Blog

  • How To Install CloudLinux on Dedicated Server

    How To Install CloudLinux on Dedicated Server

    After reading this post, you will learn How to Install CloudLinux on Dedicated Server step by step. This platform is a great operating system that can be deployed on various systems like dedicated servers, cloud servers, or virtual machines. It can be said that one of the best solutions to secure the hosting environment on servers is to isolate the file system and keep the user’s process secret.

    What is CloudLinux?

    CloudLinux is an operating system that helps create a secure and stable platform for shared hosting. This cloud computing system is based on CentOS and Cause users to have more control over server resources:

    Features of CloudLinux

    – Isolation of user accounts prevents users from influencing each other.

    – It prevents users from seeing each other’s configuration files or private information.

    – Allows you to monitor and control limits such as RAM, CPU, and I/O.

    – Monitor and implement MySQL usage.

    – It provides CageFC, which is a type of file system.

    – It allows users to choose between different versions of php

    – Prevent symbolic link attacks

    – It is compatible with all major control panels.

    Install CloudLinux on a Dedicated Server

    Now, it’s time to find out how to install CloudLinux on your dedicated server. To start and install CloudLinux on a dedicated server, you must have a dedicated server in the first step. Therefore, we suggest you visit the Cheap Dedicated Server plans presented on our website. So follow the instructions in this section carefully so that you can do the installation successfully.

    The first step is to run the following command to download cldeploy script:

    wget https://repo.cloudlinux.com/cloudlinux/sources/cln/cldeploy

    The installation step should be done based on the activation key, so run the command below:

    sh cldeploy -k < CL activation_key >

    If you want to get permission based on IP, use the following command:

    sh cldeploy -i

    When you finish the installation part, it’s time to run the command below to reboot the Linux server:

    reboot

    Now you have CloudLinux on your system. After rebooting, you can run the server through CloudLinux shared OS.

    Configure CloudLinux on Dedicated Server

    After installing CloudLinux on your server, you should apply the configuration by using the following commands:

    If your control panel is Cpanel, navigate WHM, then LVEmanager.

    If you use DirectAdmin, then go through Dashboard and then CloudLinux Manager.

    Tip: The CoudLinux user interface is always the same for every control panel.

    At last, open CloudLinux through the control panel. In this case, you will face a welcome page, and you can click on the Start wizard option to finish the process:

    Configure CloudLinux on Dedicated Server

    Now, you can continue the configuration part. Here, your first choices are like this:

    Cagefc- It is a kind of virtual file system and set of tools that keeps the user hidden.

    LSAP- This case is actually a kind of Apache module, based on Lightspeed API technology for PHP and great performance of that.

    MySQL Governor- This software integrates and monitors MySQL in a shared hosting environment.

    Node.js selector- This tool is one of the components of CloudLinux that allows the user to easily create Node.js applications and also select them and other parameters based on their needs.

    Configure PHP- With this tool, you can also configure selectors and PHP interpreters. It also allows users to choose their versions and modules.

    After you have made your selection, click Finish & Install, and keep in mind that the installation may take a few minutes depending on the hardware:

    configure cloudlinux on dedicated server

    Now we are going to take a look at the interface of CloudLinux by presenting pictures.

    Dashboard:

    Here, you can see the summary interface for CloudLinux. This summary gives information about the status of every other feature enabled with CloudLinux. In addition, you can see the number of users and resellers hitting the resource limits.

    configure cloudlinux on dedicated server

    Current usage:

    This interface is used to get information about the live usage of users who hit the limits. (like CPU, RAM, etc.)

    Configure CloudLinux on Dedicated Server

    Users:

    This interface shows the list of users and their adjusted limits. In addition, you can change the individual user’s custom assignment of the resources.

    Configure CloudLinux on Dedicated Server

    Statistics:

    This one is called the statistics interface. This interface will filter the average usage of every parameter for users according to the time.

    Configure CloudLinux on Dedicated Server

    Options:

    This interface is a configurable option used to configure notifications, MySQL, Python Selector, CageFS, and so on.

    Configure CloudLinux on Dedicated Server

    Packages:

    The package interface is used to configure the limitations of the packages.

    Configure CloudLinux packages

    Selectors:

    You can configure the PHP selector setting using this interface.

    Configure CloudLinux on Dedicated Server

    Website Monitoring:

    Use this interface to monitor the website’s number of requests and PHP reports.

    website monitoring on CloudLinux

    Configure CloudLinux Package

    After you have created the packages, go to the CloudLinux packages section to configure package restrictions. Now, you can see a list of already created packages. Then click the Pencil icon to edit the package:

    Configure CloudLinux package

    The Limits of CloudLinux are shown here, and you can configure them for every individual package:

    Speed: Speed limit for CPU

    VMEM: limitation of Virtual memory

    PMEM: Limitation of Physical memory

    IO: Combines the operation of reading and writing.

    IOPS: This limit restricts the total number of reading and writing per second

    NPROC: Maximum number of processes on LVE

    EP: It represents a maximum number of connections that happen simultaneously to dynamic Apache scripts and SSH and corn jobs.

    Now that you have set the limit of the required parameters, you can click the save button. Note that you can apply the same procedure to other packages:

    package-limits-parameters-cloudlinux-1

    Conclusion

    In this article, we tried to teach how you can install CloudLinux on a dedicated server. We hope you enjoy this useful content. It represents a complete guide for you. If you have any questions, just comment.

    FAQ

    Does cloudLinux include technical support?

    Yes, it offers technical support services.

    Can we test CloudLinux before purchase?

    CloudLinux offers a trial period. So you can use it to test the service. Go to the website to get the trial.

  • Tutorial Install and Configure Cacti on AlmaLinux 8

    Tutorial Install and Configure Cacti on AlmaLinux 8

    Certainly, one of the important pillars of any network is having a monitoring system to check the structure of the network. Cacti is one of the free network monitoring software. If you want to compare the monitoring tools, Cacti is in a higher position in order to its open-source and availability of resources. If you follow this post until the end, you will learn how to Install and Configure Cacti on AlmaLinux 8 step by step.

    What is Cacti?

