Sysadmin

12 readers
1 users here now

A reddit dedicated to the profession of Computer System Administration.

founded 2 years ago
MODERATORS
251
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/TexasJoey on 2024-01-21 17:25:37+00:00.


I have an engineering client who wants to RDP into his high-performance workstation at the office. I have him connecting to the internal network with VPN and then using the defacto 'mstsc' program to connect to his physical desktop. Much of his work involves a CAD program that utilizes the system's GPU, but when connected via RDP the system defaults to emulated (poor performing) graphics. There are lots of guides out there for forcing use of the GPU when connecting remotely. I've made a slew of local group policy changes but nothing seems to work. One thing we did notice is that if he starts the CAD program locally, leaves it open, then later connects remotely via MSTSC, the program retains its GPU performance. However, if the program is closed and then re-opened remotely the GPU performance reverts to emulated.

Has anyone else encountered and successfully overcome this issue?

Edit... changed the word "registry" to "local group policy"

252
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/iceland46 on 2024-01-21 16:16:50+00:00.


Not something I usually do and just need a very inexpensive way to just basically know if a laptop is ON, maybe last time a worker logged into it. If I can see the location of it would be amazing.

Something like a cloud anti-virus that maybe gives all this info??

This is for a small company, maybe 15 laptops. No IT budget. This isn't corp America lol. SMB problems here.

Again I don't normally handle something like this so any ideas are very welcome.

Thanks

253
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/sageRJ on 2024-01-21 16:08:18+00:00.


Trying to determine a good frequency to be performing consistency checks. We have quite a few storage servers and the LSI MegaRaid cards are configured by default to perform a patrol read and consistency check once a week. If these arrays were of a smaller size, I’d just leave the default schedules alone. My worry is that due to the size, and therefore time it takes to compete, it’s doing more harm than good.

Each server has 46 18TB hard drives spread across two RAID6 arrays, each totaling 327TB. The patrol reads take 1-2 days and the consistency checks take 3-4 days to complete. It’s CCTV storage, so they’re being written to close to 24/7 if that matters. Basically, the arrays are spending a majority of the time checking themselves. I’d like to switch the consistency checks over to once a month, and was looking for some insight as to whether or not that’s a good idea.

I don’t have a lot of experience with hardware raid. And realize the answer is probably that it depends on a lot of things. But just in case, I wanted to make sure there wasn’t some general consensus on this. Like that it should absolutely be doing the check at least once a week. Or no, once a month is completely fine.

254
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/Cheese-Owl on 2024-01-21 14:50:40+00:00.


The staffing agency called me on Friday evening, and they explained how their original candidate that they originally submitted had failed a background check. They called and asked if I could start ASAP, as early as next week. The recruiter liked my willingness to work, submitted my profile and scheduled me to interview on early Monday morning. They were ready for me to interview on Friday and start me on Monday, but the company didn’t have time to interview me on Friday. The recruiter is hoping that the interview goes well and that I can start on Wednesday.

Is this a good sign? It is a short term contract but they talked about possible extensions, plus it pays very well. LinkedIn shows there to be 140 applicants but am not sure how many of them are real, qualified or ready to start immediately.

255
1
On Communication (zerobytes.monster)
submitted 11 months ago by [email protected] to c/[email protected]
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/General_Importance17 on 2024-01-21 11:55:03+00:00.


EDIT: TLDR for all you poor "reading-is-hard" people, courtesy of u/themastermatt: "People who cant communicate work for people who can."

EDIT2: Another nice TLDR from u/SlapcoFudd: "Work on your soft skills, you smelly nerds."

DISCLAIMER

I want to rant about communication. Most IT professionals can’t communicate for shit, so here it goes. This is a rant so I won’t sound very friendly, and obviously these words don’t apply to every single one of you here. So just pretend I’m u/crankysysadmin and you’ll be fine ;-)

INTRODUCTION

In many cases, people go into IT because it’s what they were doing in their youth anyway, which in turn is because they had a hard time dealing with people. It’s a self-reinforcing feedback loop, a vicious circle which leads to your being today what I like to term a “professional autist”, someone who lives in the corporate world despite the absence of social skills. So there are a couple of things that I want you to understand.

