Knowledgebase

knowledgebase List

Explore our comprehensive Knowledge Base – your go-to resource for in-depth articles, step-by-step guides, FAQs, and expert tips. Whether you're troubleshooting issues, learning new features, or optimizing your experience, find clear, searchable solutions tailored to your needs. Start searching below or browse by category!


image

Knowledgebase

How to connect Cloud VPS

How to Connect to a Cloud VPS: A Step-by-Step Guide

Connecting to a Cloud Virtual Private Server (VPS) involves provisioning the instance, obtaining access credentials, establishing a secure remote connection, and performing initial configuration. This guide provides a structured overview applicable to major providers such as Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure, DigitalOcean, and others.

1. Provision the VPS

Log in to your cloud provider’s management console and navigate to the compute or instance creation section. Select the desired parameters:

  • Operating System: Linux distributions (e.g., Ubuntu, CentOS) or Windows Server.
  • Instance Type: CPU, memory, and storage specifications based on workload requirements.
  • Region/Zone: Proximity to users for optimal latency.
  • Networking: VPC/subnet configuration and public IP assignment.

Complete the creation wizard to deploy the instance. Provisioning typically takes a few minutes.

2. Retrieve Access Credentials

Upon successful deployment, the provider supplies:

  • Public IP Address or Hostname
  • Username: Often root (Linux) or Administrator (Windows).
  • Authentication Method: Password (temporary) or SSH key pair (recommended for security).

Store these details securely, e.g., in a password manager. For SSH keys, download the private key file (.pem or .ppk) if generated by the provider.

3. Connect via SSH (Linux/macOS/Unix-based Systems)

SSH provides encrypted remote access. Open a terminal and execute:

bash

ssh username@server_ip
  • Replace username with the provided username (e.g., ubuntu for Ubuntu instances).
  • Replace server_ip with the public IP or hostname.

If using an SSH key:

bash

ssh -i /path/to/private_key.pem username@server_ip

Enter the password if prompted (or approve key-based authentication). First-time connections will prompt to verify the host fingerprint.

4. Connect via RDP (Windows-based Systems)

For Windows VPS instances:

  1. Open Remote Desktop Connection (search mstsc in Windows Start).
  2. Enter the VPS public IP or hostname.
  3. Provide the username and password when prompted.

Enable Network Level Authentication (NLA) in the instance settings for enhanced security.

5. Perform Initial Configuration

After connecting, execute essential setup tasks:

  • Update System Packages:
    • Ubuntu/Debian: sudo apt update && sudo apt upgrade -y
    • CentOS/RHEL: sudo yum update -y or sudo dnf update -y
  • Configure Firewall:
    • Use ufw (Ubuntu): sudo ufw allow OpenSSH && sudo ufw enable
    • Or cloud provider security groups to restrict inbound traffic.
  • Create Non-Root User (Linux): bashsudo adduser newuser sudo usermod -aG sudo newuser Disable root SSH login in /etc/ssh/sshd_config.
  • Set Timezone and Locale: sudo dpkg-reconfigure tzdata

6. Install Required Software

Tailor the environment to your use case:

  • Web Server: sudo apt install nginx or apache2
  • Database: sudo apt install mysql-server or postgresql
  • Programming Runtimes: Node.js, Python, etc.

Automate installations with configuration management tools like Ansible for reproducibility.

7. Implement Ongoing Maintenance

  • Apply Security Patches: Schedule regular updates (unattended-upgrades on Debian-based systems).
  • Monitor Resources: Use tools like htop, prometheus, or cloud-native monitoring.
  • Backup Strategy: Enable snapshots or automated backups via provider tools.
  • Log Auditing: Review /var/log/auth.log and enable fail2ban for brute-force protection.

Security Best Practices

  • Prefer SSH key authentication over passwords.
  • Use principle of least privilege for user accounts.
  • Restrict firewall rules to necessary ports (e.g., 22 for SSH, 80/443 for web).
  • Enable multi-factor authentication (MFA) where supported.
  • Regularly scan for vulnerabilities with tools like lynis or provider security centers.

By following these steps, you establish a secure and functional Cloud VPS environment. Provider-specific documentation should be consulted for nuanced variations.

