Red Hat Enterprise Linux 5.4 BIND

Posted on 2009-12-29
Medium Priority
Last Modified: 2013-12-15
I'm relatively new to Red Hat Linux and I have a question regarding BIND DNS.  I noticed when I was listing my DNS .db files that there were several files entitled "[doman.name].db.REJECT.2009-12-28_15.11.46 " (other files have different date/time stamps).

What are these files?  Is it safe to remove them?

Thank you in advance for your response.
Question by:tbaik
LVL 10

Accepted Solution

elf_bin earned 1500 total points
ID: 26169645
I've heard of this when using the GUI tool to configure the domain(s).  Before saving the file(s) checks are done on them (I understand they are the same as done at start-up), if any of these checks fail, the original file will not be modified but a new "erroneous file" (usually named something like [original_file_name].REJECT.[date_time_stamp]) will be created.

Hope that helps.

Author Closing Comment

ID: 31670909

Featured Post

The new generation of project management tools

With monday.com’s project management tool, you can see what everyone on your team is working in a single glance. Its intuitive dashboards are customizable, so you can create systems that work for you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension . This reminded me of questions that come up here at EE along the lines of, "How can I tell the type of file from its cont…
Cron is one of the most popular and basic utilities found on Unix systems. Combined with other tools, cron makes it exceptionally easy to automate a broad range of tasks on your server.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Suggested Courses
Course of the Month6 days, 16 hours left to enroll

593 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question