Please whitelist cPanel in your adblocker so that you’re able to see our version release promotions, thanks!

The Community Forums

Interact with an entire community of cPanel & WHM users!

SOLVED [CPANEL-20560] Update failure with scripts/update_spamassassin_config

Discussion in 'General Discussion' started by gnetwork-cp, May 18, 2018.

  1. gnetwork-cp

    gnetwork-cp Member

    Joined:
    Mar 1, 2016
    Messages:
    17
    Likes Received:
    2
    Trophy Points:
    3
    Location:
    Australia
    cPanel Access Level:
    Root Administrator
    I've seen similar threads here, but mine is happening with spamassassin script:

    Maintenance ended; however, it did not exit cleanly (256). The following events were logged: “scripts/update_spamassassin_config”. Review the update logs to determine why the update failed.

    Error appeared as:
    Code:
    [2018-05-19 02:34:28 +1000] E [/usr/local/cpanel/scripts/update_spamassassin_config] The “/usr/local/cpanel/scripts/update_spamassassin_config” command (process 2586) reported error number 255 when it ended.
    
    When I ran the script by command line, “/usr/local/cpanel/scripts/update_spamassassin_config”, I got the following output:
    Code:
    root@server [~]# /usr/local/cpanel/scripts/update_spamassassin_config
    warn [update_spamassassin_config] Failed to update neighbor netblocks because of an error:  at /usr/local/cpanel/3rdparty/perl/526/lib64/perl5/cpanel_lib/Net/Whois/IANA.pm line 538.
       ...propagated at /usr/local/cpanel/Cpanel/Net/Whois/IP/Cached.pm line 96.
    
     at /usr/local/cpanel/3rdparty/perl/526/lib64/perl5/cpanel_lib/Net/Whois/IANA.pm line 538.
       ...propagated at /usr/local/cpanel/Cpanel/Net/Whois/IP/Cached.pm line 96.
    
    Now I see the referenced IANA.pm line 538 contains the following:
    $query{cidr} = [Net::CIDR::range2cidr(uc($query{inet6num} || $query{inetnum}))];

    Is the IPV6 query causing a problem? I don't run IPV6!

    Any suggestions?
     
  2. cPanelLauren

    cPanelLauren Forums Analyst
    Staff Member

    Joined:
    Nov 14, 2017
    Messages:
    2,230
    Likes Received:
    161
    Trophy Points:
    143
    Location:
    Houston
    cPanel Access Level:
    DataCenter Provider
    Hi @gnetwork-cp

    That's definitely an unusual error, I've not seen it before. Can you show me the results of the following:

    Code:
     ps faux |grep spam[d]
    cat /etc/cpspamd.conf
    Thanks!
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  3. gnetwork-cp

    gnetwork-cp Member

    Joined:
    Mar 1, 2016
    Messages:
    17
    Likes Received:
    2
    Trophy Points:
    3
    Location:
    Australia
    cPanel Access Level:
    Root Administrator
    Here it is:
    Code:
    root@server [~]#  ps faux |grep spam[d]
    root      1459  0.0  4.9 221484 99456 ?        Ss   02:12   0:10 /usr/local/cpanel/3rdparty/perl/526/bin/perl -T -w /usr/local/cpanel/3rdparty/bin/spamd --max-spare=1 --max-children=3 --allowed-ips=127.0.0.1,::1 --pidfile=/var/run/spamd.pid --listen=5
    root      1977  0.0  5.8 247604 116172 ?       S    02:12   0:23  \_ spamd child
    root@server [~]# cat /etc/cpspamd.conf
    maxspare=1
    maxchildren=3
    I should mention that yesterday I changed my VPS plan with the provider (reduced resources) but still have the same IP address. Could that be a part of the problem?
     
  4. cliveaustin

    cliveaustin Registered

    Joined:
    Apr 23, 2010
    Messages:
    4
    Likes Received:
    0
    Trophy Points:
    51
    +1
    I'm seeing EXACTLY the same issue... any ideas yet?

    running the command by hand gives this...

    #/usr/local/cpanel/scripts/update_spamassassin_config --verbose

    warn [update_spamassassin_config] Failed to update neighbor netblocks because of an error: at /usr/local/cpanel/3rdparty/perl/526/lib64/perl5/cpanel_lib/Net/Whois/IANA.pm line 538.

    ...propagated at /usr/local/cpanel/Cpanel/Net/Whois/IP/Cached.pm line 96.


    at /usr/local/cpanel/3rdparty/perl/526/lib64/perl5/cpanel_lib/Net/Whois/IANA.pm line 538.

    ...propagated at /usr/local/cpanel/Cpanel/Net/Whois/IP/Cached.pm line 96.
     
