Common bugs for RHEL4 update 5 and SLES10
Submitted by saurabh on Thu, 2007-11-15 18:55
This document describes the bugfixes which should be deployed after
installation and licence verification of an Mtracks system. It
contains the bugs for Mtracks 2.6.0 on the RHEL4 update 5 and SLES10
platforms.
- Modify /etc/sysconfig/sendmail
- # cd /etc/sysconfig
- # mkdir -p RCS
- # ls -l sendmail
- Note down the owner, group and permissions.
- The owner should be root, group should be root and
permissions should be 644. - If owner, group or permissions are other than this then
escalate to the Merce dev team. - # ci -l sendmail
- Enter the following comment
revision before changing SENDMAIL_ARGS - _your_name_ - # cp sendmail /var/tmp
- # cd /var/tmp
- # vi sendmail
- Replace the line
SENDMAIL_ARGS="-L sendmail -Am -bd -om"
with
SENDMAIL_ARGS="-L sendmail -Am -bd -q30m -om" - Save and quit
- # diff /var/tmp/sendmail /etc/sysconfig/sendmail
- This output show only the difference of the lines that have been
changed. If it does then go on to the next step else escalate to the
Merce dev team. - # mv /var/tmp/sendmail /etc/sysconfig/sendmail
- # cd /etc/sysconfig
- Restore the owner, group noted earlier, using chown command
- Restore the permissions noted earlier, using chmod command
- Restart sendmail and check via telnet as described here
- Create the account 'junkmail'
- Go to the administrative interface of Mtracks/Merce master
- Go to User database -> employee -> ADD A NEW USER
- After creating the administrative user, create an account with the
following details- Intranet ID:junkmail
- Full Name:junkmail
- Email Id:junkmail
- User code:junkmail
- Location:local
- Mail Server:FQDN of mail server of the organization
- Department:IT
- Rank:Engineer, SE0
- Password:junkmail
- Admin or User:User
- Webaccess:No
- Email Quota:default
- Home Directory Quota:default
- Modify /etc/amavisd.conf
- # cd /etc
- # mkdir -p RCS
- # ls -l amavisd.conf
- Note down the owner, group and permissions.
- The owner should be root, group should be root and
permissions should be 644. - If owner, group or permissions are other than this then
escalate to the Merce dev team. - # ci -l amavisd.conf
- Enter the following comment
revision before adding $spam_quarantine_to and $TEMPBASE -_your_name_ - # cp amavisd.conf /var/tmp/amavisd.conf
- # cd /var/tmp
- # vi amavisd.conf
- Search for '$spam_quarantine_to'
- There will be a comment which describes this variable. Below it add the following line:
$spam_quarantine_to = 'junkmail@DOMAINNAME';
where DOMAINNAME is the domain name of the organization. - Search for '$TEMPBASE'
- Modify the line which initializes '$TEMPBASE' variable to
$TEMPBASE = "$MYHOME/tmp"; - Save and quit
- # diff /var/tmp/amavisd.conf /etc/amavisd.conf
- This output show only the difference of the lines that have been
changed. If it does then go on to the next step else escalate to the
Merce dev team. - # mv /var/tmp/amavisd.conf /etc/amavisd.conf
- # cd /etc/
- Restore the owner, group noted earlier, using chown command
- Restore the permissions noted earlier, using chmod command
- Restart amavis and check via telnet as described here
- If you face any errors in restarting and checking escalate to
Merce dev team.
- Modify sendmail configuration to add masquerade_envelope
- # cd /etc/mail
- # mkdir -p RCS
- # ls -l merce.mc
- Note down the owner, group and permissions.
