What is the difference between the "Extract data-tier application" and "Export data-tier application" in the SSMS Options when right-clicking on a database?
CryptoJones's questions
Within Citrix XenServer...I want an internal network, not dependent on a physical NIC, that only the HyperVisor and virtual machines can see. I believe I want to implement a "Single-Server Private Network."
How do the VMs communicated with the Hyper-Visor? If I want to manage the Hyper-Visor from one of the VMs, how do I access it?
I know the other option is having a network associated with a physical NIC, but I don't want the LAN to be able to access that Network.
We have two domain controllers, HOST0 and HOST1. When HOST1 goes down, OWA is not available. When looking in exchange and running:
Get-ClientAccessServer -Identity HOST0 | FL
It shows HOST1 as the "Originating Server."
A) Why is OWA dependent on HOST1 when HOST0 is the Exchange Server?
B) Is there a way to change this behavior?
I broke my squid proxy. It stopped blocking HTTPS sites in the acl.denied_domains file, but still blocks the HTTP sites.
This was working till I edited my squid.conf file, and I do not have a backup.
#
# Recommended minimum configuration:
#
visible_hostname omiw2321.orthman.local
cache_mgr [email protected]
acl manager proto cache_object
acl localhost src 127.0.0.1/32 ::1
acl to_localhost dst 127.0.0.0/8 0.0.0.0/32 ::1
# Example rule allowing access from your local networks.
# Adapt to list your (internal) IP networks from where browsing # should be allowed # DEFAULT BLOCKING
acl localnet src 10.0.0.0/8 # RFC1918 possible internal network
acl localnet src 172.16.0.0/12 # RFC1918 possible internal network
acl localnet src 192.168.0.0/16 # RFC1918 possible internal network
acl localnet src fc00::/7 # RFC 4193 local private network range
acl localnet src fe80::/10 # RFC 4291 link-local (directly plugged) machines
acl SSL_ports port 443
acl Safe_ports port 21 # ftp
acl Safe_ports port 443 # https
acl Safe_ports port 80 # WWW
acl Safe_ports port 70 # gopher
acl Safe_ports port 210 # wais
acl Safe_ports port 280 # http-mgmt
acl Safe_ports port 488 # gss-http
acl Safe_ports port 591 # filemaker
acl Safe_ports port 777 # multiling http
acl Safe_ports port 90 # eproduction
acl Safe_ports port 1025-65535 # unregistered ports
acl CONNECT method CONNECT
#
# Recommended minimum Access Permission configuration:
#
# Only allow cachemgr access from localhost http_access allow manager localhost http_access deny manager
# Deny requests to certain unsafe ports
http_access deny !Safe_ports
# Deny CONNECT to other than secure SSL ports http_access deny CONNECT !SSL_ports
# We strongly recommend the following be uncommented to protect innocent # web applications running on the proxy server who think the only # one who can access services on "localhost" is a local user http_access deny to_localhost
#
# INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS #
# DENIED DOMAINS
acl denied_domains dstdomain "acl.denied_domains"
http_access deny denied_domains
# KEYWORD BLOCKING
acl keywords url_regex "acl.keywords"
http_access deny keywords
# Twitter
acl twitter src "acl.twitter.ips"
acl twitter.dst dstdomain "twitter.hosts"
http_access allow twitter twitter.dst
# FACEBOOK
acl facebook src "acl.facebook.ips"
acl facebook.dst dstdomain "facebook.hosts"
http_access allow facebook facebook.dst
# YOUTUBE
acl youtube src "acl.youtube.ips"
acl youtube.dst dstdomain "youtube.hosts"
http_access allow youtube youtube.dst
# EBAY
acl ebay src "acl.ebay.ips"
acl ebay.dst dstdomain "ebay.hosts"
http_access allow ebay ebay.dst
# LinkedIN
acl linkedin src "acl.linkedin.ips"
acl linkedin.dst dstdomain "linkedin.hosts"
http_access allow linkedin linkedin.dst
# Pandora
acl pandora src "acl.pandora.ips"
acl pandora.dst dstdomain "pandora.hosts"
http_access allow pandora pandora.dst
# Example rule allowing access from your local networks.
# Adapt localnet in the ACL section to list your (internal) IP networks # from where browsing should be allowed http_access allow localnet http_access allow localhost
# And finally deny all other access to this proxy http_access deny all
# Squid normally listens to port 3128
http_port 3128
# We recommend you to use at least the following line.
hierarchy_stoplist cgi-bin ?
# Uncomment and adjust the following to add a disk cache directory.
#cache_dir ufs /var/spool/squid 100 16 256
# Leave coredumps in the first cache dir coredump_dir /var/spool/squid
# Add any of your own refresh_pattern entries above these.
refresh_pattern ^ftp: 1440 20% 10080
refresh_pattern ^gopher: 1440 0% 1440
refresh_pattern -i (/cgi-bin/|\?) 0 0% 0
refresh_pattern . 0 20% 4320
I have used Piranha to setup fail-over for httpd. I set the servers the same, but one shows the VIPS and the other doesn't. Is this normal?
