important to ensure hassle-free

More information

EZblue BusinessServer The All - In - One Server For Your Home And Business

EZblue BusinessServer The All - In - One Server For Your Home And Business EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.11 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan

More information

Configuring MailArchiva with Insight Server

Configuring MailArchiva with Insight Server Copyright 2009 Bynari Inc., All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any

More information

WhatsUp Gold v11 Features Overview

WhatsUp Gold v11 Features Overview WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity

More information

Backup & Disaster Recovery Appliance User Guide

Backup & Disaster Recovery Appliance User Guide Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the

More information

HP LeftHand SAN Solutions

HP LeftHand SAN Solutions HP LeftHand SAN Solutions Support Document Installation Manuals Installation and Setup Guide Health Check Legal Notices Warranty The only warranties for HP products and services are set forth in the express

More information

7.x Upgrade Instructions. 2015 Software Pursuits, Inc.

7.x Upgrade Instructions. 2015 Software Pursuits, Inc. 7.x Upgrade Instructions 2015 Table of Contents INTRODUCTION...2 SYSTEM REQUIREMENTS FOR SURESYNC 7...2 CONSIDERATIONS BEFORE UPGRADING...3 TERMINOLOGY CHANGES... 4 Relation Renamed to Job... 4 SPIAgent

More information

Workflow Templates Library

Workflow Templates Library Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security

More information

JAMF Software Server Installation Guide for Windows. Version 8.6

JAMF Software Server Installation Guide for Windows. Version 8.6 JAMF Software Server Installation Guide for Windows Version 8.6 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate.

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

Ensim WEBppliance 3.0 for Windows (ServerXchange) Release Notes

Ensim WEBppliance 3.0 for Windows (ServerXchange) Release Notes Ensim WEBppliance 3.0 for Windows (ServerXchange) Release Notes May 07, 2002 Thank you for choosing Ensim WEBppliance 3.0 for Windows. This document includes information about the following: About Ensim

More information

Manual POLICY PATROL SECURE FILE TRANSFER

Manual POLICY PATROL SECURE FILE TRANSFER Manual POLICY PATROL SECURE FILE TRANSFER MANUAL Policy Patrol Secure File Transfer This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software

More information

COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H.

COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H. COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H. IMPLEMENTING A WEB SERVER Apache Architecture Installing PHP Apache Configuration Files httpd.conf Server Settings httpd.conf Main

More information

LISTSERV in a High-Availability Environment DRAFT Revised 2010-01-11

LISTSERV in a High-Availability Environment DRAFT Revised 2010-01-11 LISTSERV in a High-Availability Environment DRAFT Revised 2010-01-11 Introduction For many L-Soft customers, LISTSERV is a critical network application. Such customers often have policies dictating uptime

More information

How To Back Up Your Pplsk Data On A Pc Or Mac Or Mac With A Backup Utility (For A Premium) On A Computer Or Mac (For Free) On Your Pc Or Ipad Or Mac On A Mac Or Pc Or

How To Back Up Your Pplsk Data On A Pc Or Mac Or Mac With A Backup Utility (For A Premium) On A Computer Or Mac (For Free) On Your Pc Or Ipad Or Mac On A Mac Or Pc Or Parallels Plesk Control Panel Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2008, Parallels,

More information

Version 1.7. Inbound Email Integration (POP3 and IMAP) Installation, Configuration and User Guide. Last updated October 2011

Version 1.7. Inbound Email Integration (POP3 and IMAP) Installation, Configuration and User Guide. Last updated October 2011 Version 1.7 Inbound Email Integration (POP3 and IMAP) Installation, Configuration and User Guide Last updated October 2011 1 Introduction and Overview... 1 2 The Case for Email monitoring... 2 3 Installation

More information

Table of Contents. FleetSoft Installation Guide

Table of Contents. FleetSoft Installation Guide FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating

More information

Database Maintenance Guide

Database Maintenance Guide Database Maintenance Guide Medtech Evolution - Document Version 5 Last Modified on: February 26th 2015 (February 2015) This documentation contains important information for all Medtech Evolution users

More information

RHCSA 7RHCE Red Haf Linux Certification Practice

RHCSA 7RHCE Red Haf Linux Certification Practice RHCSA 7RHCE Red Haf Linux Certification Practice Exams with Virtual Machines (Exams EX200 & EX300) "IcGraw-Hill is an independent entity from Red Hat, Inc., and is not affiliated with Red Hat, Inc. in

More information

WebHost Manager User Manual. cpanel

WebHost Manager User Manual. cpanel WebHost Manager User Manual Table Of Contents Installation...1 Installation...1 Logging on for the first time...4...4...4 Troubleshooting...6 Logging On...7...7...7 Troubleshooting...7 Change Log...8...8...8

More information

Magento Optimised Template CentOS 6 with cpanel/whm V1.0

Magento Optimised Template CentOS 6 with cpanel/whm V1.0 Magento Optimised Template CentOS 6 with cpanel/whm V1.0 Magento Optimised Template CentOS 6 with cpanel/whm Crucial Cloud Hosting 1 Contents Introduction... 2 Objectives... 3 Web Server Optimisation...