    Cacti make a connection to your devices using the SNMP protocol and analyze them during the interval. Cacti software is based on PHP/MySQL, which is basically installed on Linux Operating Systems and uses the RRDTool software to present its graphs. It should be noted that Cacti also allows you to provide a monitoring panel to your customers. In this software, you can specify which ports the subscriber will have access to after logging in. Cacti has made the monitoring process powerful by having a web-based management environment and various templates for different operating systems and devices.

    Prerequisites

    – A Linux VPS Server with AlmaLinux OS

    – Apache Webserver

    – MariaDB Database Server

    – PHP and PHP extensions

    – SNMP and RRDTool

    Follow us in the continuation of this article by teaching how to install and configure Cacti on Almalinux.

    How to Install Cacti on AlmaLinux 8

    Cacti is a web-based tool, so you need to create an Apache web server on which to run Cacti. You can install the Apache web server by entering the following command:

    sudo dnf install httpd -y

    To start the Apache web server, execute the following command:

    sudo systemctl start httpd

    Now you should enter the following command to enable the Apache webserver:

    sudo systemctl enable --now httpd

    At this point, Cacti requires a database to store the collected data, which in this article uses the MariaDB database. To install the MariaDB database, execute the following command:

    sudo dnf install -y mariadb-server mariadb

    You should enter the following command to start the MariaDB database:

    sudo systemctl start mariadb

    Then you can use the following command to enable MariaDB to start on boot:

    sudo systemctl enable mariadb

    Since Cacti is written in PHP, PHP and PHP extensions should be installed. So use this command to add the Remi repository:

    sudo dnf install dnf-utils http://rpms.remirepo.net/enterprise/remi-release-8.rpmmi

    Then you should enable the DNF module for PHP installation by entering the following command:

    sudo dnf module reset php
    sudo dnf module enable php:remi-7.4

    Now you can install PHP and PHP extensions by executing the following commands:

    sudo dnf install @php
    sudo dnf install -y php php-{mysqlnd,curl,gd,intl,pear,recode,ldap,xmlrpc,snmp,mbstring,gettext,gmp,json,xml,common}

    Use the following command to enable the PHP-fpm service:

    sudo systemctl enable --now php-fpm

    In this step, you should install SNMP and RRDTool, which are needed to gather and analyze system metrics:

    sudo dnf install -y net-snmp net-snmp-utils net-snmp-libs rrdtool

    You can start it with the following command:

    sudo systemctl start snmpd

    Enter the following command to enable snmpd:

    sudo systemctl enable snmpd

    The next step is to create a database and user for the Cacti and then grant all the necessary privileges to the Cacti user. So, enter the following command:

    mysql -u root -p
    
    MariaDB [(none)]> CREATE DATABASE cactidb;
    MariaDB [(none)]> GRANT ALL ON cactidb.* TO cacti_user@localhost IDENTIFIED  BY 'passwd123';
    MariaDB [(none)]> FLUSH PRIVILEGES;
    MariaDB [(none)]> EXIT;

    Now you should import the mysql test data timezone.sql file into the MySQL database:

    mysql -u root -p mysql < /usr/share/mariadb/mysql_test_data_timezone.sql

    Now you should enter the following command to connect to the MySQL database and then provide the Cacti user access to the mysql.time zone name table:

    MariaDB [(none)]> GRANT SELECT ON mysql.time_zone_name TO cacti_user@localhost;
    MariaDB [(none)]> FLUSH PRIVILEGES;
    MariaDB [(none)]> EXIT;

    Then you should add the following configuration to the mariadb-server.cnf file under the [ mysqld ] section:

    sudo vi /etc/my.cnf.d/mariadb-server.cnf

    Remember to paste the following configuration.

    collation-server=utf8mb4_unicode_ci
    character-set-server=utf8mb4
    max_heap_table_size=32M
    tmp_table_size=32M
    join_buffer_size=64M
    # 25% Of Total System Memory
    innodb_buffer_pool_size=1GB
    # pool_size/128 for less than 1GB of memory
    innodb_buffer_pool_instances=10
    innodb_flush_log_at_timeout=3
    innodb_read_io_threads=32
    innodb_write_io_threads=16
    innodb_io_capacity=5000
    innodb_file_format=Barracuda
    innodb_large_prefix=1
    innodb_io_capacity_max=10000

    You can exit after saving the changes.

    Because the Cacti package is available in the EPEL (Extra Packages for Enterprise Linux) repository. First release it with the following command:

    sudo dnf install epel-release -y

    Now you can install the Cacti monitoring tool by executing the following command:

    sudo dnf install cacti -y

    Then you should verify the installation of Cacti with the following command:

    rpm -qi cacti

    Now to determine the default Cacti database path, execute the following command:

    rpm -ql cacti | grep cacti.sql

    Then you should import the default cacti database tables into the MariaDB cacti database using the following command:

    mysql -u root -p cactidb < /usr/share/doc/cacti/cacti.sql

    You should modify the cacti configuration file according to the following database details:

    sudo vim /usr/share/cacti/include/config.php

    Now you should change the database name, username, and password to reflect the name you have already created and then set the timezone in the php.ini file. Remember to change the following parameters:

    date.timezone = Africa/Nairobi
    memory_limit = 512M
    max_execution_style = 60

    At this point, you need to set the cron for Cacti. To do this, you should first edit the /etc/cron.d/cacti file:

    sudo vim /etc/cron.d/cacti

    To have a Cacti poll for data every 5 minutes, you can uncomment the following line:

    */5 * * * *   apache /usr/bin/php /usr/share/cacti/poller.php > /dev/null 2>&1

    After saving the changes, you can exit the configuration file.

    Modifying the Apache configuration file enables remote access to Cacti. To do this, enter the following command:

    sudo vim /etc/httpd/conf.d/cacti.conf

    Now you should change the following lines in the file:

    – Modify Require host localhost to require all grants.

    – Change Allow from localhost to Allow from network subnet.

    – Specify your network subnet.

