Restart The Sun Storage Common Array Manager

Jalan di windows

> %SystemDrive%\Sun\WebConsole\bin\smcwebserver stop
> %SystemDrive%\Sun\WebConsole\bin\smcwebserver start
> net stop Sun_STK_FMS
> net start Sun_STK_FMS


Cara hapus disconnected mailboxes di Server Exchange 2010

List mailbox databases guid
> Get-MailboxDatabase |ft Name, Guid

List disconnected mailboxes in a specific database
> Get-MailboxStatistics -Database | Where-Object {$_.DisconnectDate -Notlike $NULL} | FL DisplayName, DisconnectDate, MailboxGuid

Delete a specific disconnected mailbox
> Remove-Mailbox -Database “” -StoreMailboxIdentity -confirm:$false

Delete all disconnected mailboxes in a specific database
> $users = Get-MailboxStatistics -Database “” | where-object { $_.DisconnectDate -ne $null } | Select DisplayName,MailboxGuid,Database

> $users | ForEach { Remove-Mailbox -Database $_.Database -StoreMailboxIdentity $_.MailboxGuid -confirm:$false }

Let’s Encrypt SSL Certificate di Webserver NGINX (Ubuntu & Debian)

apt-get -y install git
cd /usr/local/
git clone
git clone
cd /usr/local/certbot/
./certbot-auto certonly –agree-tos –rsa-key-size 4096 –renew-by-default -m –webroot -w /var/www/ -d –renew-by-default


– Congratulations! Your certificate and chain have been saved at
/etc/letsencrypt/live/ Your cert
will expire on 2016-10-20. To obtain a new or tweaked version of
this certificate in the future, simply run certbot-auto again. To
non-interactively renew *all* of your certificates, run
“certbot-auto renew”
– If you lose your account credentials, you can recover through
e-mails sent to
– Your account credentials have been saved in your Certbot
configuration directory at /etc/letsencrypt. You should make a
secure backup of this folder now. This configuration directory will
also contain certificates and private keys obtained by Certbot so
making regular backups of this folder is ideal.
– If you like Certbot, please consider supporting our work by:

Donating to ISRG / Let’s Encrypt:
Donating to EFF:


Konfigurasi di Webserver NGINX

vi /etc/nginx/sites-available/default

ssl on;
ssl_certificate /etc/letsencrypt/live/;
ssl_certificate_key /etc/letsencrypt/live/;
ssl_session_timeout 5m;
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
ssl_prefer_server_ciphers on;
ssl_dhparam /etc/nginx/ssl/dhparams.pem;

mkdir /etc/nginx/ssl
cd /etc/nginx/ssl
openssl dhparam -out dhparams.pem 2048
/etc/init.d/nginx restart

Kemudian testing SSL di

FDSocket closed dari Bacula Server ke Bacula Client

Gue bingung bacula-client config normal dan gak ada error, ditelnet ke localhost port lokal juga masuk tapi kok error koneksi ke bacula-client dari server bacula.

Dari client ke localhost

# telnet localhost 9102
Trying ::1…
Connected to localhost.
Escape character is ‘^]’.
telnet> quit
Connection closed.

Dari server ke client

# telnet 9102
telnet: Unable to connect to remote host: Connection refused


Setelah diselidiki ternyata LISTENnya cuma bukan

root@hris:/etc/bacula# netstat -tulpn | grep LISTEN | grep 9102
tcp 0 0* LISTEN 20526/bacula-fd

Akhirnya biar jadi (All IP address), kasih komentar aja bagian FDAddress nya

FileDaemon { # this is me
Name = hris-fd
FDport = 9102 # where we listen for the director
WorkingDirectory = /var/lib/bacula
Pid Directory = /var/run/bacula
Maximum Concurrent Jobs = 20
# FDAddress =

Bacula error UA Hello from client atau Unable to authenticate console “*UserAgent*”

Pesan Email Bacula error

ERROR in authenticate.c:415 Unable to authenticate console “*UserAgent*” at client:


ERROR in authenticate.c:303 UA Hello from client: is invalid. Len=0

Solusi sementara, tambahkan !error pada messages bacula-dir.conf

Messages {
Name = Standard
mailcommand = “/usr/sbin/bsmtp -h -f \”\(Bacula\) \\” -s \”Bacula: %t %e of %c %l\” %r”
operatorcommand = “/usr/sbin/bsmtp -h -f \”\(Bacula\) \\” -s \”Bacula: Intervention needed for %j\” %r”
mail = = all, !skipped, !error
operator = = mount
console = all, !skipped, !saved
append = “/var/log/bacula/bacula.log” = all, !skipped
catalog = all