Server Administration
- or -
Post a project like this3314
£15/hr(approx. $19/hr)
- Posted:
- Proposals: 7
- Remote
- #714673
- Awarded
Email Deliverability, DNS, Google Workspace, Office 365, DMARC, Website Migration Expert
Accra
3800871564552923405229853264865601651756
Description
Experience Level: Intermediate
Estimated project duration: 1 day or less
General information for the business: Clothing Ecommerce Website
Description of requirements/functionality: Hi,
Our server is unstable (multiple crashes in a week) and also has mailing issues (on spamming blacklists). We require these to be investigated and fixed. Further information is available below:
--------------------
Thank you for your patience, I had a look at the kvmhost this VPS is hosted on and currently doesn't have any issues - load average is low, network traffic normal and fine, etc. Also checking the VPS load averages and CPU usage, the values are well within acceptable limits.
I'm not entirely sure what is causing your server to crash however if you have a look at /var/log/messages I can see repetition of the following:
Jan 22 08:39:11 607075 sw-engine: /etc/selinux/targeted/contexts/files/file_contexts: Multiple different specifications for /root/bin(/.*)? (root:object_r:bin_t:s0 and root:object_r:home_bin_t:s0).
This appear to be related to selinux, you can temporarily disable this and see if that improves the issue.
In addition, this is also entry in messages:
Jan 22 13:06:24 607075 restorecond: Will not restore a file with more than one hard link (/etc/resolv.conf) Invalid argument
This appears to be related to hardlinking to /etc/resolv.conf and restorecon is refusing
to relabel it. I did a search for this link which needs breaking:
[root@607075 ~]# find / -xdev -inum `ls -i /etc/resolv.conf | awk '{ print $1 }'`
/var/www/vhosts/chroot/etc/resolv.conf
/var/www/vhosts/swishing.co.uk/etc/resolv.conf
/etc/resolv.conf
[root@607075 ~]#
You can break the link, monitor your server status to see if this has helped with the crashes. These are starting point which you can started on.
--------------------
Checking your VPS, this was created in your account on the 19th November. The blacklisting against the server is listed as of this morning at 2am:
http://cbl.abuseat.org/lookup.cgi?ip=91.109.4.159
IP Address 91.109.4.159 is listed in the CBL. It appears to be infected with a spam sending trojan, proxy or some other form of botnet.
It was last detected at 2015-01-21 02:00 GMT (+/- 30 minutes), approximately 8 hours, 30 minutes ago.
This IP address is HELO'ing as "localhost.localdomain" which violates the relevant standards (specifically: RFC5321).
Please be aware that each VPS when built is a fresh install of the OS and control panel. As the IP is listed as sending spam and been seen doing so at 2am this morning, this will not have been an issue with the IP prior to being assigned to you.
What you will need to do is go through all sites on your server and ensure none of the sites have been compromised or had malicious scripts injected via 3rd party plugins installed to your sites.
OS requirements: Linux
Extra notes:
Description of requirements/functionality: Hi,
Our server is unstable (multiple crashes in a week) and also has mailing issues (on spamming blacklists). We require these to be investigated and fixed. Further information is available below:
--------------------
Thank you for your patience, I had a look at the kvmhost this VPS is hosted on and currently doesn't have any issues - load average is low, network traffic normal and fine, etc. Also checking the VPS load averages and CPU usage, the values are well within acceptable limits.
I'm not entirely sure what is causing your server to crash however if you have a look at /var/log/messages I can see repetition of the following:
Jan 22 08:39:11 607075 sw-engine: /etc/selinux/targeted/contexts/files/file_contexts: Multiple different specifications for /root/bin(/.*)? (root:object_r:bin_t:s0 and root:object_r:home_bin_t:s0).
This appear to be related to selinux, you can temporarily disable this and see if that improves the issue.
In addition, this is also entry in messages:
Jan 22 13:06:24 607075 restorecond: Will not restore a file with more than one hard link (/etc/resolv.conf) Invalid argument
This appears to be related to hardlinking to /etc/resolv.conf and restorecon is refusing
to relabel it. I did a search for this link which needs breaking:
[root@607075 ~]# find / -xdev -inum `ls -i /etc/resolv.conf | awk '{ print $1 }'`
/var/www/vhosts/chroot/etc/resolv.conf
/var/www/vhosts/swishing.co.uk/etc/resolv.conf
/etc/resolv.conf
[root@607075 ~]#
You can break the link, monitor your server status to see if this has helped with the crashes. These are starting point which you can started on.
--------------------
Checking your VPS, this was created in your account on the 19th November. The blacklisting against the server is listed as of this morning at 2am:
http://cbl.abuseat.org/lookup.cgi?ip=91.109.4.159
IP Address 91.109.4.159 is listed in the CBL. It appears to be infected with a spam sending trojan, proxy or some other form of botnet.
It was last detected at 2015-01-21 02:00 GMT (+/- 30 minutes), approximately 8 hours, 30 minutes ago.
This IP address is HELO'ing as "localhost.localdomain" which violates the relevant standards (specifically: RFC5321).
Please be aware that each VPS when built is a fresh install of the OS and control panel. As the IP is listed as sending spam and been seen doing so at 2am this morning, this will not have been an issue with the IP prior to being assigned to you.
What you will need to do is go through all sites on your server and ensure none of the sites have been compromised or had malicious scripts injected via 3rd party plugins installed to your sites.
OS requirements: Linux
Extra notes:
Sleeky D.
100% (7)Projects Completed
7
Freelancers worked with
8
Projects awarded
45%
Last project
8 Dec 2021
United Kingdom
New Proposal
Login to your account and send a proposal now to get this project.
Log inClarification Board Ask a Question
-
There are no clarification messages.
We collect cookies to enable the proper functioning and security of our website, and to enhance your experience. By clicking on 'Accept All Cookies', you consent to the use of these cookies. You can change your 'Cookies Settings' at any time. For more information, please read ourCookie Policy
Cookie Settings
Accept All Cookies