    To apply the changes, just restart the Apache and PHP-fpm services with the following command:

    sudo systemctl restart httpd
    sudo systemctl restart php-fpm

    Finally, you need to enable HTTP service on your Firewall by executing the following command:

    sudo firewall-cmd --permanent --add-service=http
    sudo firewall-cmd --reload

    How to Configure Cacti on AlmaLinux 8

    First, you should visit your server’s IP with the following command:

    http://server-ip/cacti

    After viewing the login page, you should log in with the default credentials:

    Username: admin
    Password: admin

    Then click on Login:

    Cacti-Login-page

     

    Now you need to set the default Cacti admin login password:

     

    Change-Cacti-Admin-Password

     

    Next, you should accept the GPL license agreement and then click on Begin:

     

    Cacti-Agreement

     

    Cacti execute pre-installation tests to ensure that the necessary PHP modules and database settings are installed. Then, click Next to continue:

     

    Cacti-Pre-Installation-Check

     

    Now you should choose the New Primary Server as the type of installation and then verify the database connection parameters are right:

     

    Cacti-Installation-Type-5

     

    At this point, you can check for directory issues and confirm that there are proper permissions. Then click on Next; but if there is a problem you should click on Previous and correct the problems:

     

    Cacti-Permission-Check-6

     

    Then the installation of binary paths of the required packages is checked by the installer:

     

    Cacti-Binary-Checks

     

    Now you should validate the data input methods and read the instructions; then check the ‘I have read this statement’ box:

     

    Cacti-Validation-Whitelist-Protection

     

    Next, you need to choose the cron interval and input your network subnet. Then click Next:

     

    Cacti-Network-Settings

     

    Cacti has templates with which you can monitor and graph a variety of network devices, including Linux and Windows computers. Check all the options to make sure you get all the templates you need. Then click on Next:

     

    Cacti-Templates

     

    Now it is being checked whether the database/server collation is compatible with UTF8. Then click on Next:

     

    Cacti-UTF8 - Install and Configure Cacti on AlmaLinux

     

    Now you should click on the Confirm Installation checkbox and then click on the Install:

     

    Cacti-Installation on almalinux

     

    After completing the installation of the necessary packages, you can click on Get Started:

     

    configure cacti on almalinux

     

    Finally, you can see the Cacti dashboard:

     

    Cacti-Dashboard - Install and Configure Cacti on AlmaLinux

     

    You can navigate through Graph –> Default Tree –> Local –> Choose Your Device to view the graphs:

     

    Cacti-Linux-Server-Monitoring - Install and Configure Cacti on AlmaLinux

     

    Conclusion

    This article introduced one of the best monitoring tools called Cacti. In the continuation of the article, we taught how to install and configure Cacti on AlmaLinux 8. If you want to install Cacti on your AlmaLinux system, you can get inspired by this tutorial.

    FAQ

    Do we need any additional steps after installing Cacti?

    Yes, you should setup device polling, configure graphs and you should define devices in cacti monitoring.

    Is it possible to install Cacti on other distributions?

    Yes, you can install it o various Linux distributions like CentOS, Rocky Linux, Ubuntu, and so on.

  • Easy Purchase Admin RDP with Cardano (ADA)

    Easy Purchase Admin RDP with Cardano (ADA)

    Cardano is one of the largest digital currencies worldwide and the cryptocurrency associating with it was calling ADA. Of course, it should note that most people use these terms interchangeably. In this post, we will show the way to easily purchase Admin RDP with Cardano. Admin RDP is a good server that gives you administrator access and is known as a dedicated RDP. Here, you can have a dedicated IP and dedicated resources too. Our website will give you the opportunity to buy Admin RDP using Cardano.

    Benefits of Admin RDP

    Buying Admin RDP will bring lots of benefits for you. It is the cheapest RDP with admin access and is fast enough to give you a good experience of using a remote desktop. Admin RDP provides a secure connection to computers running the Windows operating system. Using Admin RDP for Windows, you can restrict access to specific computers through IP address or hostname.

    Steps to Buy Admin RDP With Cardano

    In previous articles, we provided a full explanation of Cardano digital currency. In this section, we will show the steps to buy Admin RDP with Cardano. So, follow the instructions of this post, to find out how to go through this process.

    – First, you should go to the main page of our website and click on the Admin RDP tab or directly refer to the Admin RDP page.:

    Buy Admin RDP With Cardano

    – Scroll down to see the plans. Here, you can choose the desired plan for Admin RDP to purchase:

    choose the proper plan for admin rdp

    – This section is related to the configuration part. In this part, you can choose the proper Operating System, the desired server Location, and the cycle of your payment and press Continue:

    choose admin rdp location and operating system

    – Then, you will redirect to the Review & Checkout section. Review the details of the chosen plan and click on the Checkout button.

    Tip: If you received any Promo Code for a discount. Enter the code inside the box below:

    review and checkout admin rdp payment

    On this page, you should sign up and insert your personal information, or click on the Already Registered button, if you created an account before:

    how to register on neuronvm

    – The next step is related to the payment details. Select the All Cryptocurrency icon and add notes or extra information if it is requiring, and select the Complete Order button:

    choose admin rdp payment method

    – Here, you can enter the needed Billing information. So scroll to select the Cardano cryptocurrency and press Complete Checkout to finish the purchase process:

    how to buy admin rdp with ada

    The last step is to identify the crypto Payment ID and Verification Mode. To achieve more information about your payment refer to the What to do Next Icon and click to see the information and confirm the payment:

    how to buy admin rdp with ada

    The purchase details will be sent to you by email.

    Conclusion

    This tutorial was prepared to help you learn the way of purchase Admin RDP with Cardano. Use the instructions and have an easy payment process. Admin RDP would be a great choice for you. Get this practical server for a more reasonable price and feel the difference. If you need any help or have any questions, just leave a comment.

    FAQ

    What is important about buying Admin RDP?

    It is very important to understand the legal implications and ensure that the purchase is on the way of applicable laws and regulations.

    How many users allow to access RDP?

    As a default, just 2 users are allowed to access Admin RDP, and if you want to connect more than 2 at the same time, then you have to install the RD session host role on your virtual machine.

  • Tutorial Set Up Time Synchronization on Rocky Linux

    Tutorial Set Up Time Synchronization on Rocky Linux

    Accurate timekeeping is a critical component in the deployment of modern software. On the other hand, it should be noted that out-of-sync time can cause errors, data corruption, and other difficult debugging issues. By reading this article, you will learn how to Set Up Time Synchronization on Rocky Linux. Therefore, if you are interested in Rocky Linux distribution, we suggest that you stay with us until the end of this article.

    What is Time Synchronization?

