Howtos / Articles

PHP FPM Unix Socket Error 13 Permission Denied After Updating Ubuntu

If you have a Ubuntu web server (running Ubuntu 14.04 LTS, 13.10, 12.04 LTS, or 10.04 LTS) set up using PHP FPM with Unix sockets, be warned that a recent security patch that fixes an issue with the PHP FPM socket permissions, may also break existing configurations, preventing your website from load php files. After this patch gets installed, you may find your unix socket now no longer accepts connections from your web server user, and you will see an…

Read more [...]

Using sed to replace a string in a file

The ‘sed’ command can be used to easily replace all occurrences of one string in a text file, with another string. For example: sed -i “s/wordtofind/replacewithword/g” /path/to/file.txt This command will find all occurrences of “wordtofind” and replace them on the fly with “replacewithword” in the file “/path/to/file.txt”. The “-i” command switch specifies to edit the file in place, otherwise it will just display the output to the standard output. Run it without the “-i” switch to ensure it runs correctly,…

Read more [...]

Synchronize the time on Ubuntu from a NTP Server

To synchronize the time on a Ubuntu computer, with the time from a NTP server, you can simply run the following command: sudo ntpdate 0.pool.ntp.org Replace “0.pool.ntp.org” with your NTP time server of choice. Example output: $ sudo ntpdate 0.pool.ntp.org 1 Jul 00:50:12 ntpdate[31843]: adjust time server 12.34.56.78 offset -0.001309 sec $ Your time will now be synchronized to the time from the NTP server. You can put this in a cron job to periodically update the time, to ensure…

Read more [...]

Change the Timezone in Ubuntu

To change the timezone on Ubuntu all you need to do is reconfigure the tzdata package. This can be done using the following command: sudo dpkg-reconfigure tzdata A menu prompt will then appear. Simply enter in your geographic area, and then the relevant city/timezone you want.…

Read more [...]

Generate new SSH keys

SSH allows the use of encryption keys to be used to allow logging into a system instead of having to remember a plain text password. This is great for use in scripts, and automated tasks, but can be a problem is anyone else ever gets the keys somehow. If the keys become compromised, you must generate new SSH keys. With the increasing use of virtual servers nowadays, if you are creating new servers based on a image file/backup, you may…

Read more [...]



Page 3 of 2312345678910...20...Last »