Linux Sunucu İşlemleri

Linux Sunucu İşlemleri

Directadmin Ioncube Kurulumu

0

Directadmin ioncube kurulumu işlemini oldukça basit 3 satırlık komutla halledebiliriz.

Öncelikle sunucumuzun konsoluna bağlanıyoruz. ve sırasıyla aşağıdaki satırları çalıştırıyoruz.

cd /usr/local/directadmin/custombuild
./build set ioncube yes
./build ioncube

BU satırları çalıştırdıktan sonra httpd servisimizi restartlıyor ve php -v ile ioncube kurulduğunu görebiliyoruz.

Ubuntu – Authentication token manipulation error

0

Ubuntu üzerinde şifredeğiştirmek istediğiniz zaman

Authentication token manipulation error

hata mesajını alırsanız

mount -rw -o remount /

komut satırını yazdıktan sonra şifrenizi değiştirebilirsiniz.

-bash: setup: command not found

0

hata mesajı : -bash: setup: command not found

Çözümü :
yum install setuptool system-config-network-tui

Linux exim komutları

0

Basic information

Print a count of the messages in the queue:

root@localhost# exim -bpc

Print a listing of the messages in the queue (time queued, size, message-id, sender, recipient):

root@localhost# exim -bp

Print a summary of messages in the queue (count, volume, oldest, newest, domain, and totals):

root@localhost# exim -bp | exiqsumm

Print what Exim is doing right now:

root@localhost# exiwhat

Test how exim will route a given address:

root@localhost# exim -bt alias@localdomain.com
user@thishost.com
<-- alias@localdomain.com
router = localuser, transport = local_delivery
root@localhost# exim -bt user@thishost.com
user@thishost.com
router = localuser, transport = local_delivery
root@localhost# exim -bt user@remotehost.com
router = lookuphost, transport = remote_smtp
host mail.remotehost.com [1.2.3.4] MX=0

Run a pretend SMTP transaction from the command line, as if it were coming from the given IP address. This will display Exim’s checks, ACLs, and filters as they are applied. The message will NOT actually be delivered.

root@localhost# exim -bh 192.168.11.22

Display all of Exim’s configuration settings:

root@localhost# exim -bP

Searching the queue with exiqgrep

Exim includes a utility that is quite nice for grepping through the queue, called exiqgrep. Learn it. Know it. Live it. If you’re not using this, and if you’re not familiar with the various flags it uses, you’re probably doing things the hard way, like piping `exim -bp` into awk, grep, cut, or `wc -l`. Don’t make life harder than it already is.

First, various flags that control what messages are matched. These can be combined to come up with a very particular search.

Use -f to search the queue for messages from a specific sender:

root@localhost# exiqgrep -f [luser]@domain

Use -r to search the queue for messages for a specific recipient/domain:

root@localhost# exiqgrep -r [luser]@domain

Use -o to print messages older than the specified number of seconds. For example, messages older than 1 day:

root@localhost# exiqgrep -o 86400 [...]

Use -y to print messages that are younger than the specified number of seconds. For example, messages less than an hour old:

root@localhost# exiqgrep -y 3600 [...]

Use -s to match the size of a message with a regex. For example, 700-799 bytes:

root@localhost# exiqgrep -s ‘^7..$’ [...]

Use -z to match only frozen messages, or -x to match only unfrozen messages.

There are also a few flags that control the display of the output.

Use -i to print just the message-id as a result of one of the above two searches:

root@localhost# exiqgrep -i [ -r | -f ] …

Use -c to print a count of messages matching one of the above searches:

root@localhost# exiqgrep -c …

Print just the message-id of the entire queue:

root@localhost# exiqgrep -i

Managing the queue

The main exim binary (/usr/sbin/exim) is used with various flags to make things happen to messages in the queue. Most of these require one or more message-IDs to be specified in the command line, which is where `exiqgrep -i` as described above really comes in handy.

