Solved

Plesk installation on CentOS took the default page.

Posted on 2014-03-03
8
521 Views
Last Modified: 2014-03-04
Dear support,
I have installed Plesk 11.0 on CentOS but the default http page is appearing from Plesk. Any help would be appreciated.
Regards,
0
Comment
Question by:ibu1
  • 4
  • 4
8 Comments
 
LVL 13

Expert Comment

by:Sandy
ID: 39900155
Can you paste at which step you are stucked ?

TY/SA
0
 
LVL 12

Author Comment

by:ibu1
ID: 39900161
Please check the below link
148.251.77.244

It is not giving the default apache page.
0
 
LVL 12

Author Comment

by:ibu1
ID: 39900166
Does Plesk intallation overwrite Apache?
0
 
LVL 13

Expert Comment

by:Sandy
ID: 39900194
not exactly, It configures its own apache instance, does overwrite your config and files.. they were intact at their location but Plesk has taken precedence over running Apache instance.

TY/SA
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 
LVL 12

Author Comment

by:ibu1
ID: 39900257
To be more clear I have purchase a server space from Hetzner and told them to install CentOS 6.5 + Plesk. Somebody is advising me that Plesk should be assign a different port.
0
 
LVL 13

Expert Comment

by:Sandy
ID: 39900277
Yes, Plesk will opearte at 8443 at admin panel but default sites/mails will work on default port.

TY/SA
0
 
LVL 12

Author Comment

by:ibu1
ID: 39900324
Plesk is working fine through 8443 port but I dont understand why it overwrite the Apache. This is know behavior of Plesk or something is wrong in configuration.
0
 
LVL 13

Accepted Solution

by:
Sandy earned 500 total points
ID: 39900378
Plesk setup its own apache instance as part of default installation.

TY/SA
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
One of the typical problems I have experienced is when you have to move a web server from one hosting site to another. You normally prepare all on the new host, transfer the site, change DNS and cross your fingers hoping all will be ok on new server…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now