First, communication is a learned skill. You heard that right. It’s not something some people were magically gifted with and others just weren’t. It’s something you learn and understand and practice. You’re constantly figuring things out on the fly and getting proficient with new technology, so there is absolutely no reason for you to not become good at this.

Second, communication is an important skill. Possibly the most important skill you could ever learn in your life. It’s universally useful no matter what you’re currently doing, and it will drastically improve the QoL for yourself and for everyone around you.

Third, communication is only superficially about exchanging information, and is actually much more about understanding perspectives and viewpoints. You might think what your interlocutor thinks is stupid, but his thoughts are the result of a reasoning, which is the result of the presence (and lack) of specific information. How can you address his concerns if you don’t understand where they’re coming from?

So, here’s a couple of things for you to take with you, maybe mull over, and start actively paying attention to.

ON SMALLTALK

You might consider smalltalk as this pointless waste of time people do. Start viewing it as the useful tool that it is. The reason every interaction must start by exchanging meaningless pleasantries is because it allows you to gauge your interlocutor’s mood and frame of mind. It will allow you to see whether he is happy or angry and everything inbetween, which is invaluable for tailoring your subsequent speech when discussing the thing you’re here to talk about.

Learn to conduct the kind of superficial and meaningless smalltalk you so despise. Have a 30-60 second conversation with everyone you encounter. Ask them if those are new shoes they’re wearing, complain about how hot/cold it is, I really don’t care and neither do they. Get your practice in until you sound natural.

ON CONTEXT

Anything we say is stated within a specific context, context which is usually fully implicit. Certain things matter, others don’t. Some things you know, and some you don’t. You consider some things a given, and others not. Only in the rarest cases will you share this implicit context with your interlocutor.

So what does this mean for you? Figure out where the other person is coming from, and adapt your speech accordingly. Simplify areas that aren’t relevant. Elaborate on areas that are. Make an effort to understand the other person’s perspective, where their priorities are coming from, what they are worried about, what are their view on, and understanding of, the matter at hand. Then, make an effort to bridge this gap between your perspective and his, by helping him understand yours aswell. Only then can you come to a fruitful exchange with a mutually satisfying conclusion.

ON CONTENT

You might be tempted to give people any and all information in your posession. That is a mistake, and I can tell you from experience that it is very tiring. I don’t care about how you found the problem, but I can’t tune out your droning either in case some actually important piece of information is buried in the middle of it.

You might think that you’re giving them the full picture, but what you’re actually doing is infodumping them without any regard to their priorities, their worries, their issues, etc, and requiring them to spend significant effort just parsing this waterfall of TLDR you’re currently spamming them with. Stop it. Focus. What is important to them? Which information matters and which doesn’t?

ON EXPECTATIONS

Since you might now be tempted to explain DNS to your project manager since “you said he needs to understand my perspective”: You are one of the company’s SMEs. You are being paid to understand and deal with $thething, so that other people don’t have to. They don’t want to deal with $thething, and they shouldn’t have to, because that’s your job. They don’t even need to understand $thething. That again is your job, understanding it and presenting it to them in a way that makes sense.

So when they come to you about $thething, what you will not do is expect them to develop the same level of insight and expertise that you have. Rather you will help them make the right decisions for their own situation, by giving them rundowns and abstracting things away. These are the options, these are their consequences. This is the good, this is the bad, these are the risks and their potential fallouts. They don’t give a fuck about the intricacies of MDM and never will, and they’re not supposed to anyway.

ON PROVIDING SOLUTIONS

Sometimes people will come to you with requests that can’t be fulfilled. What they want might be technologically stupid. It might be organizationally impossible. Or it might simply require way more time and effort than you could spare. So you reject their request, and snicker to your colleagues about “that dumbass wanting something stupid again”. Except the dumbass here is you.