- The owner should be root, group should be root and
permissions should be 644. - If owner, group or permissions are other than this then
escalate to the Merce dev team. - # ci -l merce.mc
- Enter the following comment
revision before adding masquerade_envelope - _your_name_ - # cp merce.mc /var/tmp
- # cd /var/tmp
- # vi merce.mc
- Add the following line to this file
- FEATURE(`masquerade_envelope')
- Save and quit
- #diff /var/tmp/merce.mc /etc/mail/merce.mc
- This output show only the difference of the lines that have been
changed. If it does then go on to the next step else escalate to the
Merce dev team. - # mv /var/tmp/merce.mc /etc/mail/merce.mc
- # cd /etc/mail
- Restore the owner, group noted earlier, using chown command
- Restore the permissions noted earlier, using chmod command
- # m4 merce.mc > /var/tmp/sendmail.cf
- On SLES10 # diff /etc/sendmail.cf /var/tmp/sendmai.cf
- On RHEL4 update 5 # diff /etc/mail/sendmail.cf /var/tmp/sendmail.cf
- You should see the following output
< R$+ $@ $>MasqHdr $1 --- < R$* < @ *LOCAL* > $* $: $1 < @ $j . > $2
- If you see output other than above then escalate to Merce
dev team. Otherwise move on to the next step - On RHEL4 update 5 # cd /etc/mail
- On SLES10 # cd /etc
- # mkdir -p RCS
- # ls -l sendmail.cf
- Note down the owner, group and permissions.
- The owner should be root, group should be root and
permissions should be 644. - If owner, group or permissions are other than this then
escalate to the Merce dev team. - # ci -l sendmail.cf
- Enter the following comment
revision before adding masquerade_envelope - _your_name_ - # mv /var/tmp/sendmail.cf sendmail.cf
- Restore the owner, group noted earlier, using chown command
- Restore the permissions noted earlier, using chmod command
- Restart and check sendmail via telnet as described here
- If you face any errors in restarting and checking escalate to
Merce dev team.
- Create virusmails directory for amavis
- On RHEL4 update 5 # cd /var/amavis
- On SLES10 # cd /var/spool/amavis
- # mv virusmails virusmails.YYYYMMDD
where YYYY - current year, MM - current month, DD - current day - # mkdir virusmails
- # chown vscan.vscan virusmails
- # chmod 750 virusmails
- Restart and check amavis via telnet as described here
- If you face any errors in restarting and checking escalate to
Merce dev team.
- Set variables in sendmail-rx
- # cd /etc/mail
- # mkdir -p RCS
- # ls -l merce-rx.mc
- Note down the owner, group and permissions.
- The owner should be root, group should be root and
permissions should be 644. - If owner, group or permissions are other than this then
escalate to the Merce dev team. - # ci -l merce-rx.mc
- Enter the following comment
revision before changing sendmail variables queue_la,
refuse_la, max_daemon_children, queuewarn, queuereturn, to_command - _your_name_ - # cp merce-rx.mc /var/tmp/
- # cd /var/tmp
- # vi merce-rx.mc
- Search for 'confQUEUE_LA'
- If you find a line which is like
define(`confQUEUE_LA', - Then replace this line with the following line
define(`confQUEUE_LA',`40')dnl - If you do not find a line which matches the pattern then add
the following line to the file
define(`confQUEUE_LA',`40')dnl - Search for 'confREFUSE_LA'
- If you find a line which is like
define(`confREFUSE_LA', - Then replace this line with the following line
define(`confREFUSE_LA',`60')dnl - If you do not find a line which matches the pattern then add
the following line to the file
define(`confREFUSE_LA',`60')dnl - Search for 'confMAX_DAEMON_CHILDREN'
- If you find a line which is like
define(`confMAX_DAEMON_CHILDREN', - Then replace this line with the following line
define(`confMAX_DAEMON_CHILDREN',`200')dnl - If you do not find a line which matches the pattern then add
the following line to the file
define(`confMAX_DAEMON_CHILDREN',`200')dnl - After adding this line add the following line below it:
define(`confTO_QUEUEWARN', `36h')dnl - After adding this line add the following line below it:
define(`confTO_QUEUERETURN', `2d')dnl - Save and quit.
