Science topic

Server Administration - Science topic

Explore the latest questions and answers in Server Administration, and find Server Administration experts.
Questions related to Server Administration
  • asked a question related to Server Administration
Question
1 answer
I have been trying to download some Landsat 8 images for the past year. however whenever I add the mad to my cart and start the download, I always get this error
The server encountered an internal error or misconfiguration and could not complete your request.
Please contact the server administrator at edcweb@usgs.gov to inform them of the time this error occurred, and the actions you performed just before this error.
More information about this error may be available in the server error log.
may I kindly have a work around for this?
Relevant answer
Answer
There could be various reasons why you are unable to download Landsat 8 images from the USGS website. Here are some common issues:
1. Server down: The USGS website may be undergoing maintenance or experiencing technical issues. Try again later.
2. Insufficient Disk Space: Make sure that you have enough storage space on your device to download the images.
3. Slow Internet: Slow internet can prevent you from downloading larger files like Landsat 8 images. You may need to upgrade your internet connection or try downloading the images at a different time of day when there is less traffic.
4. Connection Timeout: If you are downloading multiple images at the same time, this can cause connection timeouts. Try downloading one image at a time.
If none of these suggestions work, it may be helpful to contact USGS customer support for further assistance.
  • asked a question related to Server Administration
Question
22 answers
I try to run an overnight simulation but the job kept getting aborted due to error "session has been idle longer than 3600 seconds, disconnecting from Abaqus License Manager". How do i increase the idle time out so i can run an overnight job simulation without the job getting aborted?
Relevant answer
Answer
Hello Sheikh,
Just generate the .inp ready to launch of your model from abaqus cae instead of launching the job
then go to the work folder where it was created, right click on the folder while maintaining shift, and click "open a command line here"
Then the cmd from windows should appear, just write this:
abaqus job=XX cpus=YY int ask_delete=OFF
and enter
replace XX by the name of your inp (without the ".inp" extension)
replace YY by the numbers of CPUs you want to use for this calculation
This should do the work, no need to launch CAE for your job now, and no problem of idle time.
  • asked a question related to Server Administration
Question
5 answers
How can I show that a Server can receive a ticket containing attributes of a user needed to release some services to the user, decrypts the ticket, then maliciously shares the attributes but the other servers receiving these attributes would not be able to use the received attributes again (i.e the attributes are useless.or invalid)?
Relevant answer
Answer
Okay,  thanks Sir.
  • asked a question related to Server Administration
Question
4 answers
Some time ago I used the Wolfram Lightweight Grid Manager to set up Mathematica for parallel computing in my local network. All the computers had installed Mathematica which have been configured to use the license server. This environment worked properly.
I have question if it is possible to configure Mathematica (which  possesses the site licence) to work similar to the previously described (but without the Wolfram Lightweight Grid Manager and the license sever). I think about the following situation. One computer is the master and the other (which working together in LAN) share their computing kernels.
Relevant answer
Answer
Dear Ariadne,
thank you for the link to the book. It is very interesting but in the frame of building computer cluster it prefers standard solution with LGM.
Best wishes
Radoslaw Jedynak
  • asked a question related to Server Administration
Question
7 answers
State of the art of Security Solution for Data Transmission and Storage Management in Cloud Computing
Relevant answer
Answer
Maira Abur - Adding to the above papers, you can refer my research work on Intrusion Detection System for Cloud. 
These papers are published in 2015. You can find the latest and current situation of research on IDS via my papers.
Thank you.
  • asked a question related to Server Administration
Question
1 answer
Recently, I am using the Forcite module implemented in Materials Studio, but every time I run with the remote server, it fails immediately.
The remote server is CentOS7.0 with Intel E5 v3 2697. I have installed MS in the server, and I run from the Windows in my workstation.
But if I run that by using the worksstation, it goes well and succeeds.
Once run in parallel in remote linux server, the job fails.
I have checked the file 'std.err', it said this:
      "sh: error while loading shared libraries: libdl.so.2: cannot open shared          object file: No such file or directory"
So I locate the libdl.so.2 in CentOS7, it exist in /usr/lib:
     /usr/lib/libdl.so.2
     /usr/lib64/libdl.so.2
and
             lrwxrwxrwx. 1 root root 13 May 8 2015 libdl.so.2 -> libdl-2.17.so
I have googled this error, still don‘t know how to fix this bug.
I hope someone can give me a hand here.
Relevant answer
Answer
I have solved this problem.
  • asked a question related to Server Administration
Question
2 answers
We are using Jenkins as our CI system. Currently there is only one master server , with slaves provisioned from open-stack using puppet and foreman for configuration management. If for some reason our Jenkins master goes down , or gets deleted , or something like that , we need to provision a new machine and pull Jenkins master configuration from puppet ( plus copying Jenkins home directory from backup ) , the whole process needs more than one hour.  Is there any high availability setup for Jenkins master , active/active or active/passive? so that if one master goes down , the second one will automatically takeover without disturbing any build jobs.?
Relevant answer
Answer
Did you see the gearman plugin? that permits to have more than one master. It is a kind of HA.
  • asked a question related to Server Administration
Question
1 answer
Dear All,
I have several Servers and I have downloaded all files from all servers.
sometimes, one of servers doesn't work properly and the ETL is unable to download files from the faulty server. So, ETL stops and it must be run manually again.
