HTCondor Docker universe throws core.STARTER

This is a problem observed when using HTCondor in the Docker universe.

After re configuring HTCondor and Docker on one processing node, every time a job is sent the following errors are dumped in the corresponding slot’s StarterLog.slot1_N:

(pid:24877) Found 33 entries in docker image cache.
Stack dump for process 24877 at timestamp 1497439919 (13 frames)

There is also a core.STARTER generated and the output of `gdb /var/log/condor/core.STARTER <<< “where”` is:

Core was generated by `condor_starter -f -a slot1_1’.

(gdb) Python Exception <class ‘gdb.MemoryError’> Cannot access memory at address 0xb1340bc0:

The lead to that was a bug in the Docker thinpool storage driver, which led to the use of overlay2 driver alongside with a Docker reinstall.

There are ‘hidden’ dot files in the condor log directory, they contain cache information that might mess up with you job submission, to fix that one needs to stop condor, remove those files and start condor again. Once done the node start accepting Docker Universe jobs again.

systemctl stop condor
cp /var/log/condor/.s* /tmp/
rm -f /var/log/condor/.s*
systemctl start condor

Eurostat CSV to JSON

Eurostat is great source for open statistical data. Open access to such resource provides students, teachers and ordinary people to analyse and visualise different datasets thus provida arguments and sometimes arrive to fundamental conclusions.

Among the data formats provided from Eurostat are CSV, XML, TSV, HTML, PDF and others. There is also JSON REST API. More information about the API is available here: however this API is not very well documented and it might be difficult to specify the correct filter to extract a given dataset.

The number of requests for graphing and mapping different datasets led to the development of this simple interface which converts a filtered CSV extract of a dataset into a JSON object.

Using the form below you can convert single CSV into JSON:

Joomla WordPress eval base64_encode hack fixes

How did I encounter it eval base64_encode hack

I got to know this hack after I was contacted by my hosting provider telling me that one of my WordPress/Joomla websites was generating a lot of spam traffic. If you are running your own host you might discover it by monitoring the e-mail traffic generated by your server or if the load on the server has unnaturally increased.

The issue spread quite quickly and soon many others websites got hacked. I also got a lot inquiries from friends having the same issue.

How does it happen?

Sites are hacked after an attacker sends through request a piece of code that gets executed once received. That is usually done through untrusted plugins, or flaws in the CMS software.

The attack usually sneaks a line of bad code in some of the CMS’s original files. Usually in the beginning of the files, could also be in the middle. In general they try to replace a line starting with <?php with a line that has many blank spaces followed by something that usually looks like this:

Read More

Apache2 LocationMatch with simple regular expression

How to Proxy an URL of the this type:

to an internal server?

I have looked for a long time in the apache2 LocationMatch official docs hoping to find a solution how to write correctly the regular expressions that will do the job until I managed to come out with a working solution.

Read More

Debian, The following packages cannot be authenticated!

WARNING: The following packages cannot be authenticated!

This is a Debian warning after an:

sudo apt-get update
sudo apt-get upgrade

After going through many sources around the correct solution turned out to be be:

sudo rm -r /var/lib/apt/lists
sudo mkdir -p /var/lib/apt/lists/partial
sudo apt-get update

Now you should be able to run the upgrade.