search for: dforeground

Displaying 9 results from an estimated 9 matches for "dforeground".

Did you mean: foreground
2016 Jan 29
2
Apache doesn't display "It works page" under CentOS 7
...e (running) since Fri 2016-01-29 11:16:00 EST; 7min ago Docs: man:httpd(8) man:apachectl(8) Main PID: 18738 (httpd) Status: "Total requests: 0; Current requests/sec: 0; Current traffic: 0 B/sec" CGroup: /system.slice/httpd.service ??18738 /usr/sbin/httpd -DFOREGROUND ??18739 /usr/sbin/httpd -DFOREGROUND ??18740 /usr/sbin/httpd -DFOREGROUND ??18741 /usr/sbin/httpd -DFOREGROUND ??18742 /usr/sbin/httpd -DFOREGROUND ??18743 /usr/sbin/httpd -DFOREGROUND Jan 29 11:15:58 devserver.local systemd[1]: Starting The A...
2015 May 12
2
appdynamics php agent prevented by SELinux
...CESS) Process: 25728 ExecReload=/usr/sbin/httpd $OPTIONS -k graceful (code=exited, status=0/SUCCESS) Main PID: 14840 (httpd) Status: "Total requests: 19; Current requests/sec: 1.2; Current traffic: 614 B/sec" CGroup: /system.slice/httpd.service ??14840 /usr/sbin/httpd -DFOREGROUND ??14844 /usr/sbin/httpd -DFOREGROUND ??14845 /usr/sbin/httpd -DFOREGROUND ??14846 /usr/sbin/httpd -DFOREGROUND ??14848 /usr/sbin/httpd -DFOREGROUND ??14849 /usr/sbin/httpd -DFOREGROUND ??14850 /opt/AppDynamics/appdynamics-php-agent/p...
2015 May 11
3
appdynamics php agent prevented by SELinux
> > If rpm is configured for _that_ location of log files, I would remove the > repository this rpm comes from from configuration and will remember to > never-never ever use that repository for anything. > > Just my $0.02 > Yeah I completely get where you're coming from there. However it's not an RPM from a repo. I downloaded the rpm from the appdynamics site itself.
2020 Aug 31
5
How to Migrate Wordpress Website from 32-bit CentOS Linux 6.3 to 64-bit CentOS Linux 8.2 (2004)
...dnf install php php-fpm php-gd You *MUST* install php-gd, otherwise Apache Web Server cannot execute PHP scripts. # dnf install httpd # systemctl enable httpd # systemctl start httpd [root at centos82 ~]# ps -ef | grep httpd root 33214 1 0 22:03 ? 00:00:00 /usr/sbin/httpd -DFOREGROUND apache 33351 33214 0 22:03 ? 00:00:00 /usr/sbin/httpd -DFOREGROUND apache 33352 33214 1 22:03 ? 00:00:00 /usr/sbin/httpd -DFOREGROUND apache 33355 33214 1 22:03 ? 00:00:00 /usr/sbin/httpd -DFOREGROUND apache 33357 33214 0 22:03 ? 00:00:00 /usr...
2015 Apr 03
2
systemctl (again)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Yet more information: As a test I moved the link /etc/systemd/system/dbus-org.fedoraproject.FirewallD1.service into /etc/systemd/user and reran systemctl daemon-reload. I then rebooted. # ls -l /etc/systemd/user total 4 lrwxrwxrwx. 1 root root 41 Jul 27 2014 dbus-org.fedoraproject.FirewallD1.service ->
2015 Apr 04
0
systemctl (again)
...sr/lib/systemd/system/httpd.service [centos at ipa ~]$ cat /usr/lib/systemd/system/httpd.service [Unit] Description=The Apache HTTP Server After=network.target remote-fs.target nss-lookup.target [Service] Type=notify EnvironmentFile=/etc/sysconfig/httpd ExecStart=/usr/sbin/httpd $OPTIONS -DFOREGROUND ExecReload=/usr/sbin/httpd $OPTIONS -k graceful ExecStop=/bin/kill -WINCH ${MAINPID} KillSignal=SIGCONT PrivateTmp=true [Install] WantedBy=multi-user.target On 4 April 2015 at 00:07, J Martin Rushton <martinrushton56 at btinternet.com> wrote: > -----BEGIN PGP SIGNED MESSAGE-----...
2018 Sep 09
1
Type enforcement / mechanism not clear
On 09/09/2018 07:19 AM, Daniel Walsh wrote: > sesearch -A -s httpd_t -t system_conf_t -p read > > If you feel that these files should not be part of the base_ro_files > then we should open that for discussion. I think the question was how users would know that the policy allowed access, as he was printing rules affecting httpd_t's file read access, and looking for
2015 Apr 04
2
systemctl (again)
...md/system/httpd.service > > [Unit] > > Description=The Apache HTTP Server > > After=network.target remote-fs.target nss-lookup.target > > > [Service] > > Type=notify > > EnvironmentFile=/etc/sysconfig/httpd > > ExecStart=/usr/sbin/httpd $OPTIONS -DFOREGROUND > > ExecReload=/usr/sbin/httpd $OPTIONS -k graceful > > ExecStop=/bin/kill -WINCH ${MAINPID} > > KillSignal=SIGCONT > > PrivateTmp=true > > > [Install] > > WantedBy=multi-user.target > > > > On 4 April 2015 at 00:07, J Martin Rushton >...
2008 May 06
15
Unix Domain Sockets + Fork for improved scalability
Hello All, Ticket #30 (http://mongrel.rubyforge.org/ticket/30) has a set of changes to mongrel that I''ve written on behalf of my employer, Raritan Computer, Inc. Also, these changes are released under the existing Ruby license used for Mongrel. Raritan is using mongrel internally for product development and was not able to get the level of scalability desired due to limitations