Why did they ask for this thing that is stupid? What made them think that was the right solution to their problem? What in fact is their problem in the first place? What are alternative, more sensible approaches that they could pursue? You let your users run against walls and then wonder why you have a reputation for being unhelpful. Start solving problems instead of addressing things at face-value. See also: XY problem.

ON REPUTATION

Speaking about reputation, it might just be the most precious thing in your professional life, it is the lens through which people view you and your actions, and the frame of reference in which they will approach you. Any contrast between your reputation and your actual actions is automatically mentally justified by those you interact with.

If you are reputed to be an unhelpful prick, then that is who you are. And even if you’re not, they will think your boss is forcing you to be nice to them, or some other thing along those lines. Similarly, if you are reputed to be kind and helpful, the justifications for your not having been any help will flow aswell: maybe you’re just having a bad day.

CLOSING WORDS

There are a litany of other aspects one could touch on, all I’ve done here is barely scratch the surface. If you continue to let your communication skills atrophy, you will always be left by the wayside, excluded from decision-making and other such meetings, and will always feel underappreciated. All this for the simple reason that there is more to life than just systems and networks.

Also AmA about communication and human relations and soft-skills and such I guess.

256
1
Azure/o365 Issues (zerobytes.monster)
submitted 11 months ago by [email protected] to c/[email protected]
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/Due-Builder-6684 on 2024-01-21 10:25:46+00:00.


Lost all my Defender for Identity sensors within the last hour? Is anyone else seeing disruptions?

257
1
Logical next step (zerobytes.monster)
submitted 11 months ago by [email protected] to c/[email protected]
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/overwhelmed_nomad on 2024-01-21 10:08:50+00:00.


Hi,

I'm trying to figure out what my logical next step should be both for personal growth and to help the business I currently work for.

I've got a solid understanding of networking, configuring firewalls, switches, WIFI set ups etc. I'm very familiar with Windows, O365 etc. Reasonable with Linux, mainly Ubuntu servers. Reasonable understanding of Azure and AWS. I've got myself to a place where I am pretty comfortable with Terraform having created lot's of resources in Azure and AWS and also importing our remaining infrastructure into Terraform, storing the configs in git and the backend encrypted in Azure blob storage.

I want to get even more focused on working with cloud technology and IAC but I am looking for the next technology I should be learning to move upwards in the world. Should I be learning some CI/CD tools? How does that even fit in with Terraform. My current environment is quite static, we have a lot of applications on VM's that haven't been moved to containers yet. Maybe that's another avenue I should look at? I've never been a dev type really. I have basic python skills I wouldn't even know where to begin with that side of things.

Of course every organisation differs but what tends to be the hand off point? Developers write the code, compile it then hand it over to the team that creates and deploys the containers? Or do devs often create the container image and then hand it over to the team that deploys it? Presumably this is all done via some kind of automation. I'm just a bit lost at the moment.

I feel like Docker/kubernetes and some kind of CI/CD tool would be ideal next steps for me to move in the direction I want. I learn well from books so maybe someone out there has some reccomendations on books that could point me in the right direction.

258
1
SAGE BOB 50 (zerobytes.monster)
submitted 11 months ago by [email protected] to c/[email protected]
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/Time-Mountain-9848 on 2024-01-21 09:35:11+00:00.


Hello everyone, I'm contacting you regarding the SAGE BOB 50 accounting software. A company does not need a server except to use SAGE BOB. Is there a way to use this software on several computers (4) without having a server? The cost of a server seems excessive for the use of a single program. If not, what would you recommend as an efficient and cost-effective server for this purpose? At the moment, we've contacted a number of companies to get quotes for servers. Unfortunately, they seem to be too powerful for our needs, and therefore far too expensive (several thousand) to store just a few gigabytes. I look forward to reading your comments and wish you all the best!

259
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/tiskrisktisk on 2024-01-21 09:18:53+00:00.


I’m looking for a solution where we can limit Windows computers to a few key applications and save files to a limited number of folders. Hope to lock down the desktop with only a few applications as well.