    Time Synchronization is the process of synchronizing the time of independent clocks. Clocks will diverge without synchronization. Clocks and timepieces often use relatively low-cost components that are not accurate. Time Synchronization creates time accuracy between computer clocks in an Ethernet system.

    A client’s time may be synchronized with another server, a reference time source such as a radio or satellite receiver, or a GPS time server. Typical time service configurations use additional servers and diverse network paths to provide high accuracy and reliability. In the continuation of this article, learn about the setup time synchronization on Rocky Linux.

    How to Set Up Time Synchronization on Rocky Linux

    First, you should buy a Linux VPS with the Rocky Linux Operating system. We recommend that you visit the quality and affordable plans on our website. In the beginning, you should list the available time zone by entering the following command:

    sudo timedatectl list-timezones

    Now you need to set the timezone of your location using the following command:

    sudo timedatectl US/Canada

    There are two types of NTP daemons including chronyd and ntpd. To avoid two NTP daemons from running on the same machine at a time, select one and use it.

    In this article, you can synchronize time with the help of two NTP daemons:

    1) Time Synchronization using chronyd which is suitable for virtual systems.

    2) Time Synchronization using ntpd which is suitable for the network systems.

    Time Synchronization Using chronyd

    First, you can install the chronyd package with the following command:

    sudo yum install chrony

    chronyd can be used to manually synchronize Rocky Linux server time with the remote NTP server:

    chronhyd -q 'server 0.europe.pool.ntp.org iburst'

    Then run the following command to start the chronyd service:

    sudo systemctl start chronyd

    Now you should edit the configuration file:

    sudo vi /etc/chrony.conf

    Next, you should add the following lines:

    server 0.centos.pool.ntp.org iburst
    server 1.centos.pool.ntp.org iburst
    server 2.centos.pool.ntp.org iburst
    server 3.centos.pool.ntp.org iburst
    server 0.rhel.pool.ntp.org iburst
    server 1.rhel.pool.ntp.org iburst
    server 2.rhel.pool.ntp.org iburst
    server 3.rhel.pool.ntp.org iburst

    Now save the file and exit and then restart the services by entering the following command to apply the changes:

    sudo systemctl restart chronyd

    You need to enable these services to run at every boot:

    sudo systemctl enable chronyd

    You can verify if your time system is synchronized or not with the following command:

    chronyc tracking

    Reference ID is the ID and name of the server with which your system time is currently synchronized. Stratum indicates the number of hops away from the server connected to the reference clock.

    The following command can list information about the current time sources that chronyd uses:

    chronyc sources

    You can list information about drift speed and offset estimation of any source that uses chronyd with the following command:

    chronyc sourcestats -v

    Time Synchronization Using ntpd

    First of all, install the ntpd package by executing the following command:

    sudo yum install ntp

    Next, you need to start the ntpd services using the following command:

    sudo systemctl start ntpd

    Now you should edit the configuration file.

    sudo vi /etc/ntp.conf

    Then you should add the following lines:

    server 0.centos.pool.ntp.org iburst
    server 1.centos.pool.ntp.org iburst
    server 2.centos.pool.ntp.org iburst
    server 3.centos.pool.ntp.org iburst
    server 0.rhel.pool.ntp.org iburst
    server 1.rhel.pool.ntp.org iburst
    server 2.rhel.pool.ntp.org iburst
    server 3.rhel.pool.ntp.org iburst

    Save the file and exit.

    Now you need to restart the services by executing the following command for the changes to take effect:

    sudo systemctl restart ntpd

    Finally, you should enable services using the following command to run them on every boot:

    sudo systemctl enable ntpd

    Conclusion

    Time Synchronization is essential to determine certain activities of a computer. Every modern system has a mechanism that automatically sets the time of the machine. NTP is one of these mechanisms, and this article taught you how to synchronize time with your NTP server. In this article, you were taught how to set up Time Synchronization on Rocky Linux.

  • Tutorial Install and Use Webmin on AlmaLinux 8.4

    Tutorial Install and Use Webmin on AlmaLinux 8.4

    The Control Panel is a set of sub-programs that can be used to configure various aspects of the Operating System. The Control Panel is the center of all operating system settings and is designed to make changes to the mouse, keyboard, sound, speakers, and screen. Webmin is also a Control Panel and Graphical User Interface for hosting. After reading this article, you can learn how to Install and Use Webmin on AlmaLinux 8.4 from the AlmaLinux training series.

    What is Webmin?

    Webmin is a web-based Control Panel and Graphical User Interface for Linux systems that can be used for free. You can configure all aspects of the system through your web browser with Webmin. It should note that Webmin removes the need to manually edit Linux/Unix configuration files, allowing you to manage a server from the console or remotely. It also allows you to control many machines through a single interface or seamless access to other Webmin hosts on the same subnet or LAN.

    Webmin Features

    1- Configure Email Server 2- Configure Apache Web Server 3- Configure DNS Server 4- Data Backup 5- Manage users and User groups

    How to Install Webmin on AlmaLinux 8.4

    First, you should buy a Linux VPS with the AlmaLinux Operating system. Then, switch to root user and log in as root to run all commands:
    sudo -i

    You need to add the yum Webmin repository to AlmaLinux 8.4 so that you can fetch Webmin packages for installation. Enter the following command in your Terminal and press Enter:

    cat << EOF > /etc/yum.repos.d/webmin.repo
    [Webmin]
    name=Webmin
    mirrorlist=https://download.webmin.com/download/yum/mirrorlist
    enabled=1
    gpgkey=http://www.webmin.com/jcameron-key.asc
    EOF
    Then you should update the system by entering the following command, which refreshes the repository cache and makes the system recognize the latest added repo of Webmin:
    dnf update
    In this step, you can download and install Webmin on the AlmaLinux RPM-based Linux Operating System:
    dnf install webmin
    Next, you should open Webmin port 10000 in the firewall to access the web interface of this web-based system configuration tool from any system browser that can access the IP address of the server or domain. Run the following command:
    firewall-cmd --add-port=10000/tcp --permanent
    firewall-cmd --reload