Start a queue run:

root@localhost# exim -q -v

Start a queue run for just local deliveries:

root@localhost# exim -ql -v

Remove a message from the queue:

root@localhost# exim -Mrm [ … ]

Freeze a message:

root@localhost# exim -Mf [ … ]

Thaw a message:

root@localhost# exim -Mt [ … ]

Deliver a message, whether it’s frozen or not, whether the retry time has been reached or not:

root@localhost# exim -M [ … ]

Deliver a message, but only if the retry time has been reached:

root@localhost# exim -Mc [ … ]

Force a message to fail and bounce as “cancelled by administrator”:

root@localhost# exim -Mg [ … ]

Remove all frozen messages:

root@localhost# exiqgrep -z -i | xargs exim -Mrm

Remove all messages older than five days (86400 * 5 = 432000 seconds):

root@localhost# exiqgrep -o 432000 -i | xargs exim -Mrm

Freeze all queued mail from a given sender:

root@localhost# exiqgrep -i -f luser@example.tld | xargs exim -Mf

View a message’s headers:

root@localhost# exim -Mvh

View a message’s body:

root@localhost# exim -Mvb

View a message’s logs:

root@localhost# exim -Mvl

Add a recipient to a message:

root@localhost# exim -Mar

[

… ]

Edit the sender of a message:

root@localhost# exim -Mes

Access control

Exim allows you to apply access control lists at various points of the SMTP transaction by specifying an ACL to use and defining its conditions in exim.conf. You could start with the HELO string.

# Specify the ACL to use after HELO
acl_smtp_helo = check_helo

# Conditions for the check_helo ACL:
check_helo:

deny message = Gave HELO/EHLO as “friend”
log_message = HELO/EHLO friend
condition = ${if eq {$sender_helo_name}{friend} {yes}{no}}

deny message = Gave HELO/EHLO as our IP address
log_message = HELO/EHLO our IP address
condition = ${if eq {$sender_helo_name}{$interface_address} {yes}{no}}

accept

NOTE: Pursue HELO checking at your own peril. The HELO is fairly unimportant in the grand scheme of SMTP these days, so don’t put too much faith in whatever it contains. Some spam might seem to use a telltale HELO string, but you might be surprised at how many legitimate messages start off with a questionable HELO as well. Anyway, it’s just as easy for a spammer to send a proper HELO than it is to send HELO im.a.spammer, so consider yourself lucky if you’re able to stop much spam this way.

Next, you can perform a check on the sender address or remote host. This shows how to do that after the RCPT TO command; if you reject here, as opposed to rejecting after the MAIL FROM, you’ll have better data to log, such as who the message was intended for.

# Specify the ACL to use after RCPT TO
acl_smtp_rcpt = check_recipient

# Conditions for the check_recipient ACL
check_recipient:

# [...]

drop hosts = /etc/exim_reject_hosts
drop senders = /etc/exim_reject_senders

# [ Probably a whole lot more... ]

This example uses two plain text files as blacklists. Add appropriate entries to these files – hostnames/IP addresses to /etc/exim_reject_hosts, addresses to /etc/exim_reject_senders, one entry per line.

It is also possible to perform content scanning using a regex against the body of a message, though obviously this can cause Exim to use more CPU than it otherwise would need to, especially on large messages.

# Specify the ACL to use after DATA
acl_smtp_data = check_message

# Conditions for the check_messages ACL
check_message:

deny message = “Sorry, Charlie: $regex_match_string”
regex = ^Subject:: .*Lower your self-esteem by becoming a sysadmin

accept

Fix SMTP-Auth for Pine

If pine can’t use SMTP authentication on an Exim host and just returns an “unable to authenticate” message without even asking for a password, add the following line to exim.conf:

begin authenticators

fixed_plain:
driver = plaintext
public_name = PLAIN
server_condition = “${perl{checkuserpass}{$1}{$2}{$3}}”
server_set_id = $2
> server_prompts = :

This was a problem on CPanel Exim builds awhile ago, but they seem to have added this line to their current stock configuration.
Log the subject line

