A workaround would be nice. Any ideas how to create certificates for aliases only, but without the main domain and without warnings about failed certificate requests?
Did you find a solution to this problem? I want to access fail2ban as an additional administrator account in Restricted Mode but I can not find an option for this.
There should be a cronjob configured to remove these files if they are older than 1 month:
$ sudo crontab -l -u psaadm | grep "remove-expired-tokens"
Output should be:
0 0 * * 0 /opt/psa/admin/bin/php -dauto_prepend_file=sdk.php...
You should not deny any characters used for passwords. Instead you have to properly escape the characters where needed. You have to use quotes around the password in .env files for example.
Maybe your mapping is wrong?
This could be the correct mapping:
ProxyPass /wss ws://127.0.0.1:8090/wss retry=0 keepalive=On
ProxyPassReverse /wss ws://127.0.0.1:8090/wss retry=0
The server became unresponsive during or after an kernel update with dracut. Multiple services got stuck in a restart loop as monit was repeatedly starting services that were restarting already (because of the hot/online kernel update).
One of my plesk servers became completely unresponsive (but still running) two times in the last two months. It's also an CentOS 8 VPS.
Reason absolutely unknown.
Please report back if you find the culprit. I will do too.
But they have identical sources listed and `apt` produces warnings on an update. Is it safe to delete one of it? If so, which one?
# cat plesk-ext-site-import.list
deb [arch=amd64] http://autoinstall.plesk.com/PMM_0.1.11 xenial all
# cat plesk-ext-panel-migrator.list
deb [arch=amd64]...