    How to Use Webmin on AlmaLinux 8.4

    Open Webmin through your web browser and specify the name of the computer and port that Webmin is running on. Note that if the Webmin installed in AlmaLinux is managed through a browser, its IP address or domain should be specified in the URL box along with port 10000. But if you are using Webmin in a GUI system, the management should be done using the local URL in the web address http://localhost:10000 and if only encrypted communication is possible in the system, just replace http with https:
    https://server-ip-address:10000
    or
    https://example.com:10000
    If SSL isn’t implemented, you will receive a ‘Your connection is not private‘ alert. You should click on Advanced and then click the Proceed to x.x.x.x link. Now you should enter your username and password. Be sure to enter AlmaLinux 8.4 server root as your username and password. The Webmin Dashboard running on AlmaLinux is as follows, where the user can manage its server:

    webmin dashboard on almalinux

    Conclusion

    Webmin is easy to use and offers several options for administrators to manage their Linux server through web-based remote access. In this article, Webmin Control Panel was introduced and how to install and use Webmin on AlmaLinux 8.4 was taught.
  • A Full Introduction to CWP

    A Full Introduction to CWP

    CWP or Control Web Panel is an application software for server management in Linux systems, which was previously known as a Linux panel. This system has many features for managing servers, which makes learning easy for beginners who don’t have much experience in using the command line. So, here we will analyze and try to give a full introduction to CWP.

    What is CWP?

    As we mentioned before, CWP is a management system that is created for Linux distributions specifically AlmaLinux. It is produced to allow users to manage, edit, and maintain website content without requiring advanced technical knowledge. This control panel has a simple and understandable area where the navigation menu is in the form of a sidebar with other subsections. We suggest that you choose and buy from the cheap but high-quality Linux VPS server plans offered on our website to set up the CWP control panel.

    The dashboard is like the image below:

    cwp dashboard

    Important Features of CWP

    CentOS Web Hosting servers or the CWP has many features. In this section, we try to analyze the most notable ones for you:

    – CWP is equipped with user-advanced features and makes it possible to easily manage websites with modern and advanced user interfaces.

    – This control panel provides complete support for the automation of processes. You can set a billing software to help with the creation of user accounts or run user backups or cronjobs, etc.

    – It contains a powerful file manager. Also, you can manage FTP users and user limits with CWP.

    – The advanced file manager is equipping with a code editor that makes it easy to manage your websites.

    – This control panel contains many security and safety features that are dedicating to you. These security functions are integrating into CWP:

    cwp security

    – CWP has several monitoring tools. These tools are NetData, Live monitoring of MySQL process, an AI bot, and so on.

    – An advanced backup system with daily, weakly, and monthly backup options in all fields.

    – CWP helps you configure client packages and service plans so easily.

    – Multiple billing systems are supporting by CWP. These systems are WHMCS, Hostbill, Wisecp, and Blesta.

    What Is the difference between Free and CWPpro?

    As the name suggests, you can get the free version of CWP and use it without any payment, but it has features that require a premium version. These features are:

    – The ability to create unlimited CWP users

    – Having sales agents

    – Immediate update of CWP and ModeSecutity

    – Using multiple versions of PHP simultaneously

    – Migration tools for Cpanel

    – Providing additional system security solutions

    Note that, these are all for use in the CWP interface and you can log into the terminal to update the software or install your web security.

    Conclusion

    This article is prepared to introduction to CWP or Control Web Panel and makes a clear understanding of it for you. By studying the features and analyzing this control panel, you can see how useful and applicable is CWP. We hope you enjoyed the content.

    FAQ

    How secure is CWP

    The security in this control panel depends on various factors like implementation, authentication mechanisms, regular updates, and secure coding practices that are completely effective in this field.

    Cpanel or CWP; Which one is better?

    CWP provides a completely free package, whereas, Cpanel is a paid version.

  • Top way to Install Xubuntu on VirtualBox

    Top way to Install Xubuntu on VirtualBox

    If you aim to install Xubuntu on VirtualBox, you are on the right pass. In this context, we will introduce you to the best way to install this beautiful and user-friendly operating system. Xubuntu is designed for those who want to get the most out of their services and is derived from the Ubuntu operating system.

    What is Xubuntu?

    As we mentioned in the introduction part, Xubuntu is a user-friendly and lightweight distribution based on Ubuntu which is used Xfce as its graphical desktop and is a stable desktop environment for users. a good feature of this distribution is its satisfactory performance on old hardware. Xubuntu is developed by Canonical Ltd. The noticeable point is that this operating system only includes GTK+ applications.

    Prerequisites

    In this section, we will examine Xubuntu installation step-by-step on VirtualBox. But before starting the installation process, it is better to provide the necessary prerequisites. You must first install VirtualBox on the system. We suggest that you visit the plans offered in NeuronVM to buy a Windows VPS server.

    Download and Install VirtualBox

    1- As the first step you should download the VirtualBox from the VirtualBox official website, so that, you can run Xubuntu on it and click on Windows hosts.

    2- As you finished downloading the .exe file. You can start the installation process using the VirtualBox wizard. Press Next to continue:

    Download and Install VirtualBox

    3- In the custom setup, choose the VirtualBox application and select the location of your installation file by pressing the Browse button. Now press Next:

    Install VirtualBox on windows

    4- You can choose the way you want features to be installed and press Next:

    VirtualBox custom setup

    5- In this section, by pressing the Yes button you will accept the installation:

    Install VirtualBox on windows vps

    6- At the last window, you can press the Install button and start the installation:

    how to Install VirtualBox

    ***

    Installing VirtualBox on windows

    8- As you finished the installation part, press the Finish button:

    Download and Install VirtualBox

    Now that you have VirtualBox on your system, it’s time to create it. For this reason, open the VirtualBox manager from your desktop shortcut and click on the New button, which will look like this:

    virtualbox manager

    Here, you should choose a Name for your VirtualBox and set the type on Linux, and the version on Ubuntu:

    create virtual machine

    Now, choose the proper Memory size and press Next:

    create virtual machine

    On the created virtual machine window, check the Create a virtual hard disk now option and Create to add a hard disk to your virtual machine:

    create virtual machine

    Here you should choose the type of file you want for your hard disk:

    hard disk file type on virtual machine

    Choose the storage of your hard disk. It is better to check the Dynamically allocated option and press Next:

    storage on physical hard disk on virtual machine

    Here, in the first box, you should type the name of your virtual machine and specify the size of the virtual hard disk. At last, press create:

    virtual machine file location and size

    Now, you can see the created VirtualBox and it’s time to add the Xubuntu operating system.