Is a type of Kiosk mode what I’m looking for or is there another name for this type of configuration or application?

I sysadmin for a small non-tech business chain with 20 locations. All computers are maintained individually. The main computer in each location is in the manager’s office and we want to replicate the experience between locations.

We’d like all the computers to organize and operate almost identically. Desktop shortcuts, browser bookmarks, limited internet access, same folder paths. Central management is a plus but not a must.

We had started looking at the Windows Kiosk mode, toying around with Fences, looking at Hexnode or InTune, but I’m not sure if a “Kiosk” is the best description for this.

Am I looking in the right direction?

260
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/maxcoder88 on 2024-01-21 07:51:42+00:00.


Hi,

I’m also finding that 2024-01 CU update for server is failing on servers due to the same issue. Recreating the recovery partition seems to fix the problem, when its possible. Some vms have a recovery partition before the system partition and the partition is too small, which seems to be the issue.

Is it a viable way to do it on 500+ servers?

In our case, our VMware Template has not got a NO recovery partition.

I don’t see the purpose of us creating a recovery partition to patch a vulnerability that currently doesn’t exist for us…

I have 10 Windows 2022 servers without recovery partitions that all failed to install this KB. It makes no sense for me to create a vulnerability to just patch it…

thanks,

261
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/jameseatsworld on 2024-01-21 06:36:36+00:00.


Microsoft hit with password spray attack that resulted in multiple internal email accounts being compromised.

Something that should be easily mitigated by MFA and Conditional Access.

I've had execs complain they can't access email via some random 3rd party mail client or that MFA is too annoying, thankfully I can just tell them that Microsoft changed something and we can't disable it.

I guess you can't do that when you work there.

262
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/DaRockwilda83 on 2024-01-21 06:18:22+00:00.


I get the error "Unsupported browser" on some clients after installing the application. Does anyone know of this case?

The login to the application is possible without any problems after installation, but as soon as the software opens, the error appears.

  • Edge and Chrome are installed in the latest version

  • Edge WebView 2 is also installed

  • Default browser changed from Edge to Chrome and back again

  • Host process in the config file also already manually adjusted to Edge / Chrome

263
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/TheDeathPit on 2024-01-21 04:36:13+00:00.


Hello Everyone,

Can someone please tell me how to change the font size in the SSH Browser in MobaXterm:

TIA

264
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/bluecopp3r on 2024-01-21 04:10:57+00:00.


Greetings admins. If you have administered the domain for business that for what ever reason had to rename itself, how did you handle that change? Did you keep the original domain or did you have to rebuild it? If you had to rebuild it, what was that like?

265
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/alee1449 on 2024-01-21 03:32:16+00:00.


I am currently in a trade program that does IT (or known here in Quebec as "Computing Support") Page here

Should I be getting CompTIA A+? I have seen my classmates getting their A+ already and personally I was considering doing it. Also my teacher was recommending to get it at some point.

I am not new to computers as I have been experiencing with them since I was little, been tinkering around Linux for a long time, and managing my own servers.

266
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/kelemvor33 on 2024-01-21 02:51:45+00:00.


Hi,

I have a bunch of old SATA drives that I need to wipe. I will be connecting them to a laptop via an external USB drive dock thing. I want to run something on the laptop to the wipe the external drive. I haven't had to wipe drives in forever so, is DBAN still the standard thing to use for that? Is there something else I can just run from within Windows? I thought DBAN had to run from a flash drive but maybe that's changed?

Anyway, just looking for recommendations. I don't need something that DoD approved or anything like that. Just something to mostly make sure the data is gone.

Thanks!

267
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/BoringTone2932 on 2024-01-21 01:31:27+00:00.


I often find myself referencing Layer 2, Layer 3, and then Layer 7 of the OSI model in troubleshooting.

However, rarely do I think “this is a layer 4, or layer 5 problem”.

What examples of problems would you give for layers 4 - 6?

