New Relic is a resource monitoring tool gaining popularity in the hosting community. It is not uncommon for our customers to ask for help installing this software. In my last article, I explained how to install New Relic’s application performance monitoring. In this post, we’ll look at installing their server performance monitoring.
New Relic has a free tier for their service. A free account allows you to monitor cpu, memory, disk, and network traffic for your server. The following directions will guide you through the installation of New Relic on a CentOS server. Other Linux OS servers will be similar, but not exactly the same. Please note that these directions require you to log in to your server on the command line and execute commands as root. Read more
Accessing SSH for the first time can be fairly daunting, but it doesn’t have to be. Command line access via SSH is the single most powerful tool you have for administering your server. Not only can you do everything on the command line of your linux server if you wish, there are certain tasks you can only accomplish through SSH command line access.
After learning how to check for permissions to access SSH, configure a client and log in to your server via SSH in part 1 of our SSH Basics series, you’re ready to execute your first commands. Let’s dive right in.
A user’s guide to SSH Read more
In a previous article, SSH Key Authentication, I explained how to generate an SSH key so you could automatically log into your server instead of using a password. This is convenient for you (no more typing the password) and very inconvenient for potential hackers. If you turn off password authentication (because you’ll no longer need it), no amount of password guessing will let a hacker in.
The previous article showed you how to add the key to your cPanel server, but what if you’re not running cPanel? Don’t worry, the process is just as easy for no-panel servers. I’ll show you how.
Adding the Key Read more
A great way to keep potential threats at bay and make your server more secure is to employ TCP Wrappers. TCP Wrappers are a form of access control you can use – in conjunction with a firewall – to lock out unwanted users and increase your server security.
TCP Wrappers are similar to a firewall, in that you can allow and deny IPs or hosts, but different as they provide some additional options as well. TCP Wrappers use access rules in the hosts.allow file to allow or deny connections to network services that use the tcp_wrappers library, libwrap.
For example, you may want to allow someone access to FTP files to your server, but not want to allow them SSH, WHM, or any other kind of access. TCP Wrappers allow you to grant them access to FTP, or another specific feature, while denying them access to everything else. Read more
So you want to build your own Minecraft server? Minecraft can be a pretty easy game to set up on a VPS. It just requires a few quick commands before you’re on your way to survival/adventure/creativity!
Note: This guide is specific to CentOS cPanel servers, but can be followed for a non-cPanel server as well. Also, this tutorial assumes you are familiar with working on the command line on your server via SSH. If you’re not, you might want to check out this article first to get your feet wet.
Also note: This tutorial does not include purchasing and installing the Minecraft stand-alone launcher. If you are new to Minecraft, download the launcher here to connect to your Minecraft server installation.
Without further ado, here are the steps to install Minecraft on a cPanel VPS: Read more
RAM (Random Access Memory) is computer storage that holds the data of running processes (i.e. programs). That data includes the image of the program itself, the data that the program uses to interact with the computer’s operating system, and the data that the program is actually manipulating to do whatever useful thing the program is written to do. Consequently, RAM needs to be a very fast data store that gives a running program nearly instant access to the data it needs to operate. It is also volatile — it does not survive reboot. By contrast, data on disk (whether traditional hard disk, or otherwise) is designed for long-term storage and large capacity at the expense of speed.
How much RAM is my server using? Read more
Many of us use FTP to transfer and modify files server side. In most cases it’s just fine. However, there are situations where you need something more powerful. That’s where SSH (Secure Shell) comes in. SSH will allow you to bulk rename, find, move and copy files, and much more. All with a few simple commands.
Just a heads up: This is not an article on root access (complete control over everything on the server). If you are a ServInt customer and need root access to your VPS, you need to contact the MST so we can enable it. We deliver your server with root access disabled by default in order to keep your server secure. If you’d like to know more about root access, click here.
Accessing your server
Most of you are using cPanel. Fortunately for you, cPanel automatically sets up the user to be SSH ready when you create the account in WHM. Here are the directions to double check, which I suggest doing to familiarize yourself with the interface/tool: Read more
I installed the free New Relic PHP monitoring tool on my own server (mainly for the free t-shirt!). The free account provides you with information on traffic, performance, and state (up or down). New Relic also offers monitoring for many other software/services — MySQL, Apache, Java, etc. — and has paid features as well for those seeking a deeper experience.
The following directions will guide you through the installation of New Relic application monitoring on a CentOS server. Other Linux OS servers will be similar, but not exactly the same. If you’re interested in installing New Relic’s server monitoring package, check out my next article.
The Internet is a seemingly miraculous place for small businesses. These days, there are all kinds of companies offering turn-key e-commerce site design and hosting solutions, all delivered — almost literally — at the push of a button. No design skill? No problem! No technical know-how? Who cares!
Of course, behind the scenes, things aren’t that simple. Many of these turn-key solution providers deliver bloated, inefficient, insecure back-end designs and over-sold shared hosting to house your site when you’re done. As a general rule, I advise my small business-owning friends to steer clear of the “design and host your e-commerce website for $9.99” companies, and do a little work on their own to build and host a site that works best for them.
I’m not saying every small business owner should code their own site from scratch. That would be silly. What I am saying is that — whether you build your site from scratch, or from a popular CMS like WordPress, or whether you hire somebody to build your site for you — you should make sure your site is designed as simply and intelligently (on the front and the back end) as you can. Why? Read more
Have you ever been administering your server when all of a sudden, it appears to have mysteriously dropped off the Internet? You can no longer make an SSH connection, your email client times out, and your websites are down! What gives? Before jumping to the conclusion that your server or web host are down, you should check your server’s firewall. It’s likely the reason why you can’t connect.
A couple weeks ago in the Tech Bench I talked about using ConfigServer Firewall (CSF) to administer a server firewall. CSF is complimented by a lesser-known companion program called Login Failure Daemon (LFD). Read more