- # diff /etc/mail/merce-rx.mc /var/tmp/merce-rx.mc
- This output show only the difference of the lines that have been
changed. If it does then go on to the next step else escalate to the
Merce dev team. - # mv /var/tmp/merce-rx.mc /etc/mail/merce-rx.mc
- # cd /etc/mail
- Restore the owner, group noted earlier, using chown command
- Restore the permissions noted earlier, using chmod command
- # m4 merce-rx.mc > /var/tmp/sendmail-rx.cf
- # diff sendmail-rx.cf /var/tmp/sendmail-rx.cf
- The output should show you the change in the values of the
above parameters which have been set. - If you see an output which shows other differences then
escalate to the Merce dev team otherwise move on to the next step. - # cd /etc/mail
- # mkdir -p RCS
- # ls -l sendmail-rx.cf
- Note down the owner, group and permissions.
- The owner should be root, group should be root and
permissions should be 644. - If owner, group or permissions are other than this then
escalate to the Merce dev team. - # ci -l sendmail-rx.cf
- Enter the following comment
revision before changing sendmail variables queue_la,
refuse_la, max_daemon_children, queuewarn, queuereturn, to_command - _your_name_ - # mv /var/tmp/sendmail-rx.cf sendmail-rx.cf
- Restore the owner, group noted earlier, using chown command
- Restore the permissions noted earlier, using chmod command
- Restart and check sendmail-rx via telnet as described here
- If you face any errors in restarting and checking escalate to
Merce dev team.
- Set variables for submit.cf
- # cd /etc/mail
- # mkdir -p RCS
- # ls -l submit.cf
- Note down the owner, group and permissions.
- The owner should be root, group should be root and
permissions should be 644. - If owner, group or permissions are other than this then
escalate to the Merce dev team. - # ci -l submit.cf
- Enter the following comment
revision before changing variables queuereturn, queuewarn - _your_name_ - # cp submit.cf /var/tmp
- # cd /var/tmp
- # vi submit.cf
- Search for 'Timeout.queuereturn'
- If you find a line which is like
O Timeout.queuereturn - Then replace this line with the following line
O Timeout.queuereturn=2d - If you do not find a line which matches the pattern then add
the following line to the file
O Timeout.queuereturn=2d - Search for 'Timeout.queuewarn'
- If you find a line which is like
O Timeout.queuewarn - Then replace this line with the following line
O Timeout.queuewarn=36h - If you do not find a line which matches the pattern then add
the following line to the file
O Timeout.queuewarn=36h - Search for 'O QueueLA'
- If you find a line which is like
#O QueueLA=8 - Then replace this line with the following line
O QueueLA=40 - If you do not find a line which matches the pattern then add
the following line to the file
O QueueLA=40 - Search for 'O RefuseLA'
- If you find a line which is like
#O RefuseLA=12 - Then replace this line with the following line
O RefuseLA=60 - If you do not find a line which matches the pattern then add
the following line to the file
O RefuseLA=60 - Save and quit
- # diff /var/tmp/submit.cf /etc/mail/submit.cf
- This output show only the difference of the lines that have been
changed. If it does then go on to the next step else escalate to the
Merce dev team. - # mv /var/tmp/submit.cf /etc/mail/submit.cf
- # cd /etc/mail
- Restore the owner, group noted earlier, using chown command
- Restore the permissions noted earlier, using chmod command
- Restart sendmail, sendmail-rx and check via telnet as described here
- If you face any errors in restarting and checking escalate to
Merce dev team.
- Correct the ownership and permissions for the following
directories- # chown merce.merce /var/lib/merce/home/merce
- # chmod 550 /var/lib/merce/home/merce
- # chown merce.merce /var/lib/merce/home/merce/.ssh
- # chmod 550 /var/lib/merce/home/merce/.ssh
- # chown mercexfr.mercexfr /var/lib/merce/home/mercexfr
- # chmod 550 /var/lib/merce/home/mercexfr
- # chown mercexfr.mercexfr /var/lib/merce/home/mercexfr/.ssh
- # chmod 550 /var/lib/merce/home/mercexfr/.ssh
- Modify /etc/passwd for uucp user.