    How to Install Xubuntu on VirtualBox

    After downloading the iso file, save the desired file in a specified path. Open VirtualBox and click on the Start button to boot the virtual machine and go to the browse part to put the Xubuntu file. Like the image below:

    adding xubuntu

    As you created the virtual machine, let’s do the instruction below to add Xubuntu. Notice that you should download the iso file of Xubuntu on a 64-bit operating system. For this reason, go to the official page of Xubuntu.

    Here, you will see the Welcome page. Choose the preferred language and click on Install Ubuntu:

    install xubuntu on virtualbox

    In this section, choose the Erase disk and install Xubuntu and click on Install Now:

    installing xubuntu

    There will appear a pop-up window. Press Continue to confirm the changes you did to the disk:

    xubuntu installation type

    Choose the proper location and go to the next part:

    how to setup xubuntu

    Choose the language of the keyboard layout and continue:

    xubuntu kayboard layout settings

    In this section, fill the related details and determine the login way:

    configure xubuntu on virtualbox

    As you continue the process, here you will encounter the Xubuntu Welcome page and the installation process will begin:

    xubuntu installation

    Well done. The following image shows that you successfully finished the installation part. You will restart the system to confirm the changes:

    xubuntu installation progress on virtualbox

    As a result, you have Xubuntu on your VirtualBox. Enjoy using this applicable operating system.

    Conclusion

    Xubuntu is an operating system, based on Ubuntu and if you decided to use it on your system, you should use a virtual machine. Also, as we mentioned in this article, you should download the iso file. We tried to guide you to install Xubuntu on Windows using a VirtualBox and hope it was helpful for you. If you have any questions, leave a comment.

    FAQ

    Is Xubuntu a stable version?

    In fact, Xubuntu is the LTS version which means it has been supported for a long time. LTS versions are also provided as stable.

    How much RAM is needed for Xubuntu?

    As a minimum, you should allocate 512 MB RAM for Xubuntu but the recommended amount is 2 GB.

  • How To Install and Secure Memcached on Ubuntu 22.04

    How To Install and Secure Memcached on Ubuntu 22.04

    Memory object storage systems such as Memcached can optimize the performance of the backup database by temporarily storing information in memory and preserving frequently requested records. This will reduce the number of direct requests to your databases. We’ll look at how to add authentication to secure Memcached using Simple Authentication and Security Layer (SASL), as well as how to connect Memcached to a local or private network interface to make sure only on networks trusted by users. After reading this post, you will fully learn How To Install and Secure Memcached on Ubuntu 22.04. Therefore, we suggest you stay with us until the end of this article.

    What is Memcached?

    Memcached is a very powerful and free cache system that has been released as open source. Memcached is software for performing cache operations on Dynamic website servers that will make better and more efficient use of resources. Typically, it is using as a cache system to speed up applications by storing various objects from the results of database conversations.

    This system is typically using to speed up websites that use the database, using data storage and objects in main memory (RAM) to reduce the number of times the data is read from an external data source (for example, the database). In the continuation of this article, you will learn about Install and Secure Memcached on Ubuntu 22.04

    Prerequisites

    A Linux VPS Ubuntu 22.04 server

    – Non-root sudo user

    – firewall enabled.

    Install and Secure Memcached on Ubuntu 22.04

    In this section, we are going to teach you step-by-step how to Install and Secure Memcached on Ubuntu 22.04. If you do not have Memcached installed on your server, install it from the official Ubuntu repositories. First, make sure your local package list is updated using the following command:

    sudo apt update

    Install the official package of memcached as follows:

    sudo apt install memcached

    You can install libmemcached-tools, which contain various tools that you can use to check, test, and manage your Memcached server. Add the package to the server using the following command:

    sudo apt install libmemcached-tools

    Memcached is installed as a service on your server, with tools that allow you to test its connectivity. To launch Memcached, run the systemctl command:

    sudo systemctl start memcached

    You can now go to secure the configuration settings.

    How to Configure Memcached Network Settings

    If the Memcached server only needs to support local IPv4 connections using TCP, you can skip this step and go to the next step. But if you want to configure Memcached to use UDP sockets, Unix domain sockets, or add support for IPv6 connections, follow the steps in this section.

    First, make sure your Memcached instance listens to the local IPv4 127.0.0.1 Loopback interface. The current version of Memcached, which ships with Ubuntu and Debian, has its -l configuration parameter configured on the local interface to receive only connections from the server where Memcached runs.

    Use the following command to verify that Memcached is currently connected to the local IPv4 127.0.0.1 interface and is listening for TCP connections:

    sudo ss -plunt

    The flags will alter ss output in the following ways:

    -p adds the name of the process that is using a socket

    -l limits the output to listening sockets only, as opposed to also including connected sockets to other systems

    -u includes UDP-based sockets in the output

    -n displays numeric values in the output instead of human-readable names and values

    -t includes TCP-based sockets in the output

    You should receive the output as follows:

    This output verifies that Memcached is connected to the IPv4 Loopback address 127.0.0.1 using the TCP protocol. Now that it has been verified that Memcached is configured to support IPv4 with TCP connections only, you can edit /etc/memcached.conf to support UDP connections, Unix domain sockets, or IPv6.

    How to Configuration IPv6 to Memcached

    To enable IPv6 connections to Memcached, open the configuration file with Nano or other editors:

    sudo nano /etc/memcached.conf

    First, find the following command in the file:

    . . .
    -l 127.0.0.1

    This line is where Memcached is configuring to listen to the local IPv4 interface. To add IPv6 support, add the IPv6 local loop address command (:: 1) as follows:

    . . .
    -l 127.0.0.1
    -l ::1

    Save and close the file by pressing CTRL+O, then ENTER to save, and then CTRL+X to exit Nano. Also, restart Memcached using the systemctl command:

    sudo systemctl restart memcached

    You can now check that Memcached also responds to IPv6 connections by repeating the ss command in the previous section:

    sudo ss -plunt

    You should receive the output as follows:

    Output
    Netid State Recv-Q Send-Q Local Address:Port Peer Address:Port Process 
    . . .
    tcp LISTEN 0 1024 127.0.0.1:11211 0.0.0.0:* users:(("memcached",pid=8889,fd=26)) 
    . . .
    tcp LISTEN 0 1024 [::1]:11211 [::]:* users:(("memcached",pid=8889,fd=27))

    Output segments show that Memcached is now responding to TCP connections in the local IPv6 interface. If you want to disable IPv4 support and only listen to IPv6 connections, you can remove the -l 127.0.0.1 command from /etc/memcached.conf and restart the service using the systemctl command.