Server A) [Primary]
[root@titania ~]# ipvsadm -L
IP Virtual Server version 1.2.1 (size=4096)
Prot LocalAddress:Port Scheduler Flags
-> RemoteAddress:Port Forward Weight ActiveConn InActConn
TCP 172.16.28.231:http lblc
-> 172.16.28.229:http Route 1 0 0
-> 172.16.28.230:http Route 1 0 0
[root@titania ~]
[root@titania ~]# ifconfig
eth0 Link encap:Ethernet HWaddr 00:15:5D:1C:D4:04
inet addr:172.16.28.233 Bcast:172.16.28.255 Mask:255.255.255.0
inet6 addr: fe80::215:5dff:fe1c:d404/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:1115300 errors:0 dropped:0 overruns:0 frame:0
TX packets:686246 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:115178238 (109.8 MiB) TX bytes:50225507 (47.8 MiB)
eth0:1 Link encap:Ethernet HWaddr 00:15:5D:1C:D4:04
inet addr:172.16.28.231 Bcast:172.16.28.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:8 errors:0 dropped:0 overruns:0 frame:0
TX packets:8 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:838 (838.0 b) TX bytes:838 (838.0 b)
[root@titania ~]#
[root@titania ~]# cat /etc/sysconfig/ha/lvs.cf
serial_no = 53
primary = 172.16.28.233
service = lvs
backup_active = 1
backup = 172.16.28.232
heartbeat = 1
heartbeat_port = 539
keepalive = 6
deadtime = 18
network = direct
debug_level = NONE
monitor_links = 1
syncdaemon = 1
syncd_iface = eth0
syncd_id = 0
virtual http {
active = 1
address = 172.16.28.231 eth0:1
vip_nmask = 255.255.255.0
port = 80
send = "GET / HTTP/1.0\r\n\r\n"
expect = "HTTP"
use_regex = 0
load_monitor = none
scheduler = lblc
protocol = tcp
timeout = 6
reentry = 15
quiesce_server = 1
server deimos {
address = 172.16.28.229
active = 1
weight = 1
}
server phobos {
address = 172.16.28.230
active = 1
weight = 1
}
}
[root@titania ~]#
Server B) [Secondary]
IP Virtual Server version 1.2.1 (size=4096)
Prot LocalAddress:Port Scheduler Flags
-> RemoteAddress:Port Forward Weight ActiveConn InActConn
[root@titan ~]#
[root@titan ~]# ifconfig
eth0 Link encap:Ethernet HWaddr 00:15:5D:1C:34:01
inet addr:172.16.28.232 Bcast:172.16.28.255 Mask:255.255.255.0
inet6 addr: fe80::215:5dff:fe1c:3401/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:529515 errors:0 dropped:0 overruns:0 frame:0
TX packets:81242 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:31911311 (30.4 MiB) TX bytes:4919228 (4.6 MiB)
Interrupt:9 Base address:0x2000
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:236 errors:0 dropped:0 overruns:0 frame:0
TX packets:236 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:22532 (22.0 KiB) TX bytes:22532 (22.0 KiB)
[root@titan ~]#
[root@titan ~]# cat /etc/sysconfig/ha/lvs.cf
serial_no = 51
primary = 172.16.28.233
service = lvs
backup_active = 1
backup = 172.16.28.232
heartbeat = 1
heartbeat_port = 539
keepalive = 6
deadtime = 18
network = direct
debug_level = NONE
monitor_links = 1
syncdaemon = 1
syncd_iface = eth0
syncd_id = 0
virtual http {
active = 1
address = 172.16.28.231 eth0:1
vip_nmask = 255.255.255.0
port = 80
send = "GET / HTTP/1.0\r\n\r\n"
expect = "HTTP"
use_regex = 0
load_monitor = none
scheduler = lblc
protocol = tcp
timeout = 6
reentry = 15
quiesce_server = 1
server deimos {
address = 172.16.28.229
active = 1
weight = 1
}
server phobos {
address = 172.16.28.230
active = 1
weight = 1
}
}
[root@titan ~]#
We have an SQL 2005 Server we need to upgrade the Hard Disks on. The most efficient way I can think of to do this is the following;
- Run a backup using Backup Exec on the D:\ Partition (This partition holds the SQL DATA Files)
- Disable the SQL Services from starting on start-up
- Reboot the Server into the RAID Controller
- Remove the old Hard Disks
- Insert the new Hard Disks
- Initialize the New Array
- Boot into the OS
- Assign the Drive letter D: to the new array
- Use backup exec to restore all the Data files to the D:\ partition
- Enable SQL Services on Startup
- Reboot the server
Is this the best way of doing this? Am I missing something?