- # cd /etc
- # mkdir -p RCS
- # ls -l passwd
- Note down the owner, group and permissions.
- The owner should be root, group should be root and
permissions should be 644. - If owner, group or permissions are other than this then
escalate to the Merce dev team. - # ci -l passwd
- Enter the following comment
revision before changing uucp shell - _your_name_ - # cp /etc/passwd /var/tmp
- # cd /var/tmp
- # vi passwd
- Search for 'uucp'
- You will see a line similar to this line
uucp:x:10:14:uucp:/var/spool/uucp:/sbin/nologin - The last column of this line needs to be changed. Change the
last column of the line /sbin/nologin to /bin/bash
Thus the above line should now look like this
uucp:x:10:14:uucp:/var/spool/uucp:/bin/bash - Please note that you need to change only the last column and
nothing else in this line. - Save and quit
- # diff /etc/passwd /var/tmp/passwd
- This output show only the difference of the lines that have been
changed. If it does then go on to the next step else escalate to the
Merce dev team. - # mv /var/tmp/passwd /etc/passwd
- Restore the owner, group noted earlier, using chown command
- Restore the permissions noted earlier, using chmod command
- Change value of MAXCONN in /etc/mail/mfilter.cf
- # cd /etc/mail/
- # mkdir -p RCS
- # ls -l mfilter.cf
- Note down the owner, group and permissions.
- The owner should be root, group should be root and
permissions should be 644. - If owner, group or permissions are other than this then
escalate to the Merce dev team. - # ci -l mfilter.cf
- Enter the following comment
revision before changing MAXCONN - _your_name_ - # cp mfilter.cf /var/tmp
- # cd /var/tmp
- # vi mfilter.cf
- Search for 'MAXCONN'
- You should see a line which is
MAXCONN: 40 - Replace this line with the following line
MAXCONN: 225 - #diff /var/tmp/mfilter.cf /etc/mail/mfilter.cf
- This output show only the difference of the lines that have been
changed. If it does then go on to the next step else escalate to the
Merce dev team. - #mv /var/tmp/mfilter.cf /etc/mail/mfilter.cf
- # cd /etc/mail
- Restore the owner, group noted earlier, using chown command
- Restore the permissions noted earlier, using chmod command
- Restart mfilter and check via telnet as described here
- Edit /etc/openldap/slapd.conf
- # grep Netldaporg /etc/merce/Siteconfig.sh
- Note down the value of the variable Netldaporg. for eg.
Netldaporg="VAV"
means that the variable Netldaporg has the value VAV. - # cd /etc/openldap
- # ls -l slapd.conf
- Note down the owner, group and permissions.
- The owner should be root, group should be ldap and
permissions should be 640. - If owner, group or permissions are other than this then
escalate to the Merce dev team. - # ci -l slapd.conf
- Enter the following comment
revision before replacing starcom with organization name - _your_name_ - # cp slapd.conf /var/tmp
- # cd /var/tmp
- # vi slapd.conf
- Search for the pattern 'starcom'
- Replace all the values of 'starcom' with the value of Netldaporg
that you had obtained from /etc/merce/Siteconfig.sh - # diff /var/tmp/slapd.conf /etc/openldap/slapd.conf
- This output show only the difference of the line that has been
changed. If it does then go on to the next step else escalate to the
Merce dev team. - # mv /var/tmp/slapd.conf /etc/openldap/slapd.conf
- Restore the owner, group noted earlier, using chown command
- Restore the permissions noted earlier, using chmod command
- Restart ldap and check via telnet as described here
- Change the memory limit of php.ini
- On RHEL4 update 5 # cd /etc
- On SLES10 # cd /etc/php5/apache2
- # mkdir -p RCS
- # ls -l php.ini
- Note down the owner, group and permissions.
