Solved

qmail is not logging and some mailadresses can´t receive mails other can

Posted on 2014-11-20
4
189 Views
Last Modified: 2014-12-11
Hi,

after getting may disk running out of space i have the problem, that some of my mail-adresses can´t receive mails. Other adresses of the same domain can receive. To find out what is the problem i tried to look in the maillog. But unfortunatly this file has 0 bytes...
I use qmail on suse 11.1 with Plesk.
I did already check syslogng.conf and apparmor.conf  (found this on web)
i already change owner of qmail-local to mhandlers-user.popuser

Nothing helped so far.

Please help !
0
Comment
Question by:loosain
  • 2
  • 2
4 Comments
 

Author Comment

by:loosain
ID: 40456528
Hi,

just found out the whole syslog doesnt work:

service syslog start
Starting syslog servicesio.c: bind_unix_socket(): bind failed /var/lib/named/dev/log (Address already in use)
Error initializing configuration, exiting.
startproc:  exit status of parent of /sbin/syslog-ng: 1

waht can i do ?
0
 
LVL 76

Accepted Solution

by:
arnold earned 500 total points
ID: 40456653
It depends on your setup, maillog is built a log service with daemon tools.
You need to look at your alias list within plesk

Does your system have a /services directory?
Ps -ef |grep svcadm
ps -ef | grep qmail
Then trace it back by the parent Id till the parent Id is 1.
0
 
LVL 76

Expert Comment

by:arnold
ID: 40456660
Because some addresses get email while others do not, suggests that your issue is not the permissions in qmail-local, or qmail-command
The issue is with the home directory permissions where the data is to be stored or if you use user quotas, the user has exceeded their quota.

Need more information on how your system is setup ......
0
 

Author Closing Comment

by:loosain
ID: 40494471
We don´t spent more time to this and setup the Server with new (up2date) OS. Thanks for your efforts
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension (http://www.experts-exchange.com/discussions/210281/Attachments-with-no-extension.html). This reminded me of questions tha…
Resolve Outlook connectivity issues after moving mailbox to new Exchange 2016 server
To show how to create a transport rule in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Mail Flow >> Rules tab.:  To cr…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now