This is one of the most useful configuration tweaks I’ve ever found for Exim. Add this to exim.conf, and you can log the subject lines of messages that pass through your server. This is great for troubleshooting, and for getting a very rough idea of what messages may be spam.

log_selector = +subject

Reducing or increasing what is logged.
Disable identd lookups

Frankly, I don’t think identd has been useful for a long time, if ever. Identd relies on the connecting host to confirm the identity (system UID) of the remote user who owns the process that is making the network connection. This may be of some use in the world of shell accounts and IRC users, but it really has no place on a high-volume SMTP server, where the UID is often simply “mail” or whatever the remote MTA runs as, which is useless to know. It’s overhead, and results in nothing but delays while the identd query is refused or times out. You can stop your Exim server from making these queries by setting the timeout to zero seconds in exim.conf:

rfc1413_query_timeout = 0s

Disable Attachment Blocking

To disable the executable-attachment blocking that many Cpanel servers do by default but don’t provide any controls for on a per-domain basis, add the following block to the beginning of the /etc/antivirus.exim file:

if $header_to: matches “example\.com|example2\.com”
then
finish
endif

It is probably possible to use a separate file to list these domains, but I haven’t had to do this enough times to warrant setting such a thing up.
Searching the logs with exigrep

The exigrep utility (not to be confused with exiqgrep) is used to search an exim log for a string or pattern. It will print all log entries with the same internal message-id as those that matched the pattern, which is very handy since any message will take up at least three lines in the log. exigrep will search the entire content of a log entry, not just particular fields.

One can search for messages sent from a particular IP address:

root@localhost# exigrep ‘<= .* \[12.34.56.78\] ' /path/to/exim_log

Search for messages sent to a particular IP address:

root@localhost# exigrep ‘=> .* \[12.34.56.78\]‘ /path/to/exim_log

This example searches for outgoing messages, which have the “=>” symbol, sent to “user@domain.tld”. The pipe to grep for the “<=" symbol will match only the lines with information on the sender - the From address, the sender's IP address, the message size, the message ID, and the subject line if you have enabled logging the subject. The purpose of doing such a search is that the desired information is not on the same log line as the string being searched for.

root@localhost# exigrep ‘=> .*user@domain.tld’ /path/to/exim_log | fgrep ‘<='

Generate and display Exim stats from a logfile:

root@localhost# eximstats /path/to/exim_mainlog

Same as above, with less verbose output:

root@localhost# eximstats -ne -nr -nt /path/to/exim_mainlog

Same as above, for one particular day:

root@localhost# fgrep YYYY-MM-DD /path/to/exim_mainlog | eximstats

Bonus!

To delete all queued messages containing a certain string in the body:

root@localhost# grep -lr ‘a certain string’ /var/spool/exim/input/ | \
sed -e ‘s/^.*\/\([a-zA-Z0-9-]*\)-[DH]$/\1/g’ | xargs exim -Mrm

Note that the above only delves into /var/spool/exim in order to grep for queue files with the given string, and that’s just because exiqgrep doesn’t have a feature to grep the actual bodies of messages. If you are deleting these files directly, YOU ARE DOING IT WRONG! Use the appropriate exim command to properly deal with the queue.

If you have to feed many, many message-ids (such as the output of an `exiqgrep -i` command that returns a lot of matches) to an exim command, you may exhaust the limit of your shell’s command line arguments. In that case, pipe the listing of message-ids into xargs to run only a limited number of them at once. For example, to remove thousands of messages sent from joe@example.com:

root@localhost# exiqgrep -i -f ‘‘ | xargs exim -Mrm

Speaking of “DOING IT WRONG” — Attention, CPanel forum readers

I get a number of hits to this page from a link in this post at the CPanel forums. The question is:

Due to spamming, spoofing from fields, etc., etc., etc., I am finding it necessary to spend more time to clear the exim queue from time to time. [...] what command would I use to delete the queue

The answer is: Just turn exim off, because your customers are better off knowing that email simply isn’t running on your server, than having their queued messages deleted without notice.

