Solved

Scheduled Task (Cron Job) - Plesk 11, UnlimitedWebHosting

Posted on 2013-06-10
6
800 Views
Last Modified: 2013-06-11
Hi guys,

I'm using UnlimtedWebHosting for a site and trying to set up a scheduled task to run a PHP script.

After a few weeks of messing around with their support team, we've finally managed to get the command right to run a PHP script, which is as follows:

/usr/bin/php -q /var/www/vhosts/(sitename)/httpdocs/Code/testmail.php


Now, this works correctly if it's set by someone at their end, but if I try to make a change (or even open and close the job through Plesk), it breaks and the php page isn't called. Instead I get the following error:

-: /usr/bin/php: No such file or directory

If someone from the hosts support team go it and set it again, it starts working with the same command.

I've logged onto the Plesk Control Desk with an account that has all of the permissions set that I can give it, but still no luck. Whenever I set the job myself, it fails. Whenever they set it, it works.

UnlimitedWebHosting's support team don't seem to know what the issue is, and I don't have access to SSH.

Any ideas?
0
Comment
Question by:gesmuk
  • 3
  • 3
6 Comments
 
LVL 7

Expert Comment

by:Milind Koyande
ID: 39234165
Is it possible to see the screenshot of the plesk schedule task screen?
0
 

Author Comment

by:gesmuk
ID: 39234172
Sure, here you go.

Although, as I say, this works fine if it is set by the guys at the host, but not when I set it, so I know that the command is correct.

PLESK
0
 
LVL 7

Accepted Solution

by:
Milind Koyande earned 500 total points
ID: 39234178
Thanks for the Screenshot.

Please check following URL as it seems similar issue

==
http://shaun.net/2011/09/solving-plesk-10-3-1-cron-issues/
http://forum.parallels.com/pda/index.php/t-257668.html
==

The issue is related to shell, you will have to ask your provider to make the required changes on the server.
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 

Author Comment

by:gesmuk
ID: 39234585
Thanks for the advice, I forwarded it over to the support team and the problem now seems resolved.

Cheers,
0
 

Author Closing Comment

by:gesmuk
ID: 39234588
Thanks for the advice, I forwarded it over to the support team and the problem now seems resolved.

CHeers,
0
 
LVL 7

Expert Comment

by:Milind Koyande
ID: 39237031
You are most welcome and glad its fixed now :)
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

New Relic recently released its Synthetics product that allows for the creation of performance monitors that periodically test a site's performance. If you wish to test an interactive workflow New Relic employs Selenium WebDriverJS to run those test…
Read about why website design really matters in today's demanding market.
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
The viewer will learn how to dynamically set the form action using jQuery.

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now