    How to Configure UDP on Memcached

    If you want to use Memcached with UDP sockets, enable UDP support by editing the configuration file and opening /etc/memcached.conf using the nano or custom editor, then add the following command to the bottom of the file do:

    . . .
    -U 11211

    If you do not need TCP support, find the -p 11211 command and change it to -p 0 to disable TCP connections. After editing the file, save and close it by entering CTRL+O to save and then CTRL+X to exit.

    Restart the Memcached service with the systemctl command to apply the changes:

    sudo systemctl restart memcached

    Memcached listens to UDP connections using the following command:

    sudo ss -plunt

    If you have disabled TCP support and enabled IPv6 connections, you should get the following output:

    [secondary_label Output] 
    Netid State Recv-Q Send-Q Local Address:Port Peer Address:Port Process 
    . . .
    udp UNCONN 0 0 127.0.0.1:11211 0.0.0.0:* users:(("memcached",pid=8889,fd=28))
    udp UNCONN 0 0 [::1]:11211 [::]:* users:(("memcached",pid=8889,fd=29))
    . . .

    Note that if you only enable IPv4 connections and enable TCP connections, your output may be different.

    How to Configure Unix Domain Sockets

    If you want to use Memcached with Unix domain sockets, you can enable support by editing the configuration file. Note that if you configure Memcached to use the Unix domain socket, Memcached disables TCP and UDP support, so before enabling socket support, make sure your applications do not need to connect using those protocols. Open /etc/memcached.conf using Nano or other editors, then add the following commands to the bottom of the file:

    . . .
    -s /var/run/memcached/memcached.sock
    -a 660

    The -a flag specifies the permissions in the socket file. Make sure the user to connect to Memcached is part of the Memcache group on your server, otherwise, a permission message will reject when you try to access the socket. Then, restart the Memcached service with the following command to apply the changes:

    sudo systemctl restart memcached

    Make sure Memcached listens to Unix domain socket connections using the following command:

    sudo ss -lnx | grep memcached

    The -x flag restricts the ss output to display socket files. You should receive the outputs as follows:

    Output
    u_str LISTEN 0 1024 /var/run/memcached/memcached.sock 20234658 * 0

    Now that you have configured the Memcached network settings, go to the next step, adding SASL for authentication to Memcached.

    How to Add Authorized Users to Memcached

    To add authentication users to the Memcached service, use Simple Authentication and Security Layer (SASL), which separates authentication procedures from application protocols. First, add SASL support to the server and configure the user with authentication. Also, enable SASL in the Memcached configuration file and verify that everything is working properly.

    Adding a Verified User

    To start adding SASL support, you must install the sasl2-bin package, which includes management programs for the SASL user database. This tool helps you create an authenticated user. To install this tool, run the following command:

    sudo apt install sasl2-bin

    Create a directory and file that Memcached checks the SASL configuration settings using the mkdir command:

    sudo mkdir -p /etc/sasl2

    Now create the SASL configuration file using nano or the editor:

    sudo nano /etc/sasl2/memcached.conf

    Add the following command:

    log_level: 5
    mech_list: plain
    sasldb_path: /etc/sasl2/memcached-sasldb2

    In addition to setting the report level, mech_list is set to plain, which indicates to Memcached that it must use its password file and confirm the plain text password. The last command you added specifies the path to the user database file that you will create in the next step. Save and close the file when done.

    Now create a valid SASL database and use the saslpasswd2 command with the -c flag to create a new user entry in the SASL database. The user here will be Linda, but you can replace this name with your own. The -f flag specifies the path to the database. This is the path you set in /etc/sasl2/memcached.conf:

    sudo saslpasswd2 -a memcached -c -f /etc/sasl2/memcached-sasldb2 linda

    Give the SASL database ownership to the user and memcache group with the following chown command:

    sudo chown memcache:memcache /etc/sasl2/memcached-sasldb2

    You now have a SASL configuration that Memcached uses for authentication. Next, verify that Memcached is running with its default settings, then reconfigure it and verify that it works with SASL authentication.

    How to Configure SASL Support of the Memcached

    First test the connection of the Memcached instance with the memcstat command. This check helps determine if Memcached is running and properly configured before activating SASL and authenticating the user. After making changes to the configuration files, run the command again to check for different outputs. To verify that Memcached is enabled and running using the memcstat command, type the following:

    memcstat --servers="127.0.0.1"

    If you are using IPv6, replace :: 1 with IPv4 127.0.0.1. If you are using a Unix domain socket, use the socket path instead of the IP address, for example –servers =/var/run/memcached/memached.sock. When you run the memcstat command and successfully connect to Memcached, you should get the following output:

    Output
    Server: 127.0.0.1 (11211)
    pid: 2299875
    uptime: 2020
    time: 1632404590
    version: 1.5.22
    . . .

    Tip: If you are using Memcached with UDP support, the memcstat command cannot connect to the UDP port. Use the following netcat command to confirm the connection:

    nc -u 127.0.0.1 11211 -vz

    If Memcached responds, you should get the output as follows:

    Output
    Connection to 127.0.0.1 11211 port [udp/*] succeeded!

    If you are using Memcached with IPv6 and UDP, the command should look like this:

    nc -6 -u ::1 11211 -vz

    Enable SASL now. Add the -S parameter to the configuration file. Reopen the file with Nano:

    sudo nano /etc/memcached.conf

    In the file, add the following command:

    . . .
    -S

    Next, find and ignore the -vv option, which provides full output to /var/log/memcached. The command without comment should be as follows:

    . . .
    -vv

    Save and close the file. Restart the Memcached service using the systemctl command below:

    sudo systemctl restart memcached

    Check the journalctl report for Memcached to make sure SASL support is enabled:

    sudo journalctl -u memcached |grep SASL

    You should receive the output command as follows to indicate that SASL support is enabled:

    Output
    Sep 23 17:00:55 memcached systemd-memcached-wrapper[2303930]: Initialized SASL.