Or, figure out what is happening. The examples given in that post pay no regard to the legitimacy of any message, they simply delete everything, making the presumption that if a message is in the queue, it’s junk. That is total fallacy. There are a number of reasons legitimate mail can end up in the queue. Maybe your backups or CPanel’s “upcp” process are running, and your load average is high — exim goes into a queue-only mode at a certain threshold, where it stops trying to deliver messages as they come in and just queues them until the load goes back down. Or, maybe it’s an outgoing message, and the DNS lookup failed, or the connection to the domain’s MX failed, or maybe the remote MX is busy or greylisting you with a 4xx deferral. These are all temporary failures, not permanent ones, and the whole point of having temporary failures in SMTP and a mail queue in your MTA is to be able to try again after awhile.

Exim already purges messages from the queue after the period of time specified in exim.conf. If you have this value set appropriately, there is absolutely no point in removing everything from your queue every day with a cron job. You will lose legitimate mail, and the sender and recipient will never know if or why it happened. Do not do this!

If you regularly have a large number of messages in your queue, find out why they are there. If they are outbound messages, see who is sending them, where they’re addressed to, and why they aren’t getting there. If they are inbound messages, find out why they aren’t getting delivered to your user’s account. If you need to delete some, use exiqgrep to pick out just the ones that should be deleted.
Reload the configuration

After making changes to exim.conf, you need to give the main exim pid a SIGHUP to re-exec it and have the configuration re-read. Sure, you could stop and start the service, but that’s overkill and causes a few seconds of unnecessary downtime. Just do this:

root@localhost# kill -HUP `cat /var/spool/exim/exim-daemon.pid`

You should then see something resembling the following in exim_mainlog:

pid 1079: SIGHUP received: re-exec daemon
exim 4.52 daemon started: pid=1079, -q1h, listening for SMTP on port 25 (IPv4)

Read The Fucking Manual

The Exim Home Page

Documentation For Exim

The Exim Specification – Version 4.5x

Exim command line arguments

Exim mail dosya limiti

0

Linux sunucularda exim üzerindeki mail dosya boyutu limitini aşağıdaki komut yardımıyla ssh üzerinde kolayca öğrenebiliriz.

exim -bP | grep message_size_limit

Linux ssh işlem detayları

0

Aşağıdaki komut ile yürütülen işlemin PID numarasını girerek işlem detaylarını görebilirsiniz.

lsof -p <PID> |more

PHP Mcrypt Kurulumu

0

Cetnos 32 bit için

wget -q -O – http://www.atomicorp.com/installers/atomic.sh | sh
yum install php-mcrypt.i386
yum install libmcrypt.i386
service httpd restart

Centos 64 bit için

wget -q -O – http://www.atomicorp.com/installers/atomic.sh | sh
yum install php-mcrypt.x86_64
yum install libmcrypt.x86_64
service httpd restart

Linux plesk panelde subdomain’in safe mod ayarını kapatmak

0

Linux plesk panelde subdomain’in safe mod ayarını kapatmak için aşağıdaki komutu yazarak dosya içerisinde safe mod kısmını bulup off duruma getiriyoruz.

nano /var/www/vhosts/domain.com/conf/httpd.include

www.vps.com.tr www.hostavrupa.net

Centos Plesk Kurulumu

0

Centos plesk 9.5.4 kurulumu için aşağıdaki adımları takip etmeniz yeterli.

İlk olarak hosts dosyamızı düzenliyoruz. Bunun için komut satırına hostname yazarak sunucunun hostname’ini görüyoruz. Örnek çıktı : server.halilzade.com

nano /etc/hosts komutunu çalıştırarak hosts dosyasını düzenliyoruz. En alt satıra
123.123.123.123 server.halilzade.com server satırını ekliyoruz. ctrl+x ile dosyamızı kaydedip çıkıyoruz ve sırasıyla aşağıdaki komutları çalıştırmaya başlıyoruz.

yum remove bind*

cd /root

mkdir plesk

cd plesk

wget http://download1.parallels.com/Plesk/PPP9/CentOS5/parallels_installer_v3.6.0_build100407.15_os_CentOS_5_i386

chmod +x parallels_installer_v3.6.0_build100407.15*

./parallels_installer_v3.6.0_build100407.15*

Linux Klasör Boyutunu Öğrenme

0

Linux sistme üzerinde istediğiniz bir klasörün boyutunu kolayca öğrenebilirsiniz.

