Oct 112017
 

Redis is an open-source, networked, in-memory, key-value data store with optional durability. It is written in ANSI C. It’s a “NoSQL” key-value data store. More precisely, it is a data structure server.

To install Redis as daemon on a CentOS/RHEL/cPanel server, complete the following steps

cd /usr/local/
wget http://download.redis.io/releases/redis-stable.tar.gz
tar -xvzf redis-stable.tar.gz
cd redis*
make
cp src/redis-server /usr/local/bin
cp src/redis-cli /usr/local/bin
mkdir -p /etc/redis
mkdir -p /var/redis
cp redis.conf /etc/redis/redis.conf

Next, open the/etc/redis/redis.conf file using vim or nano and adjust the values to the ones shown below:

daemonize yes
port 6379
bind 127.0.0.1
dir  /var/redis/
logfile  /var/log/redis.log
pidfile  /var/run/redis.pid

Then, create a new file /etc/init.d/redis and add the following contents to it ( Reference https://gist.github.com/paulrosania/257849 ). Now, make it executable ( chmod +x /etc/init.d/redis ).

#!/bin/sh
#
# redis - this script starts and stops the redis-server daemon
#
# chkconfig:   - 85 15 
# description:  Redis is a persistent key-value database
# processname: redis-server
# config:      /etc/redis/redis.conf
# config:      /etc/sysconfig/redis
# pidfile:     /var/run/redis.pid
 
# Source function library.
. /etc/rc.d/init.d/functions
 
# Source networking configuration.
. /etc/sysconfig/network
 
# Check that networking is up.
[ "$NETWORKING" = "no" ] && exit 0
 
redis="/usr/local/bin/redis-server"
prog=$(basename $redis)
 
REDIS_CONF_FILE="/etc/redis/redis.conf"
 
[ -f /etc/sysconfig/redis ] && . /etc/sysconfig/redis
 
lockfile=/var/lock/subsys/redis
 
start() {
    [ -x $redis ] || exit 5
    [ -f $REDIS_CONF_FILE ] || exit 6
    echo -n $"Starting $prog: "
    daemon $redis $REDIS_CONF_FILE
    retval=$?
    echo
    [ $retval -eq 0 ] && touch $lockfile
    return $retval
}
 
stop() {
    echo -n $"Stopping $prog: "
    killproc $prog -QUIT
    retval=$?
    echo
    [ $retval -eq 0 ] && rm -f $lockfile
    return $retval
}
 
restart() {
    stop
    start
}
 
reload() {
    echo -n $"Reloading $prog: "
    killproc $redis -HUP
    RETVAL=$?
    echo
}
 
force_reload() {
    restart
}
 
rh_status() {
    status $prog
}
 
rh_status_q() {
    rh_status >/dev/null 2>&1
}
 
case "$1" in
    start)
        rh_status_q && exit 0
        $1
        ;;
    stop)
        rh_status_q || exit 0
        $1
        ;;
    restart|configtest)
        $1
        ;;
    reload)
        rh_status_q || exit 7
        $1
        ;;
    force-reload)
        force_reload
        ;;
    status)
        rh_status
        ;;
    condrestart|try-restart)
        rh_status_q || exit 0
	    ;;
    *)
        echo $"Usage: $0 {start|stop|status|restart|condrestart|try-restart|reload|force-reload}"
        exit 2
esac

Now make sure the daemon will start after server reboot.

chkconfig --add redis
chkconfig redis on

Now, you will want to touch /etc/redis/local.conf and put the following configs for redis in the file so it to work properly. go inside the /etc/redis/redis.conf file.

include /etc/redis/local.conf

Now we can start redis using command

/etc/init.d/redis start

To make sure redis is working, run the command

redis-cli ping 

from the CLI. If you get the result “PONG”, this will imply that redis is working correctly.

Now, to install the redis PHP extension, use the following commands (Note: if you run EA4 in WHM, install it via the PECL Module install feature).

pecl install redis

Now open your php.ini file (on a cPanel server)

/usr/local/lib/php.ini

and add the following line to it

extension=redis.so

Now restart Apache to apply the changes to php.ini file.

service httpd restart
 Posted by at 12:40 pm
Jun 082017
 

Howdy!

I won’t be going into a whole lot of detail about sar as this has been documented elsewhere multiple times but basically, SAR stands for System Activity Report and as its name suggests, the sar command is used to collect,report & save CPU, Memory, I/O usage in Unix like operating systems. The SAR command produces reports on the fly and can also save the reports in the log files as well. The sar man page states:

The sar command writes to standard output the contents of selected cumulative activity counters in the operating system. The accounting system, based on the values in the count and interval parameters, writes information the specified number of times spaced at the specified intervals in seconds. If the interval parameter is set to zero, the sar command displays the average statistics for the time since the system was started. If the interval parameter is specified without the count parameter, then reports
are generated continuously.

Continue reading »

 Posted by at 9:57 am
Jun 062017
 

As a request comes in, it is denoted in the scoreboard. The scoreboard itself is basically a way to keep track of each incoming, waiting, and completing connections. These connections are broken down into the following types:

  1. “_” Waiting for Connection
  2. “S” Starting up
  3. “R” Reading Request
  4. “W” Sending Reply
  5. “K” Keepalive (read)
  6. “D” DNS Lookup
  7. “C” Closing connection
  8. “L” Logging
  9. “G” Gracefully finishing
  10. “I” Idle cleanup of worker
  11. “.” Open slot with no current process

Here is an example of the apache scoreboard in WHM:
Continue reading »

 Posted by at 4:24 pm
Dec 072016
 

Recently I came upon an issue on a cPanel server with suPHP as the handler in that, when the cPanel user SSH’s into the server (or connects via sFTP) any file or directory created will have incorrect permissions.

  • Files: 664
  • Directories 775
  •  
    I found this was due to a setting in /etc/profile that sets the umask value as such
    Continue reading »

    Oct 312016
     

    Hi!

    Do you have a client who says that they cannot access their sites/server and insists it’s a network issue, but their IP addresses does not seem to be blocked by csf.deny and their sites are not loading in several parts of the world with a site checker like https://www.site24x7.com/check-website-availability.html or others?

    Well do I have quite the solution for you!

    This morning, we verified an issue regarding a CSF/Spamhaus update in which CSF blocks any IP address that is over 128.0.0.0. This is due to a subnet that does not exist in the official list, 172.103.64.0/1:

    https://www.spamhaus.org/drop/drop.lasso

    Unfortunately, CSF will round the 172.103.64.0/1 down to 128.0.0.0/1 which will block all IP addresses above that range. To remedy this, after verifying the subnet issue is present, remove the SPAMDROP list file:

    rm /var/lib/csf/csf.block.SPAMDROP

    And restart CSF

    csf -r

    Restarting CSF will generate a new (and correct) SPAMDROP list without the wonky subnet.

    Now, verify the sites on the server can load now throughout the world without issue:

    https://www.site24x7.com/check-website-availability.html

    Enjoy!!!