Tag: Users
How to Investigate Server Load: Part 2
Introduction
In this second tutorial on server load, we outline the steps that should be taken when investigating where server load originates and what may be causing your server to become overloaded. As noted in Part 1 of our series, excessive use of any apps or services can typically cause load issues. Here are the four main areas of concern:
How to Investigate Server Load: Part 1
Introduction
In this two-part series, we outline the steps to take when investigating where server load originates or causing your server to become overloaded. When running a server that hosts multiple websites, high load issues often crop up. To find out how and why this occurs, read on.
Have you run into the cPanel error seen below in WHM where it prevents you from adding more cPanel accounts? It states that you have exceeded the total number of accounts allowed by your license. If so, this tutorial will demonstrate how you can increase the quantity of available accounts from within your Manage interface.
How Do I Secure My Linux Server?
Our last article on Ubuntu security suggestions touched on the importance of passwords, user roles, console security, and firewalls. We continue with our last article and while the recommendations below are not unique to Ubuntu specifically (nearly all discussed are considered best practice for any Linux VPS server or dedicated server) but they should be an important consideration in securing your server.
How to Secure a Site in IIS
When investigating site infections or defacing on a Windows VPS Server, the most common root cause is poor file security or poor configuration choices when it comes to how IIS should access file content. The easiest way to prevent this is to start with a secure site.
How to Check Server Load on a Windows Server
What Does Server Load Mean?
Checking a server’s load allows us to evaluate server resources and confirm they are sufficient for any running application. It enables us to troubleshoot slow performance and reliably pinpoint any server resource that may need attention.
Common Postgres Tasks on CentOS 7
This guide walks you through some common tasks surrounding a Postgres server. In this tutorial, we’ll cover installing Postgres, creating new databases and users, backing up databases, and more! Let’s dig in!
How to Work With PostgreSQL Databases
Table of Contents
Listing databases
Dump a database
Dumping all databases
Dump Grants
Delete or Drop a Database
Delete a Grant
Restore a Database
Restore Grant
What is Kubernetes RBAC Authorization
What is RBAC?
Kubernetes Role-Based Access Control or the (RBAC) system describes how we define different permission levels of unique, validated users or groups in a cluster. It uses granular permission sets defined within a .yaml file to allow access to specific resources and operations.
Linux has a robust permissions system. This is a very good thing, as it enables a clear separation of roles among users, especially between the root user and your average user. Sometimes, though, you might want your average user to have some or all of root's privileges. In Linux, this is accomplished with sudo.
Our Sales and Support teams are available 24 hours by phone or e-mail to assist.