Overview You may wish to add an additional set of STPs to which 3rd party traffic can be routed, and you wish to know whether adding this additional set of STPs to your current configuration will rout...
Overview You're experiencing an error message in SMS-GW that states localvalue: systemFailure (34) and can see that your client cannot send messages. The full error can be seen in the Screenshot below...
Overview If daylight saving time starts soon, you may wonder if any adjustment or configuration is needed to prepare for it. Information To determine if the servers are already configured for the st...
Overview You are looking for a step-by-step guide on how to use the mysqldump command-line utility to extract information from specific MGR tables. You may then also be looking to restore the tables f...
Overview You may notice that you cannot establish connections to the database. One or more of the following symptoms may be observed: When you run ndb_mgm -e show, the database appears as not connecte...
Overview Your company may have a team dedicated to identifying and fixing security issues (e.g., network security group). They might have detected OS vulnerabilities and need a remediation plan. Inf...
Overview During security scans, one of the security vulnerabilities that can be found is deprecated SSH cryptographic settings. The SSH protocol (Secure Shell) is a method for securing remote login fr...
Overview One of the security vulnerabilities that security scans can detect is a remote management service accepting unencrypted credentials, such as FTP. That happens when services that use basic aut...
Overview Security scans might identify the NTP monlist feature denial of service vulnerability. The Network Time Protocol (NTP) is used to synchronize the time of a computer client or server to anothe...
Overview One possible security vulnerability reported in security scans is Sudo Heap-based Buffer Overflow Vulnerability (Baron Samedit) (Generic). sudo is a program for Unix-like computer operating s...