  5. xanadu

    xanadu Member

    Joined:
    Sep 25, 2006
    Messages:
    14
    Likes Received:
    0
    Trophy Points:
    151
    We are experiencing the same problem on both our vps with different vendors and different dc's
     
  6. nerdzoll

    nerdzoll Well-Known Member

    Joined:
    Oct 4, 2004
    Messages:
    106
    Likes Received:
    0
    Trophy Points:
    166
    +1 also experiencing the exact same behaviour. Also a VPS.
     
  7. Jason_TS

    Jason_TS Registered

    Joined:
    May 19, 2018
    Messages:
    1
    Likes Received:
    0
    Trophy Points:
    1
    Location:
    Malaysia
    cPanel Access Level:
    Root Administrator
    +1 I'm having the same issue as well
     
  8. bloatedstoat

    bloatedstoat Well-Known Member

    Joined:
    Jun 14, 2012
    Messages:
    125
    Likes Received:
    11
    Trophy Points:
    18
    Location:
    Victoria, Australia
    cPanel Access Level:
    Root Administrator
    +1 here too. CLOUDLINUX 6.9 standard v70.0.42, following upgrade.
     
  9. Vinothkumar Vidjearadjou

    Joined:
    Mar 26, 2018
    Messages:
    1
    Likes Received:
    0
    Trophy Points:
    1
    Location:
    Australia
    cPanel Access Level:
    Root Administrator
    +1, We have the same issue for past 2 days. CLOUDLINUX 6.9 standard v70.0.42, following upgrade.
     
  10. MaximK

    MaximK Registered

    Joined:
    May 20, 2018
    Messages:
    2
    Likes Received:
    0
    Trophy Points:
    1
    Location:
    Philippine
    cPanel Access Level:
    Root Administrator
    +1 Same error
     
  11. directsupport

    directsupport Member

    Joined:
    Dec 14, 2010
    Messages:
    10
    Likes Received:
    0
    Trophy Points:
    51
    Same exact error same scenario.

    CLOUDLINUX 6.9 VPS v70.0.42

    Confirmed.

    /usr/local/cpanel/scripts/update_spamassassin_config --verbose
    warn [update_spamassassin_config] Failed to update neighbor netblocks because of an error: at /usr/local/cpanel/3rdparty/perl/526/lib64/perl5/cpanel_lib/Net/Whois/IANA.pm line 538.
    ...propagated at /usr/local/cpanel/Cpanel/Net/Whois/IP/Cached.pm line 96.

    at /usr/local/cpanel/3rdparty/perl/526/lib64/perl5/cpanel_lib/Net/Whois/IANA.pm line 538.
    ...propagated at /usr/local/cpanel/Cpanel/Net/Whois/IP/Cached.pm line 96.
     
  12. AndrejP

    AndrejP Registered

    Joined:
    May 21, 2018
    Messages:
    1
    Likes Received:
    0
    Trophy Points:
    0
    Location:
    Croatia
    cPanel Access Level:
    Root Administrator
    Yup, this seems to break it
    $response = Net::Whois::IANA->new()->whois_query( -ip => $address );

    GDPR changes causing issues? I didn't read too much into changes which will be introduced to WHOIS systems due to GDPR, but this could be caused by that. Is there any way to not use whois during the update?
     
  13. cPanelLauren

    cPanelLauren Forums Analyst
    Staff Member

    Joined:
    Nov 14, 2017
    Messages:
    2,230
    Likes Received:
    161
    Trophy Points:
    143
    Location:
    Houston
    cPanel Access Level:
    DataCenter Provider
    Hi everyone,


    We now have a case on this CPANEL-20560 to address the issue. Thank you all for updating this thread. I'll update here once it's resolved.

    Thanks!
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  14. gnetwork-cp

    gnetwork-cp Member

    Joined:
    Mar 1, 2016
    Messages:
    17
    Likes Received:
    2
    Trophy Points:
    3
    Location:
    Australia
    cPanel Access Level:
    Root Administrator
    Error has disappeared!
     
  15. cPanelMichael

    cPanelMichael Forums Analyst
    Staff Member

    Joined:
    Apr 11, 2011
    Messages:
    44,367
    Likes Received:
    1,855
    Trophy Points:
    363
    cPanel Access Level:
    Root Administrator
    Hello,

    This is solved in cPanel & WHM version 70.0.46:

    Fixed case CPANEL-20560: Avoid exception on invalid whois data.

    Version 70.0.46 is now published to the CURRENT build tier. We'll update this thread again once it's published to the RELEASE build tier.

    Thank you.
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
    cPanelLauren likes this.
  16. cPanelMichael

    cPanelMichael Forums Analyst
    Staff Member

    Joined:
    Apr 11, 2011
    Messages:
    44,367
    Likes Received:
    1,855
    Trophy Points:
    363
    cPanel Access Level:
    Root Administrator
    Hello,

    Version 70.0.46 is now published to the RELEASE release tier.

    Thank you.
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
Loading...

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice