Linux sometimes dumps a huge file when a script crashes. These core files can build up and eat away valuable disk space. Some other methods of deleting core files will damage your server. Here are a few simple commands I use to find and delete these core dump files safely. Deleting files on Linux can […]
Read MoreEncountered this gem when I was attempting to install an overly simple/normal perl module (HTML::Template, though all will fail as a result of this). This actually has nothing to do with cPanel, the kernel, or CPAN. Instead, you’re actually hitting a PAM ulimit that is exhausting all of the available reserved memory required to install […]
Read MoreThe Ubuntu developers are moving quickly to bring you the absolute latest and greatest software the Open Source community has to offer. The Maverick Meerkat Beta is the beta release of Ubuntu 10.10, bringing with it new features for the next version of Ubuntu. This is a beta release. Do not install it on production […]
Read MoreWhile replacing a bad drive with a drive that used to be part of another RAID array configuration, the RAID refused to automatically rebuild, thinking that I might want to import the configuration from this disk (or that there’s data on there that I might need). Simply inserting the drive doesn’t make the controller rebuild […]
Read MoreAn excellent program for monitoring users and applications is psacct. This program will work in the background of your system recording what all users are doing on your system as well as the resources that are being consumed. I use it daily for resource abuse tracking, statistics generation, CPU usage trending, process identification and more. […]
Read MoreRemote login using the SSH protocol is a common activity in my line of work. With the SSH protocol, the responsibility is on the SSH client to verify the identity of the host to which it is connecting. The host identify is established by its SSH host key. Typically, the host key is auto-created during […]
Read MoreThe Linux Laptop Company sells professional grade Linux laptops with full hardware support under all flavors of Linux. Our clients range from worldwide corporations to everyday personal Linux desktop users. We are familiar with all of the latest technology and our engineers can customize every aspect of your system to meet all of your most […]
Read MoreYou can change the default priority that an application runs with by starting it with the nice command, but if you want to change the priority of a process that is already running, the command to use is renice. Renice can be used to change the priority of a single process, or of all the […]
Read MoreThis one’s here because I spent the better half of an hour troubleshooting this for a customer. The error: Fatal error: Out of memory (allocated 47448064) (tried to allocate 13472326 bytes) in /usr/local/cpanel/3rdparty/lib/php/Net/SMTP.php on line 821 The cause: Sending messages through Webmail with attachments larger than 10MB. Incorrect diagnosis: If you’ve stumbled upon this post […]
Read MoreSo, often I’ll come across something that I need done, but don’t want to waste time manually doing it. This particular instance, I had a list of hostnames which I needed to remove the trailing “.” (dot) from the PTR. Normally, if these hostnames were all simple name.TLD domains this would easily be accomplished with […]
Read More
Erik
Wednesday, September 22, 2010
linux administration - tips, notes and projects
2 Comments