btraill

Try this:

systemctl stop lshttpd
systemctl disable lshttpd
pkill -9 lshttpd

Then verify if the processes are gone:

netstat -tulnp | grep :7080

If not, kill it manually:

kill -9 <PID>  # Get the PID from the netstat command above

Verify again:

netstat -tulnp | grep :7080

Once the process is gone, run these:

systemctl reset-failed lshttpd
systemctl enable lshttpd
systemctl start lshttpd
    • Edited

    cPFence That did it! I wasn't killing the active process previously. Thank you.

    Blah... the issue resurfaced today on the server that was stable since running those commands.

      btraill

      Yeah, I see some members reporting the same issue in the community. Try opening a ticket with Adam to have it checked out.

      Btw, what is cPFence downloading every hour? Seems to add up to about 2.5GB per server per day. Not huge or anything, but would it be possible to make this once a day or so? Or would there be potential downsides to that?

        rdbf

        cPFence downloads virus signature updates hourly, and it’s only a few MB more—not significant by any means. If you’re seeing more than this being used by cPFence, something is definitely off. If that’s the case, please open a ticket, and our team will help figure it out.

        • rdbf replied to this.

          cPFence

          Ok, that's weird then, it's +/- 100MB every hour on all servers, I'll send the screenshots in a ticket

            rdbf

            Your ticket has been answered now. Please let us know if you need further assistance.

              @cPFence for me and perhabs for plenty others it would be wonderfull to have a bulkaction for forcing or avoiding www (editing the htaccess file). But with the differnece between domains and subdomains (no forcing for subdomains). Perhabs you can add this feature sometime...

              • Edited

              cPFence

              Thanks for that. I agree with the hourly IPDB updates for sure. For the virus signatures I feel once a day would be fine if that saves like 80% of the incoming bandwidth every hour, but it's certainly not a big deal, especially since they don't take up extra space.

              It's just that when looking out for issues/bugs due to the V12 updates, everything that's odd stands out suddenly, so that's why I asked.

              • Edited

              Version 3.3.37 (2nd March 2025)

              Added
              - Bulk Wordpress Language Change:
              Now you can easily change the language of all or selected wordpress sites in bulk.

              Bulk Change Language

              Improved
              - Owl now monitors systemd for openlitespeed (ols) and litespeed (ls):
              Owl will now ensure systemd remains in sync with the actual litespeed web server status, preventing unnecessary restarts. more details: enhance community discussion.

              • Alerts will only be triggered if ols/ls web server fails to start.

              - Waf Optimizations:
              Additional compatibility improvements for various plugins and themes.

                So I just discovered that I opened cpfence --ui on all of the servers in my cluster. Coincidently I lost internet for couple of mins and I lost connection to all of my terminal sessions. Then I left it as is. After few hours, I found that all of my servers are showing a high CPU usage. When I ran the top command, I found a process with command "dialog" running on all servers is consuming 100% CPU. Is it cpfence UI? Because none of my servers are having anything related to dialog on it. @cPFence

                  badboybackagain

                  The UI CPU usage is usually close to zero. Please open a ticket so we can check it out for you.

                  MDG

                  badboybackagain

                  Yes, you can already bulk install a plugin by searching for the plugin slug, using a URL with the plugin zip file, or specifying a path on the server with the plugin zip file.

                  Version 3.3.39 (7th March 2025)

                  Improved

                  • Enhanced the Admin UI to better handle scenarios where users get disconnected or close the terminal with no clean exit, ensuring improved performance and stability during sessions.

                  Thanks to those who requested it. We’ve just updated our blog post with the full list for v12. Hope it helps:

                  Essential Daily Commands for Managing Your Enhance Server (updated for v12)

                  Version 3.3.40 (9th March 2025)

                  Added

                  - Inode Usage Monitoring:
                  cPFence Owl now tracks filesystem inode usage in real-time, ensuring early detection of excessive file creation, potential abuse, or misconfigurations that could impact system stability and security. High inode usage can lead to server instability, failed writes, and performance issues—this new monitoring feature helps prevent these risks before they cause serious problems.

                  - New Interactive Tool for Real-Time WAF Log Tracking:
                  Quickly identify and troubleshoot potential false positives in cPFence WAF logs with this new interactive tool. This tool:

                  cPFence WAF Debug Tool

                  • Automatically detects rule numbers responsible for blocked requests.

                  • Suggests ready-to-use whitelisting commands for immediate action.

                    Run the tool using:
                    cpfence --debug-domain-waf

                  Improved

                  • Enhanced WP-AutoShield compatibility with Bedrock-based WordPress installations.
                  • Optimized WAF rules to prevent conflicts with phpMyAdmin on Enhance v12.
                    Follow @enhancecp