    Now try connecting to Memcached again. Despite SASL support and initialization, the following memcstat command must fail without valid authentication:

    memcstat --servers="127.0.0.1"

    The command should not generate output. Enter the following shell command to check the status as follows:

    echo $?

    $? Always returns the exit code of the last command that came out. Anything other than 0 indicates process failure. In this case, you should get exit status 1, which indicates the failure of the memcstat command. Re-running memcstat, with the username and password, verifies that the authentication process works.

    If you use different credentials, replace the following command with the values linda and your_password:

    memcstat --servers="127.0.0.1" --username=linda --password=your_password

    You should receive the output as follows:

    Output
    Server: 127.0.0.1 (11211)
    pid: 3831
    uptime: 9
    time: 1520028517
    version: 1.4.25
    . . .

    Memcached is now configuring and executing with SASL support and user authentication.

    Allowing Access Over the Private Network (Optional)

    Memcached is configuring to listen only to the local loopback interface (127.0.0.1), which protects the Memcached interface from being exposed to outside parties. There may be times when you need permission to access from other servers. You can configure it to connect Memcached to a private network interface.

    How to Restrict IP Access with a Firewall

    Before configuring settings, set firewall rules to restrict machines that can connect to your Memcached server. You must first record the private IP address of each device you used to connect to Memcached. Once you have a private IP address, add the explicit firewall rule to allow the device to access Memcached. If you are using a UFW firewall, restrict access to the Memcached instance by entering the following commands in the Memcached server:

    sudo ufw allow from client_system_private_IP/32 to any port 11211

    If more than one system has access to Memcached over a private network, be sure to add the ufw rules for each device using the above rule as a template. Make changes to the Memcached service to connect to the server’s private network interface.

    Memcached Connection to Private Network Interface

    Now that your firewall is in place, configure Memcached to connect to the server’s private network interface instead of 127.0.0.1. Find the Memcached server’s private network interface using the IP command below.

    ip -brief address show

    Depending on the server network configuration, the output may differ.

    Once you find the IP address or private addresses of the server, reopen the configuration file using Nano:

    sudo nano /etc/memcached.conf

    Find the -l 127.0.0.1 command that you previously checked or modified, and change the address to match the server’s private network interface:

    . . .
    -l memcached_servers_private_IP
    . . .

    If you want Memcached to listen to multiple addresses, add another similar instruction for each address, either IPv4 or IPv6 using the -l memcached_servers_private_IP format. Save and close the file after completing the steps. Then restart the Memcached service:

    sudo systemctl restart memcached

    Check the new settings with ss to confirm the change:

    sudo ss -plunt

    Test your external customer connection to make sure you can still access the service. Also, check the access of an unauthorized client (try connecting without a username and password) to make sure your SASL authentication works properly. Also, try connecting to Memcached from another server that is not allowed to connect to make sure the firewall rules created are effective.

    Conclusion

    In this tutorial, you learned How To Install and Secure Memcached on Ubuntu 22.04. Also configure Memcached with IPv4, IPv6, TCP, UDP, and Unix domain sockets and how to secure your Memcached server by enabling SASL authentication. Finally, you learned how to connect Memcached to your local or private network interface and configure firewall rules to restrict access to Memcached. We hope you find this article useful. Share your comments with us via the form below.

  • Tutorial Add a New DNS Zone with WHM on Dedicated Server

    Tutorial Add a New DNS Zone with WHM on Dedicated Server

    In this tutorial, you will learn how to add a new DNS zone with WHM on the dedicated server. To explain this process with an example, we will assume that you have a DNS server with Cpanel permission. In order to be able to display your site on the internet, the only way is to setup the DNS server correctly. So you need to add a DNS zone for your address and run it in the right way.

    What is the DNS Zone?

    DNS is the domain name system and it has the role of converting domain names into IP addresses. In this way, allows browsers to access internet resources and websites. IP addresses are actually like site identifiers and other devices can use them to find your system location.

    Prerequisite

    – A Dedicated Server (We recommend you visit the Cheap Dedicated Server plans presented on our website and choose a plan.)

    – Install cPanel on Dedicated Server

    Buying Cpanel License is easy. Cpanel has a graphical interface and it is like you can manage your server even with little information as a beginner. Of course, you should have some knowledge to control and make changes to this control panel. Because, if you do not master what you are doing, then will disrupt the performance of your server.

    How to Add a New DNS Zone with WHM on Dedicated Server

    Actually, if you have a least Cpanel license, the process of adding a DNS zone is simple and easy. So as the first step, login WHM and follow the direction below:

    login to whm/cpanel

    Go to the DNS functions > Add a DNS Zone

    Add a New DNS Zone with WHM on Dedicated Server

    Then go through the following steps to add a new DNS zone:

    1- You should go to the Domain selection part and as you see the IP field enter the IP address.

    2- Now you see the domain field. Enter your domain name.

    3- At last click the add zone Button, and add a new zone on your server.

    how to add a dns zone on whm

    The Way to Edit an Existing Zone

    In this way, again you should log in to WHM and find the Edit DNS Zone option:

    The Way to Edit an Existing Zone

    Here, you will see the Choose a zone to edit option. In the box, type the domain name of your DNS zone to edit and then click the Edit button to start:

    dns zone editor

    If you want to edit a zone, you should have basic information about your preferred parameters to change. The instructions to apply are from the developers, hosting, and internet service provider. This instruction is based on the model of replacing an entry with the new one.

    For any DNS domain, NS and A records are critical. In this way, the nameservers are specific to the IP addresses that the DNS server responds to. Be careful not to change them randomly because if you make a mistake, your site will fail.

    Conclusion

    Here, we tried to show how you can add a DNS zone with WHM on dedicated server. We did this by using Cpanel. Keep in mind that, if you want to control and manage your WHM server, check to make sure the domain is pointing to your correct server IP.

    FAQ

    Where is the DNS storage location?

    These files are stored on the DNS server and are used by the authoritative name server to perform DNS lookups for the domain.

    Is it possible to delete the DNS zone?

    Of course. First, select a domain name from the choose zones to delete menu. Then click delete on the next interface to confirm that you wish to delete the selected zone