More information

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised

More information

Uptime Infrastructure Monitor. Installation Guide

Uptime Infrastructure Monitor. Installation Guide Uptime Infrastructure Monitor Installation Guide This guide will walk through each step of installation for Uptime Infrastructure Monitor software on a Windows server. Uptime Infrastructure Monitor is

More information

Lesson Plans Configuring Exchange Server 2007

Lesson Plans Configuring Exchange Server 2007 Lesson Plans Configuring Exchange Server 2007 (Exam 70-236) Version 2.1 Table of Contents Course Overview... 2 Section 1.1: Server-based Messaging... 4 Section 1.2: Exchange Versions... 5 Section 1.3:

More information

IMail Anti-Virus. Setup Guide. Software Version V1.0. Ipswitch, Inc.

IMail Anti-Virus. Setup Guide. Software Version V1.0. Ipswitch, Inc. Setup Guide Software Version V1.0 Ipswitch, Inc. Ipswitch, Inc. 81 Hartwell Ave Lexington, MA 02421 Phone: 781-676-5700 Web: http://www.ipswitch.com Copyrights The information in this document is subject

More information

Linux System Administration on Red Hat

Linux System Administration on Red Hat Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,

More information

Web Server (Step 1) Processes request and sends query to SQL server via ADO/OLEDB. Web Server (Step 2) Creates HTML page dynamically from record set

Web Server (Step 1) Processes request and sends query to SQL server via ADO/OLEDB. Web Server (Step 2) Creates HTML page dynamically from record set Dawn CF Performance Considerations Dawn CF key processes Request (http) Web Server (Step 1) Processes request and sends query to SQL server via ADO/OLEDB. Query (SQL) SQL Server Queries Database & returns

More information

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX Course Description: This is an introductory course designed for users of UNIX. It is taught

More information

Installation Guide for WebSphere Application Server (WAS) and its Fix Packs on AIX V5.3L

Installation Guide for WebSphere Application Server (WAS) and its Fix Packs on AIX V5.3L Installation Guide for WebSphere Application Server (WAS) and its Fix Packs on AIX V5.3L Introduction: This guide is written to help any person with little knowledge in AIX V5.3L to prepare the P Server

More information

LICENSE4J FLOATING LICENSE SERVER USER GUIDE

LICENSE4J FLOATING LICENSE SERVER USER GUIDE LICENSE4J FLOATING LICENSE SERVER USER GUIDE VERSION 4.5.5 LICENSE4J www.license4j.com Table of Contents Getting Started... 2 Floating License Usage... 2 Installation... 4 Windows Installation... 4 Linux

More information

Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting

Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting Course ID RHL200 Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting Course Description Students will experience added understanding of configuration issues of disks,

More information

WINDOWS SERVER MONITORING

WINDOWS SERVER MONITORING WINDOWS SERVER Server uptime, all of the time CNS Windows Server Monitoring provides organizations with the ability to monitor the health and availability of their Windows server infrastructure. Through

More information

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org ( GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Parallels Plesk Panel 11 for your Linux server

Parallels Plesk Panel 11 for your Linux server Getting Started Guide Parallels Plesk Panel 11 for your Linux server Getting Started Guide Page 1 Getting Started Guide: Parallels Plesk Panel 11, Linux Server Version 1.1 (11.1.2012) Copyright 2012. All

More information

SSL Tunnels. Introduction

SSL Tunnels. Introduction SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,

More information

Contents CHAPTER 1 IMail Utilities

Contents CHAPTER 1 IMail Utilities Contents CHAPTER 1 IMail Utilities CHAPTER 2 Collaboration Duplicate Entry Remover... 2 CHAPTER 3 Disk Space Usage Reporter... 3 CHAPTER 4 Forward Finder... 4 CHAPTER 5 IMAP Copy Utility... 5 About IMAP

More information

Software Environment. Options. Service guarantee:. 24/7 Hardware Support. 99% uptime

Software Environment. Options. Service guarantee:. 24/7 Hardware Support. 99% uptime Hosting : VPS 35 Service Specifications 35GB of Disk Space 2GB of RAM 100GB of Bandwidth 1 IP Address Included Hardware Specifications CPU: Xeon Lynnfield Quad-Core X3430 2.4GHz Hard drives: 2 x SAS SATA

More information

Monitoring Microsoft Exchange Server in the Context of the Entire Network

Monitoring Microsoft Exchange Server in the Context of the Entire Network Monitoring Microsoft Exchange Server in the Context of the Entire Network Abstract: Virtually every business process and function relies in some way on messaging applications. Microsoft Exchange is one

More information

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Course Description and Outline. IT Essential II: Network Operating Systems V2.0 Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs

More information

Domain 5.0: Network Tools

Domain 5.0: Network Tools ExamForce.com CompTIA Network+ N10-004 Study Guide 1 Domain 5.0: Network Tools Chapter 5 5.1 Given a scenario, select the appropriate command line interface tool and interpret the output to verify functionality

More information

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) ( SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

IBM WebSphere Application Server Version 7.0

IBM WebSphere Application Server Version 7.0 IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the

More information

Streamlining Patch Testing and Deployment

Streamlining Patch Testing and Deployment Streamlining Patch Testing and Deployment Using VMware GSX Server with LANDesk Management Suite to improve patch deployment speed and reliability Executive Summary As corporate IT departments work to keep

More information

1. Product Information

1. Product Information ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such

More information