İlk komut ile klasörün büyüklüğünü / boyutunu Kilobyte olarak göstermektedir.

du –max-depth=0 /home/klasoradi

İkinci komutumuz ile de klasörün cinsini GB cinsinden görebilmekteyiz.

du -hc –max-depth=0 /home/klasoradi

Detaylı Bilgi Aşağıda Bulunmaktadır.

du

Disk Usage – report the amount of disk space used by the specified files and for each subdirectory.

Syntax
du [options]… [file]…

With no arguments, `du’ reports the disk space for the current directory. Normally the disk space is printed in units of 1024 bytes, but this can be overridden

OPTIONS

`-a’
`–all’
Show counts for all files, not just directories.

`-b’
`–bytes’
Print sizes in bytes, overriding the default block size (*note
Block size::).

`-c’
`–total’
Print a grand total of all arguments after all arguments have been
processed.  This can be used to find out the total disk usage of a
given set of files or directories.

`-D’
`–dereference-args’
Dereference symbolic links that are command line arguments.  Does
not affect other symbolic links.  This is helpful for finding out
the disk usage of directories, such as `/usr/tmp’, which are often
symbolic links.

`-h’
`–human-readable’
Append a size letter such as `M’ for megabytes to each size.
Powers of 1024 are used, not 1000; `M’ stands for 1,048,576 bytes.
Use the `-H’ or `–si’ option if you prefer powers of 1000.

`-H’
`–si’
Append a size letter such as `M’ for megabytes to each size.  (SI
is the International System of Units, which defines these letters
as prefixes.)  Powers of 1000 are used, not 1024; `M’ stands for
1,000,000 bytes.  Use the `-h’ or `–human-readable’ option if you
prefer powers of 1024.

`-k’
`–kilobytes’
Print sizes in 1024-byte blocks, overriding the default block size
(*note Block size::).

`-l’
`–count-links’
Count the size of all files, even if they have appeared already
(as a hard link).

`-L’
`–dereference’
Dereference symbolic links (show the disk space used by the file
or directory that the link points to instead of the space used by
the link).

`–max-depth=DEPTH’
Show the total for each directory (and file if -all) that is at
most MAX_DEPTH levels down from the root of the hierarchy.  The
root is at level 0, so `du –max-depth=0′ is equivalent to `du -s’.

`-m’
`–megabytes’
Print sizes in megabyte (that is, 1,048,576-byte) blocks.

`-s’
`–summarize’
Display only a total for each argument.

`-S’
`–separate-dirs’
Report the size of each directory separately, not including the
sizes of subdirectories.

`-x’
`–one-file-system’
Skip directories that are on different filesystems from the one
that the argument being processed is on.

`–exclude=PAT’
When recursing, skip subdirectories or files matching PAT.  For
example, `du –exclude=’*.o” excludes files whose names end in
`.o’.

`-X FILE’
`–exclude-from=FILE’
Like `–exclude’, except take the patterns to exclude from FILE,
one per line.  If FILE is `-’, take the patterns from standard
input.

On BSD systems, `du’ reports sizes that are half the correct values
for files that are NFS-mounted from HP-UX systems.  On HP-UX systems,
it reports sizes that are twice the correct values for files that are
NFS-mounted from BSD systems.  This is due to a flaw in HP-UX; it also
affects the HP-UX `du’ program.

Example

List the total files sizes for everything 1 directory (or less) below the currrent directory ( . )

[simon@testserver]$ du -hc –max-depth=1 .
400M ./data1
1.0G ./data2
1.3G .
1.3G total

Go to Top