Layer 1: Ethernet cord is broke

Layer 2: Switch is bad

Layer 3: Interface port on the wrong VLAN

Layer 4 - 6?

Layer 7: Bug in the software code.

268
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/jeromyhensley on 2024-01-21 01:29:36+00:00.


We’re running 12x MX7000 chassis spread across 3 chassis groups. Our chassis configuration is 1x 9116n switch, 1x 7116 in the lead and backup chassis with the member chassis running 2x 7116.

Our 9116n switches go to our network core and for storage the 9116n connect to our brocade fiber channel switches via breakout cables.

Curious to know how others have their mx7000 environments architected.

Also what monitoring solutions work good for 9116n switches?

269
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/Aronacus on 2024-01-21 00:03:17+00:00.


My project closed Friday as a "Failure!"

What was it you ask? Migrate 500 MacBooks from one MDM to another with ZERO USER IMPACT!/ No user interaction, Not even a reboot! Not even a button press. It's all supposed to be "behind the scenes and magical"

Of course it's impossible. Not a single vendor call took place without uneasiness or nervous laughter.

Anyone else tired of pushing the Boulder up the mountain for people who think it's just a grain of sand?

Tell me about it, misery loves company!

270
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/unhappy_sysadmin on 2024-01-20 23:59:32+00:00.


Hey all, I've been re-doing the shared folders of a file server that is being used by one of my departments. Previously they were mapped directly to the server (\srv-name\Share) and the XX GB free of XX GB text under the blue bar that shows disk capacity was shown. After I re-mapped the drive to point to my DFS-N Folder (\my.domain.local\DFS_SRV\Share) it does not show the XX GB free of XX GB text under the blue bar, BUT it shows the correct capacity when I hover over the bar.

Here is the image of the "error":

I checked the permissions and they are correct, checked the DFS-N using dfsdiag /testreferral /DFSpath:\\contoso.com\MyNamespace and it all came clean and working as intended. I also checked with my colleague if it is just me or does it happen to him too, and it does.

I flipped the whole Google over to search for some potential solutions, but no luck.

I also have another DFS Namespace set up for another share and the capacity shows correctly in Explorer as shown in the picture above. The configuration is almost identical, except for the share name, on the right one the share name is SOMETHING$ , on the left one the share name is SOMETHING.

If anyone has any ideas or if you already had this issue and resolved it, please let me know!

Thank you in advance!

271
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/jdrzejb on 2024-01-20 22:08:16+00:00.


Hey,

I had a meeting with a prospect that is in dire needs of some IT support. They never had proper counsel, just break-fix computer salesman. I was refered to them by my current client, because they wanted to get their invoicing system on owners laptop and their usual guy was not returning the calls.

They are quite small wholesaler, currently with one POS system. It turns out that whole company MSSQL database (around 600mb of transaction logs, inventory data) lies on this one 11 year old Dell Optiplex 9020 (Windows 10). There are no passwords on computer, db and invoicing program. An offsite backup is setup, but it has been erroring out for past 3 years (!), as nobody was doing any monitoring for that. Employees use this computer for personal stuff, like online shopping, email.

The network is in equal shape. There are multiple TP-Links WR841N placed around the shop, with no indication which is the main one with WAN connection. They are just chained (each of these has some device connected - I did not have time for full investigation to untangle this).

I talked with owners, I explained to them that this situation is no bueno and is exposing them to a lot of risk. Especially that they told me that that whole company might be on a brink of existence in case something happens to the data on main machine where they have everything.

They asked me to take care of this, having in mind that they are expanding the company and will be opening a new location later this year, along with new hires. They will need to have this db accessible in both locations (warehouse inventory management). They also asked to be onboarded as my permanent client where I'll be taking care of everything on regular schedule, not only when there is an issue. I am to send them an initial plan and quotes next week. They are aware that there might be some cost involved at the beginning, having to replace/buy some of the devices and pay for my work. They seemed to be more than ok to do this.

