Wednesday, January 23, 2019

WSUS: Feature update to Windows 10, version XXXX not downloading


Using WSUS having issues with clients showing downloading 0% or not downloading windows 10 feature updates and thus the update failing, make sure you have this setting set in your WSUS server:


1) Open IIS Manager -> Select the server name from left penal -> Open “MIME Types” (Below Image for reference)

2) In MIME Type window: Actions -> Select “Add”

3) Add below details:

     File name extension: .esd
     MIME type: .esd application/octet-stream
     Click OK



4) Restart IIS service from IIS Manager -> Select the server name from left penal -> Actions (Right side penal) -> click on Restart.

Once above steps are completed, Windows 10 clients should have this happen automatically in next update cycle.

Wednesday, May 16, 2018

Magento: The requested URL /magento/ was not found on this server. Apache/2.4.18 (Ubuntu) Server at localhost Port 80

Error:
Not Found

The requested URL /magento/ was not found on this server.

Apache/2.4.18 (Ubuntu) Server at localhost Port 80





Solution:

Run the following commands:


a2enmod rewrite
systemctl restart apache2
a2enmod ssl
systemctl restart apache2
a2ensite default-ssl
systemctl restart apache2

Edit apache2.conf and change (None to All)following:

vim.tiny /etc/apache2/apache2.conf

<Directory /var/www/>
     Options Indexes FollowSymLinks
     AllowOverride All
     Require all granted
</Directory>

systemctl restart apache2 


Monday, May 14, 2018

Unable to access hipchat.com. Please check that your network is connected and try again.

Error: Unable to access hipchat.com. Please check that your network is connected and try again

OS: Linux



Resolution: 
cd /opt/HipChat4/lib
sudo ln -s /usr/lib/x86_64-linux-gnu/libcrypto.so.1.0.2
sudo ln -s libcrypto.so.1.0.2 libcrypto.so


Note: Please check libssl is installed if not kindly install first with below steps:

- Install version 1.0.x of OpenSSL:
sudo apt-get install libssl1.0.2

- Alternatively, download the OpenSSL 1.0.2 Debian package from https://packages.debian.org/sid/amd64/libssl1.0.2/download and install it manually: 
sudo apt install /<Download path>/libssl1.0.2_1.0.2l-2_amd64.deb

- Force Hipchat to use the newly installed version of OpenSSL:
ln -s /usr/lib/x86_64-linux-gnu/libssl.so.1.0.2 /opt/HipChat4/lib/libssl.so

Tuesday, September 12, 2017

User profile cannot be loaded. The User Profile Service service failed the logon.


Error:
















Solution:

* Check "C:\Users\Default" folder Security Permissions. It should be like below.

Everyone
Read & Execute
Users (local)
Read & Execute
Administrators
Full Control
System
Full Control

If Security Permissions is not looks like abow, set Permissions and Enjoy..!

Sunday, August 27, 2017

WSUS Console Connection Error / Console Crashing


Resolution:

Open IIS Manager and navigate Application Pools, select WsusPool and click on Advanced Settings and in the Advanced Setting scroll down to Recycling. Set the Private Memory Limit (KB) to 0 then click OK then click on Recycle left IIS of the window.


Friday, March 10, 2017

SSL Configuration for Apache


openssl req -new -newkey rsa:2048 -nodes -keyout domainname.key -out domainname.csr

Put below settings in /etc/apache2/sites-enabled/default_ssl and change necessary settings.


< IfModule mod_ssl.c>
< VirtualHost _default_:443>
    ServerAdmin webmaster@localhost
        ServerName domain.com
       
        DocumentRoot /home/ubuntu/folder_name

        <Directory /home/ubuntu/folder_name>
            Options FollowSymLinks
           AllowOverride All
           Require all granted
       </Directory>

        ErrorLog /var/log/apache2/domainname.log

        # Possible values include: debug, info, notice, warn, error, crit,
        # alert, emerg.
        LogLevel warn

        CustomLog /var/log/apache2/domainname.log combined

        SSLEngine on

        SSLCertificateFile    /etc/ssl/certs/domainname.com.crt
        SSLCertificateKeyFile /etc/ssl/private/domainname.com.key
        SSLCertificateChainFile /etc/ssl/certs/gs_intermediate_ca.crt
        SSLCertificateChainFile /etc/ssl/certs/domainname.com.ca-bundle

        #SSLOptions +FakeBasicAuth +ExportCertData +StrictRequire
        <FilesMatch "\.(cgi|shtml|phtml|php)$">
                SSLOptions +StdEnvVars
        </FilesMatch>
        <Directory /usr/lib/cgi-bin>
                SSLOptions +StdEnvVars
        </Directory>

        #   SSL Protocol Adjustments:
        BrowserMatch "MSIE [2-6]" \
                nokeepalive ssl-unclean-shutdown \
                downgrade-1.0 force-response-1.0
        # MSIE 7 and newer should be able to use keepalive
        BrowserMatch "MSIE [17-9]" ssl-unclean-shutdown

## For Vulnerability
SSLProtocol All -SSLv2 -SSLv3
SSLHonorCipherOrder on
SSLCipherSuite EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH+aRSA:EECDH:EDH+aRSA:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS!RC4


< /VirtualHost>
< /IfModule>

Thursday, March 9, 2017

Linux Server Service Start if it's automatically stopped.


Create File Name like servicestart and enter below lines in to that and replace the service=apache2 to anyother service name.

# vi servicestart
+++++++++++++++++++++
#!/bin/bash
service=apache2

if (( $(ps -ef | grep -v grep | grep $service | wc -l) > 0 ))
then
echo "$service is running!!!"
else
/etc/init.d/$service start
fi
+++++++++++++++++++++
Save an Close this file.

Put it in to Cron to run at every minute.

# crontab -e
*/1 * * * * /bin/bash /root/servicerestart