I would like to add intelligence to it so that it skips the faulty server without crashing. Do you have any idea How can I set my ETL to check the server's status. If I know the server status, I can skip it if faulty. For example, if server 3 has a problem, my ETL will be able to jump from 2 to 4 for download files instead of crashing at server 3.
Can anybody help me that how to catch errors and exceptions and show meaningful messages.Thanks
Relevant answer
Answer
you can query the servers cyclically. the simplest way is put each server network information (ipaddress, subnet,...)in a file. So, define a tFileList that cyclically iterate over parameters files, open a tcontextLoad to load parameters into context every round and realize a onSubJobError to put in evidence a fault server, ensuring that your components (normally there's a check box) doesn't stop if there's a fault.
  • asked a question related to Server Administration
Question
1 answer
In MVC application, to prevent cross-site request forgery attack AntiForgeryToken is used. On each page refresh, new token is generated. But interesting thing is, if we duplicate the same web page in multiple tab in same browser(i.e each page will have same token value inside the form) and submit the form from all opened tab one by one, all the HTTP POST will be successful. This mean, the server is still validating the HTTP POST request even after the token value is already consumed.
Relevant answer
Answer
Your application can be vulnerable to cross-site request forgery (CSRF) attacks not because you the developer did something wrong (as in, failing to encode outputs leads to Cross-site scripting), but simply because of how the whole Web is designed to work.
Assuming you’re using Windows authentication or some kind of cookie-based authentication system such as Forms Authentication, the automated form post will be processed within the victim’s established authentication context, and will successfully update the victim’s email address to something under the attacker’s control. All the attacker has to do now is use your “forgotten password” facility, and they’re taken control of the victim’s account.
Of course, instead of changing an victim’s email address, they can perform any action that the victim can perform with a single POST request. For example, they might be able to grant administrative permissions to another account, or post something defamatory to a CMS.
The core ASP.NET MVC package includes a set of helpers that give you a means to detect and block CSRF using the “user-specific tokens” technique.
To use these helpers to protect a particular form, put an Html. Anti Forgery Token into the form. At the same time, Html. Anti Forgery Token will give the visitor a cookie  with the same value as the random hidden value shown above. To validate an incoming form post, add the Validate Anti Forgery Token filter to the target action method.
  • asked a question related to Server Administration
Question
3 answers
How can I perform server consolidation using bin packing?
Relevant answer
Answer
Well, Bin Packing for Server Consolidation is a well researched topic with many interesting proposals for different scenarios. So your question is a tad too generic. You will need to described your specific server environment/scenario and problem formulation. Also, what are you trying to optimize? Utilization, Cost, Energy or Performance? The complexity of your solution depends on the your objectives and scale of the environment.
I will leave here some references:
  • asked a question related to Server Administration
Question
4 answers
The last packet sent successfully to the server was 0 milliseconds ago. The driver has not received any packets from the server. null null
I read many blogs and tried everything like
checking server name port number
changing my.ini file
changing timeouts
but nothing is working .
Relevant answer
Answer
First check if Windows 8 firewall is blocking the connection. If not try to connect to the database from command line. On linux it is:
mysql -u root -p
and then share the results.
  • asked a question related to Server Administration
Question
4 answers
I need to get access to TFS build properties so that I can use it in my automated deploy build project.
Relevant answer
Answer
  • asked a question related to Server Administration
Question
5 answers
Hello guys
I want to create my own SIP Server which will interact with "Open IMS Bench"  as a traffic generator in order to test a registration protocol.
Can you suggest me what is the best tool to create a such a SIP Server? If any ne suggest an other better generator ; it is really very welcome
N.B: My SIP Server should interact with a database (My SQL)
Many thanks!
Relevant answer
Answer
OpenSIP is the best choice, installation guide on Linux is here http://www.opensips.org/Documentation/Install.
Asterisk is the media server so I am not sure it will help in your scenario. OpenSIP is already configured with the Mysql module so you can communicate easily with it.
  • asked a question related to Server Administration
Question
7 answers
Suppose we have a set of API hosted on a local server. I only want legal remote programs to invoke those APIs. If the remote program is, let's say the original program that I uploaded to the remote machine, then I allow the invoke. If the remote program is a version tampered by the attacker, then I disallow it. How can I bind the program's identity to the function invocation to determine whether the remote program is not tampered?
Relevant answer
Answer
Remote attestation based on trusted computing supports detecting changes of the remote software.
  • asked a question related to Server Administration
Question
4 answers
Is this possible with Libvirt or there exists some other means?
NOTE: This can be done within the Guests themselves but the interest here is to get the stat externally at the host. I have seen an approach for KVM but haven't seen anything for XEN servers.
Relevant answer
Answer
Hello Olumuyiwa Emmanuel Ibidunmoye ,
I am not sure whether this would be helpful or not.
How about this command ?
xm vcpu-list
-Srikrishnan
  • asked a question related to Server Administration
Question
7 answers
I have little knowledge about the server consolidation tools but I am not very skilled so I need to know the open source tools available.
Relevant answer
Answer
  1. Open Source Tools : GlusterFS
  2. Ceph's technical foundation is the Reliable Autonomic Distributed Object Store (RADOS),