- The owner should be root, group should be root and
permissions should be 644. - If owner, group or permissions are other than this then
escalate to the Merce dev team. - # cp php.ini /var/tmp
- # cd /var/tmp
- Search for the pattern 'memory_limit'
- You should see a line which is
memory_limit = 8M ; Maximum amount of memory a script may consume (8MB) - Replace the above line by
memory_limit = 64M ; Maximum amount of memory a script may consume (8MB) - On SLES10 #diff /etc/php5/apache2/php.ini /var/tmp/php.ini
- On RHEL4 update 5 #diff /etc/php.ini /var/tmp/php.ini
- This output show only the difference of the line that has been
changed. If it does then go on to the next step else escalate to the
Merce dev team. - On SLES10 #mv /var/tmp/php.ini /etc/php5/apache2/php.ini
- On RHEL4 update 5 #mv /var/tmp/php.ini /etc/php.ini
- Restore the owner, group noted earlier, using chown command
- Restore the permissions noted earlier, using chmod command
- Reload apache2 and check via telnet as described here
- Change the attachment size of php.ini
- On RHEL4 update 5 # cd /etc
- On SLES10 # cd /etc/php5/apache2
- # mkdir -p RCS
- # ls -l php.ini
- Note down the owner, group and permissions.
- The owner should be root, group should be root and
permissions should be 644. - If owner, group or permissions are other than this then
escalate to the Merce dev team. - # cp php.ini /var/tmp
- # cd /var/tmp
- Search for the pattern 'upload_max_filesize'
- You should see a line which is
upload_max_filesize = 2M - Replace the above line by
upload_max_filesize = 10M - On SLES10 #diff /etc/php5/apache2/php.ini /var/tmp/php.ini
- On RHEL4 update 5 #diff /etc/php.ini /var/tmp/php.ini
- This output show only the difference of the line that has been
changed. If it does then go on to the next step else escalate to the
Merce dev team. - On SLES10 #mv /var/tmp/php.ini /etc/php5/apache2/php.ini
- On RHEL4 update 5 #mv /var/tmp/php.ini /etc/php.ini
- Restore the owner, group noted earlier, using chown command
- Restore the permissions noted earlier, using chmod command
- Reload apache2 and check via telnet as described here
- Remove the contents of the file proxyblock.conf
- On RHEL 4 update 5, # cd /etc/httpd/
- On SLES10, # cd /etc/apache2
- # mkdir -p RCS
- # ci -l proxyblock.conf
- Enter the comment "before removing hotmail and naukri"
- # vi proxyblock.conf
- Remove both the lines which are
ProxyBlock hotmail.com ProxyBlock naukri.com
- Save and quit.
- On RHEL4 update 4, # /etc/init.d/apache2 reload
- On SLES10, # /etc/init.d/httpd reload
»
- Login to post comments
- Printer-friendly version
- Send to friend
http reload is too slow after installation
Sometimes the command
/etc/init.d/httpd reload
takes a lot of time to reload. This is due to DNS resolution failure for the sites in /etc/httpd/proxyblock.conf. By default mtracks installation creates the file /etc/httpd/proxyblock.conf with the following entries
ProxyBlock hotmail.com
ProxyBlock naukri.com
There should not be any entries in this file. The sites should be added from the UI when required.
Proxy misconfigured in apache
apache2 has the following configuration in proxy.conf
According to the above block, if someone tries to access http://server.lab.starcomsoftware.com he should get into the block <Proxy *.lab.starcomsoftware.com>. But this does not happen, he gets into the <Proxy *> block. If we want to use regex we should use it with <ProxyMatch>. The problem that this bug will create is that, if a user does not have web access but he tries to access an internal site of .lab.starcomsoftware.com he will be asked a username and password for <Proxy *> block which does authentication through /opt/merce/adm/passwd/users.db. Hence, he will not be able to view the internal site.
Fix:
with