Configuring max POST size (post_max_size and upload_max_filesize)
Core-Admin starting from revision 5110, supports configuring easily the max POST size you can do to a given web size, known also as php settings “post_max_size” and el “upload_max_filesize”.
For that, get inside your Core-Admin panel as admin user, select a particular web site you want to update, and then click to “Site options”
If the option is not configured, it will be shown as “not configured”. Now, you only have to select it by clicking over it, then setup the required value (in megabytes MB) and then click on “Edit option”. With that you are done.
Article keyword index
If you get the following error while starting core-admin agent or core-admin server (turbulence process), or something similar:
ImportError: /usr/lib64/python2.6/lib-dynload/_hashlib.so: failed to map segment from shared object: Cannot allocate memory
If you already have checked your system have enough memory available, then possible there’s a ulimit configuration problem.
All releases may suffer this problem. It’s not a bug but a system resource configuration problem.
The problem is caused by a system ulimit configuration that is limiting the amount of memory that can be used by the core-admin agent or the core-admin server (turbulence).
You can run the following commands to see if it solves the problem:
ulimit -m unlimited; ulimit -v unlimited
After that, try to restart the agent to see if the problem is solved.
Long term solution
Upgrade your core-admin packages. Since release rev5010, it is already included a fix to automatically correct this setting when starting the software.
The KB http://www.core-admin.com/portal/kb-24032014-001-dealing-with-time-wait-exhaustion-no-more-tcp-connections about managing time wait configuration problems reported by time wait checker has been updated to allow configuring TCP TIME WAIT recycle option (/proc/sys/net/ipv4/tcp_tw_recycle). The article also includes additional infomation about how this option relates (and may cause problems) with devices behind NATing firewalls when the server running this option is accessed from there.
The article also includes a reference to Troy Davis’ article http://troy.yort.com/improve-linux-tcp-tw-recycle-man-page-entry/ which explains in more detail how this happens.
Starting from release 1.0.46 (revision 4644), now Core-Admin supports PHP 7.0 engines for your webhosting applications, configurable at domain level (so the rest of your hosting domains can run with different PHP engines). This new engine allows to support latest PHP release, along with previous releases, including deprecated ones for legacy applications (5.6, 5.4, 5.3, 5.2).
Check out our Core-Admin Web Edition to see how it works: http://www.core-admin.com/portal/get-it/web-edition
Core-Admin now detects and report mysql replication format errors so you can be aware of it and to take the need measures to resolve it. See additional resolution information here:
We have been working on Raspberry Pi platform, preparing all
the elements needed to be able to have official support for this
platform as new releases appears.
Finally, we now support Raspberry Pi through Raspbian wheezy and working on
Raspbian Jessie. That way now it is possible to join these devices
to your Core-admin plataform and deploy all services provided by it.
For any additional information, please contact us: firstname.lastname@example.org
We hope this will help you to better deploy and control your raspberry devices!
Let’s encrypt (http://letsencrypt.org) now is making it possible for everyone to have access to trusted certificates for free. It does it by using a client that implements the ACME protocol (https://github.com/ietf-wg-acme/acme/), which allows you to get access to the Let’s encrypt infrastructure to request and issue a certificate for your domains.
This is a very important step to secure even more the internet by making possible that, at least, all administration panels can get secured with it. We are talking about “at least administration panels” because it is still possible that you might be interested in legacy SSL/TLS certificates where it can include your contact information or, for legal or techical reasons, you might need a certificate signed by a particular vendor.
In any case, this new technology, promoted by important vendors involved in promoting the web, will provide a secure and trusted solution for many of our devices (routers, IoT “things”, appliances, etc) to have them secured with a https:// page running a SSL/TLS certificate…for free!
So, there’s no excuse anymore to protect your sensitive web pages, especially those running critical services with http:// administration panels.
Core-Admin and Let’s encrypt management application
Core-Admin now support Let’s encrypt by fully integrating it with an easy to use graphical interface that allows to easily locate web pages running at your servers, and request a certificate for them.
This new application is available from Core-Admin revision 4615. Check the following Let’s encrypt for Core-Admin manual to know more details about it: http://www.core-admin.com/portal/applications/lets-encrypt
It’s now available IP blocker user manual describing all options available:
IP blocker user manual
Core-admin software updating will allow us to get last updates in our applications already installed, moreover new funcionality is added to those applications. Furthemore, new applications will be installed, getting more funcionality in our platform, to have more control in our machines.
To update core-admin software, follow next steps,
1 We click in the top menu, in Core-admin update option
System –> Core-admin update
It is important to close other applications running. Core-admin will inform you in case you will need to do it.
2 We click on Search for core-admin updates
3 Core-admin will search for updates. Next step is to apply them. It is needed to log again in the panel in order to get updates.
Core-Admin is sponsoring next DevOps days 2016 in Kiel (Germany)
See you there! — 2016 May 12-13