I've been building a plan in my head and I have following insights/action points:

  1. I do not trust this network, thus I will not open the MSSQL server for the laptop, until I know each other device that could potentially access it. The idea is to bring a proper firewall with dns filtering, dpi/dps, smart queues (pfsense or uxg-lite - I do have controller for some customers already). Also necessary switches and access points to cover the area.
  2. I need to decentralize the MSSQL server. It might be hard to squeeze a racked server into current building, thus I was thinking of moving the sql to Azure.

What I worry is that the internet speed might be a blocker: they only have a radio one with around 25/10 speeds. Only the new location, around half a mile away will have a fiber connection (we might use radio to transmit this link between buildings and bring proper speeds, but that's not a solution for today). Is a fully cloud based solution with VDI a good idea, or should I find a place for this on-prem server anyway? On-prem is how I usually do this with this kind of business and this very specific software that needs this type of db. 3. I need to set up a proper backup solution. I usually went with Synology ABB + Backblaze B2 for setups this size, but given the possibility of full cloud setup, is this a good idea? Veeam free (up to 10 endpoints) could also cover some of the requirements here. 4. The Optiplex is too old to be reliable in the long run, so we need to replace it sooner or later, especially that they need a second POS - I can get them matching ones. 5. Because they actually need a proper company email (they've been using free online service, which has TONS of spam) and Microsoft Office, I wanted to get MS365 BP for whole team, as it also includes Intune, Entra and Defender for Endpoint. 6. Last, but not least: document everything I do, let them know whatever I do take care of, will have a proper piece of note attached.

Do you have any other thoughts or suggestions on what I should focus? Does my plan sound ok, anything you'd add? I'll appreciate any input here.

272
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/-dumbtube- on 2024-01-20 19:21:41+00:00.


I've been trying to wrap my head around this issue for about a month now. Our quarantine folder gets around 200-500 hits a day from emails sent to/from this domain, since employees in China use the Chinese domain name to email employees in the US.

I've tried allow-listing the domain in O365 Defender and creating mail flow rules in Exchange Online but no dice. I contacted Microsoft about it but they don't offer any useful advice.

Exchange Mail Flow Rules

When the emails are viewed in quarantine they get marked as "DMARC Spoofing" which I don't understand, since our Chinese domain has proper DMARC setup. At least that's what MXToolbox says. It appears that both the primary and secondary MX records are present in the "UCEPROTECTL3" blacklist, but this is likely just due to qq.com.

I've been considering pretending that the domain is a phishing simulation domain like KnowBe4 to bypass Defender like in this article but i'm unsure where to even start, since qq.com is such a massive email provider.

Any help or advice would be much appreciated.

273
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/j5kDM3akVnhv on 2024-01-20 19:19:31+00:00.


I've been reading about best security practices for break glass accounts and the suggestion of "2 envelopes" came up.

Must have a complex password, preferably split into two parts, stored in envelopes at two different secure locations in fireproof safes.

This may be a little anachronistic in this post-Covid world?

Our organization gave up our rented office space as no one was using it anymore and our sysadmins are generally spread across a state. We are a 100% WFH organization now.

Is this still a thing? Any recommendations for doing something similar without the "fireproof safe" aspect?

274
1
IP phones (zerobytes.monster)
submitted 11 months ago by [email protected] to c/[email protected]
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/Soft-Hamster2909 on 2024-01-20 19:14:15+00:00.


Looking for a good, lower cost ip phone system. Cloud-based would be preferable. Probably around 50 to 70 soft phones for a new office. Any recommendations? Thank you!

275
 
 
This is an automated archive.

The original was posted on /r/sysadmin by /u/Ragepower529 on 2024-01-20 16:03:34+00:00.


So just wondering how many of us saw insider info or memos and pretended that nothing was seen. I had an event in the past 6 months that could have easily netted me 40% returns or over 1500-4000% depending on what options I would have bought. Although there was a less then 15 minute time frame to react so i couldn’t really do anything without risking serious consequences, not to mention not thinking about the choices fully.

Edit to clarify it was information that was going to go public and when it did the stock price spiked 20%

view more: ‹ prev next ›