How to Investigate Server Load: Part 2

Reading Time: 12 minutes

Introduction

In this second tutorial on server load, we outline the steps that should be taken when investigating where server load originates and what may be causing your server to become overloaded. As noted in Part 1 of our series, excessive use of any apps or services can typically cause load issues. Here are the four main areas of concern:

  • CPU
  • Memory (including swap)
  • Disk I/O
  • Networking
Continue reading “How to Investigate Server Load: Part 2”

How to Investigate Server Load: Part 1

Reading Time: 7 minutes

Introduction

In this two-part series, we outline the steps to take when investigating where server load originates or causing your server to become overloaded. When running a server that hosts multiple websites, high load issues often crop up. To find out how and why this occurs, read on. 

What is Server Load? 

Server load is a measure of work that a server is experiencing. The load averages represent the average system load over a period of time. Servers calculate load averages as the exponentially damped/weighted moving average of the load numbers. The three values of load average refer to the past one, five, and fifteen minutes of system operation. If you have a single CPU, the load average is a percentage of the system utilization for a specific time period. If you have multiple CPU’s, you must divide by the number of processors to get a comparable percentage. To find the number of processors on the server, run the following command.

Continue reading “How to Investigate Server Load: Part 1”

How Do I Secure My Linux Server?

Reading Time: 6 minutesOur last article on Ubuntu security suggestions touched on the importance of passwords, user roles, console security, and firewalls. We continue with our last article and while the recommendations below are not unique to Ubuntu specifically (nearly all discussed are considered best practice for any Linux VPS server or dedicated server) but they should be an important consideration in securing your server. Continue reading “How Do I Secure My Linux Server?”

How to Secure a Site in IIS

Reading Time: 6 minutesWhen investigating site infections or defacing on a Windows VPS Server, the most common root cause is poor file security or poor configuration choices when it comes to how IIS should access file content.  The easiest way to prevent this is to start with a secure site. Continue reading “How to Secure a Site in IIS”

How to Check Server Load on a Windows Server

Reading Time: 6 minutes

What Does Server Load Mean?

Checking a server’s load allows us to evaluate server resources and confirm they are sufficient for any running application. It enables us to troubleshoot slow performance and reliably pinpoint any server resource that may need attention. While there are many tools and options available, today let’s focus on our Windows VPS Task Manager to help us quickly see what is going on, and interact with applications, processes, and services to identify the load. This article will also include an introduction to Resource Monitor as it can be opened from Task Manager to provide more detail. Continue reading “How to Check Server Load on a Windows Server”

Common Postgres Tasks on CentOS 7

Reading Time: 4 minutesThis guide walks you through some common tasks surrounding a Postgres server. In this tutorial, we’ll cover installing Postgres, creating new databases and users, backing up databases, and more! Let’s dig in! Continue reading “Common Postgres Tasks on CentOS 7”

How to Work With PostgreSQL Databases

Reading Time: 5 minutes

Table of Contents

Listing databases Dump a database Dumping all databases Dump Grants Delete or Drop a Database Delete a Grant Restore a Database Restore Grant Continue reading “How to Work With PostgreSQL Databases”

What is Kubernetes RBAC Authorization

Reading Time: 4 minutes

What is RBAC?

Kubernetes Role-Based Access Control or the (RBAC) system describes how we define different permission levels of unique, validated users or groups in a cluster. It uses granular permission sets defined within a .yaml file to allow access to specific resources and operations.

Starting with Kubernetes 1.6, RBAC is enabled by default and users start with no permissions, and as such, permissions must be explicitly granted by an admin to a specific service or resource. These policies are crucial for effectively securing your cluster. They permit us to specify what types of actions are allowed, depending on the user’s role and their function within the organization.

Continue reading “What is Kubernetes RBAC Authorization”

How To Give a Linux User Root-level Access Using sudo

Reading Time: 2 minutes

Linux has a robust permissions system. This is a very good thing, as it enables a clear separation of roles among users, especially between the root user and your average user. Sometimes, though, you might want your average user to have some or all of root’s privileges. In Linux, this is accomplished with sudo.

Continue reading “How To Give a Linux User Root-level Access Using sudo”