Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. https://crt.sh/?q=example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
My domain is: a-view.org
I ran this command:
It produced this output:
My web server is (include version): nginx
The operating system my web server runs on is (include version): Ubuntu 16.04.5 LTS
My hosting provider, if applicable, is:
I can login to a root shell on my machine (yes or no, or I don’t know):
I’m using a control panel to manage my site (no, or provide the name and version of the control panel):
There is SO much contradictory information about cron on the web. Full of inconsistencies.
I seem to have two commands that are running cron jobs, but I can’t tell if they have ever run successfully.
I created a new one with crontab -e that looks like this as shown by crontab - l:
43 6 * * * certbot renew --post-hook "service nginx restart"
It is hidden away at /var/spool/cron/crontabs in the file root.
But, there is no evidence it ever runs. It never gets moved into the /etc/cron.* directories. So, does that mean it will never ever run?
There is another cron job in /etc/cron.d in a file called certbot that looks like this:
# /etc/cron.d/certbot: crontab entries for the certbot package
#
# Upstream recommends attempting renewal twice a day
#
# Eventually, this will be an opportunity to validate certificates
# haven't been revoked, etc. Renewal will only occur if expiration
# is within 30 days.
SHELL=/bin/sh
PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin
0 */12 * * * root test -x /usr/bin/certbot -a \! -d /run/systemd/system && perl -e 'sleep int(rand(43200))' && certbot -q renew
It seems like the above just runs a test and doesn’t run the command itself. Sheesh.
These are QUITE different. Here is a log grep for past cron jobs:
grep CRON /var/log/syslog
Sep 15 07:17:01 ghost-trial CRON[28175]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly)
Sep 15 08:17:01 ghost-trial CRON[28326]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly)
Sep 15 09:17:01 ghost-trial CRON[28491]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly)
Sep 15 10:17:01 ghost-trial CRON[28635]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly)
Sep 15 11:17:01 ghost-trial CRON[28846]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly)
Sep 15 12:00:01 ghost-trial CRON[28924]: (root) CMD (test -x /usr/bin/certbot -a \! -d /run/systemd/system && perl -e 'sleep int(rand(43200))' && certbot -q renew)
Sep 15 12:17:01 ghost-trial CRON[28942]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly)
Sep 15 13:17:01 ghost-trial CRON[29007]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly)
Sep 15 14:17:01 ghost-trial CRON[29070]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly)
Sep 15 15:17:01 ghost-trial CRON[29092]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly)
Sep 15 16:17:01 ghost-trial CRON[29138]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly)
Sep 15 17:17:01 ghost-trial CRON[29193]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly)
Sep 15 18:17:01 ghost-trial CRON[29242]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly)
Sep 15 19:17:01 ghost-trial CRON[29508]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly)
Sep 15 19:46:36 ghost-trial cron[29810]: (CRON) INFO (pidfile fd = 3)
Sep 15 19:46:36 ghost-trial cron[29810]: (CRON) INFO (Skipping @reboot jobs -- not system startup)
Why is there no evidence that the crontab job created with crontab -e has ever run? What is the point of that command? Do things created that way just go into la-la land?
This just looks like something created by a bum script (like most linux scripts–full of errors and vulnerabilities).