# curl -s $(da api-url)/api/system-info/fs | jq .
[
{
"device": "/dev/vda1",
"mountPoint": "/",
"fileSystem": "ext4",
"totalBytes": 82944933888,
"availableBytes": 16258412544,
"reservedBytes": 4260466688,
"usedBytes": 62426054656
}
]
Great! Will that show in bytes as shown? Or will MB or GB be used in the GUI?show disk usage information
root:root
ownership for the server certificate files:cakey=/usr/local/directadmin/conf/cakey.pem
cacert=/usr/local/directadmin/conf/cacert.pem
carootcert=/usr/local/directadmin/conf/carootcert.pem
/usr/local/directadmin/data/users/*/domains/domain.com.key
used to have and continues to have diradmin:access
ownership.directadmin.com
?@unihostbrasil, latest release (compared to earlier DirectAdmin versions) started usingroot:root
ownership for the server certificate files:
These TLS certificates and key are only used by the DirectAdmin service (for server name certificate). When CustomBuild copies these certificates to other services like apache, nginx, exim,... it changes the permissions as needed.
cakey=/usr/local/directadmin/conf/cakey.pem
cacert=/usr/local/directadmin/conf/cacert.pem
carootcert=/usr/local/directadmin/conf/carootcert.pem
All user owned domain certificates in/usr/local/directadmin/data/users/*/domains/domain.com.key
used to have and continues to havediradmin:access
ownership.
Could it be that DirectAdmin is configured to use single domain certificate as server hostname certificate indirectadmin.com
?
directadmin.conf
should be for server host name.directadmin.conf
).#!/bin/bash
## watch out! added 'domain1.tld', 'mail.domain1.tld'
/usr/local/directadmin/scripts/letsencrypt.sh request 'host.maindomain.tld','webmail.maindomain.tld','mail.maindomain.tld','maindomain.tld','www.maindomain.tld','mail.domain2.tld','domain2.tld','mail.domain3.tld','domain3.tld','mail.domain1.tld','domain1.tld' 4096;
# wait until installed, then run:
sleep 300;
\cp /etc/httpd/conf/ssl.key/server.key /usr/local/directadmin/conf/cakey.pem;
\cp /etc/httpd/conf/ssl.crt/server.crt /usr/local/directadmin/conf/cacert.pem;
\cp /etc/httpd/conf/ssl.crt/server.ca /usr/local/directadmin/conf/carootcert.pem;
\cp /etc/httpd/conf/ssl.crt/server.crt.combined /usr/local/directadmin/conf/cacert.pem.combined;
chown diradmin:access /usr/local/directadmin/conf/ca*;
# wait;
sleep 10;
/usr/local/directadmin/custombuild/build litespeed;
# wait;
sleep 60;
killall lsphp;
# wait;
sleep 30;
/usr/local/directadmin/custombuild/build rewrite_confs;
# wait;
sleep 30;
service directadmin restart;
root:root
of the cert files in /usr/local/directadmin/conf/
in my script this weekend..Release | Release date | End of life | |
---|---|---|---|
MySQL 8.3 | January 16, 2024 | April, 2024 | |
MySQL 8.2 | October 25, 2023 | January, 2024 | |
MySQL 8.1 | June 21, 2023 | October 25, 2023 | |
MySQL 8.0 (LTS) | April 19, 2018 | April, 2026 | |
MySQL 5.7 | October 21, 2015 | October 21, 2023 | |
MySQL 5.6 | February 5, 2013 | February 5, 2021 | |
MySQL 5.5 | December 3, 2010 | December 3, 2018 | |
MySQL 5.1 | November 14, 2008 | December 31, 2013 | |
MySQL 5.0 | January 9, 2012 |
Mysql on these servers is managed through cloudlinux, not directadmin.All releases
Release Release date End of life MySQL 8.3 January 16, 2024 April, 2024 MySQL 8.2 October 25, 2023 January, 2024 MySQL 8.1 June 21, 2023 October 25, 2023 MySQL 8.0 (LTS) April 19, 2018 April, 2026 MySQL 5.7 October 21, 2015 October 21, 2023 MySQL 5.6 February 5, 2013 February 5, 2021 MySQL 5.5 December 3, 2010 December 3, 2018 MySQL 5.1 November 14, 2008 December 31, 2013 MySQL 5.0 January 9, 2012
Thanks for your answer, I have updated to 1.663 but the same issues persist. I will open a ticket.@ViAdCk, try upgrading to DA 1.663. This version has new option to skip database size checking. It helps speedup database list load times for users with a lot of databases. This version also has internal optimizations to load DB list faster.
If you still have problems please open a support ticket. It could be specific to your server configuration.
Has this ever been fixed anyways? I noticed that our servers are throwing this error now in a lot of our plugins;. What has been changed to login_keys? I noticed this issue in June but reverted to a older da version since there is off course nothing in the change logs that something is changed with this. This server updated now to 1667 and cant revert anymore. So what do we do to fix this issue with login keys?@Access_Denied, this is a different issue. All other CMD_.. API endpoints are still processed by the old engine, only the databases management related endpoints are transferred.
Could you please open a ticket so we could get more information about the way you use API?
@ItsOnlyMe, there were some changes to make DA more backwards compatible with incorrect API usage. If the problem still persists in DA 1.667 it should be something different. We could investigate this further but we need access to a machine where we could investigate what causes such problems. It is likely that the plugins were using API in a way that we consider incorrect. If we knew exact usage pattern we could then decide to either support such usage pattern or give hints on how to change API client to stay compatible.
<?php
require 'httpsocket.php';
class DaHelper
{
private $_socket;
public function __construct($user, $pass = "") {
$this->_socket = new HTTPSocket();
$this->_socket->connect('ssl://'.gethostname(), 2222);
if (empty($pass) === true) {
$this->_socket->set_login($user);
} else {
$this->_socket->set_login($user, $pass);
}
}
public function callApi($command, $args = array(), $raw = false) {
$this->_socket->set_method('GET');
$this->_socket->query('/'.$command, $args);
if ($raw === true) {
$result = $this->_socket->fetch_body();
} else {
$result = $this->_socket->fetch_parsed_body();
}
return $result;
}
<?php
require_once("DaHelper.php");
$dh = new DaHelper("admin|$username", "PASSWORD FROM LOGINKEY HERE");
$dau = $dh->callApi('CMD_API_ADDITIONAL_DOMAINS', ['user' => $username]);