How to Restore Partial Backups in cPanel

You can easily restore a cPanel partial backup. Please, note that restoring such a backup will overwrite your existing data.

1. Log in to your cPanel account.


2. In the Files section, click on Backup Wizard.


3. Under Backup/Restore, click on Restore.



4. Under Select Restore Type, choose the appropriate option.



5. Click on Browse. Select the backup file from your computer and click on Upload.

It should display a message that your restore has been successful.

How to Download Backup of Home Directory, MySQL, or Email Only

Backing up is important, and you should do it regularly. Follow this tutorial to make a full backup of your website with cPanel.

1. Log in to your cPanel account.


2. In the Files section, click on Backup Wizard.


3. Under Backup or Restore, click on Back Up.

4. Under Select Partial Backup. choose one of the available backup options to create and download a backup of it. To download a Home Directory backup, click on Home Directory.


5. Confirm by clicking on Home Directory again.

Now, the download will start.

How to Generate and Download a Full Backup of Your cPanel Account

Backing up is important, and you should do it regularly. Follow this tutorial to make a full backup of your website with cPanel.

1. Log in to your cPanel account.

2. In the Files section, click on Backup.


3. Under Full Backup, click on Download a Full Website backup.

4. From the drop-down menu, select Home Directory as the backup destination and enter your email to receive a notification when the backup is complete.

Leave Include integration links as it is.

After the cPanel backup is finished, you will receive a notification. You can download backups from Backup > Download a Full Account Backup.

How to manage Dedicated Servers

Managing a dedicated server involves tasks such as initial setup, ongoing maintenance, security measures, and monitoring to ensure optimal performance and security. Here’s a guide on how to manage a dedicated server:

  • Initial Setup:
    • Provision the server: Purchase or lease a dedicated server from a hosting provider or data center.
    • Choose an operating system: Select the operating system (OS) that best suits your needs, such as Linux (e.g., Ubuntu, CentOS) or Windows Server.
    • Configure network settings: Set up networking configurations, including IP addresses, DNS settings, and firewall rules.

  • Remote Access:
    • Use remote administration tools: Access the server remotely using tools like SSH (for Linux) or Remote Desktop Protocol (RDP) (for Windows).
    • Secure remote access: Ensure secure remote access by using strong authentication methods like SSH keys or VPN connections.

  • Security Measures:
    • Install security updates: Regularly apply OS updates and patches to address security vulnerabilities.
    • Configure firewall: Set up a firewall to control incoming and outgoing traffic, and only allow necessary ports and services.
    • Implement security software: Install antivirus, intrusion detection/prevention systems, and other security tools to protect against malware and unauthorized access.
    • Harden server configurations: Follow security best practices to configure the server securely, such as disabling unnecessary services, limiting user permissions, and using encryption where appropriate.

  • Monitoring and Performance Optimization:
    • Monitor server health: Use monitoring tools to track server resource usage (CPU, memory, disk, network) and detect performance issues or anomalies.
    • Optimize performance: Configure server settings and applications to maximize performance, such as adjusting resource allocation, optimizing database settings, and caching frequently accessed data.
    • Implement backups: Regularly back up critical data and configurations to prevent data loss in case of hardware failures, accidental deletions, or security breaches.

  • Regular Maintenance:
    • Perform routine maintenance tasks: Schedule regular maintenance activities, such as disk defragmentation (for Windows), disk cleanup, log rotation, and database optimization.
    • Monitor logs: Review server logs for errors, warnings, and security-related events, and take appropriate actions to address any issues identified.
    • Update software: Keep server software up to date by installing patches, updates, and new releases to address bugs, security vulnerabilities, and performance improvements.

  • Disaster Recovery Planning:
    • Develop a disaster recovery plan: Create a plan outlining procedures for restoring server functionality in case of disasters such as hardware failures, data corruption, or cyberattacks.
    • Test backups and recovery procedures: Regularly test backups and recovery procedures to ensure data integrity and verify that systems can be restored effectively in case of emergencies.

By following these steps and staying proactive in managing your dedicated server, you can ensure its security, reliability, and optimal performance for your business or organization.

24/7 World-Class Support

Ran into trouble? Contact our Customer Success team any time via live chat or email.

Need help choosing a plan?

Need help? We're always here for you.