How to Configure Floating IP on CoreOS

Once you get a confirmation from the UpCloud Support that a floating IP has been added, you can find it attached to one of your servers at your UpCloud Control Panel, but using the added IP will require some manual setup. Follow the steps below to find out how to get this done on a CoreOS server. […]

Read More

Load Balancing Docker Swarm Mode

Docker Swarm mode not only makes a cluster orchestration a breeze, it also offers an easy way to publish ports for services. Usually, containers are only accessible through their host machine’s IP addresses but in a swarm all nodes participate in an ingress routing mesh. Swarm mode routing mesh The swarm internal networking mesh allows every node […]

Read More

Introduction to Docker Swarm Orchestration

Docker has been at the leading edge of containerized technologies with their Docker Engine and is steadily building features around it. Docker Swarm is the docker native clustering solution that turns a pool of Docker hosts into a single virtual server. In a natural step going forward, the Docker Engine version 1.12 brings a major […]

Read More

How to Deploy Kubernetes on CoreOS Cluster

Containers have been at the development forefront for some time, largely thanks to CoreOS and their container optimized approach, but others are also working to bring containers to the mainstream. A more recent entry to the game comes from Google in the name of Kubernetes, an open-source platform for container deployment automation, scaling, and operations […]

Read More

How to Deploy CoreOS HA Web Server

Managing your CoreOS cluster with fleet allows you to simplify a node configuration process to a few easy tasks. Services run on the cluster are described in systemd unit files combined with fleet-specific properties, that tell fleet where and how to deploy each process. In this article, you will find the required instructions and example files […]

Read More

Getting Started with CoreOS Cluster

CoreOS is an open source container-optimised operating system, the first in its category. It is designed to allow dynamic scaling and management of computing capacity along with an emphasis on security, consistency, and reliability. This get-started-guide is aimed to help anyone at setting up their first CoreOS cluster and getting familiar with the main systems. […]

Read More

Getting started with Kontena on UpCloud

Introduction Kontena is a new developer-friendly platform for orchestrating applications that are run on Docker containers. It simplifies deploying and running containerized applications and by leveraging technologies such as Docker and CoreOS on top of UpCloud high-performance infrastructure, it provides a complete and cost-efficient solution for all types of workloads. In this tutorial, we will […]

Read More

How to Install OpenVPN Access Server

Virtual private network or VPN for short is a convenient way of setting up a secure connection to another networked host. OpenVPN Access Server is an open source software that implements VPN techniques through custom security protocols. VPN connections can be essential for development environments, allow secure browsing over public WiFi, or provide an anchor […]

Read More

How to Benchmark Cloud Servers

Cloud server providers often define host tiers by the allocated resources, but the differences in the underlying hardware, architecture and performance tuning can result in varying performance even between similar configurations. The easiest way to measure the real differences between servers is to run a set of tests, i.e. a benchmark, to create simple to read values for […]

Read More

How to Configure Docker Swarm

Distributing your web application over a cluster of cloud compute resources can significantly improve performance and availability. Docker Swarm is the Docker native clustering solution, which can turn a group of distributed Docker hosts into a single large virtual server. Docker Swarm provides the standard Docker API, and it can communicate with any tool that already […]

Read More

How to Deploy WordPress with Docker Compose

WordPress is one of the most popular content management software (CMS) due to its multitude of features and ease of use. However setting up a new web host environment can be time consuming especially if you need to do it often. Docker Compose manages to simplify the installation process to a single deployment command greatly reducing […]

Read More

How to Install WordPress with Docker

WordPress is one of the most popular content management software (CMS) due to its multitude of features and ease of use. However setting up a new web host environment can be time consuming especially if you need to do it often. Simplifying the installation process to a few fast commands greatly reduce the time and effort […]

Read More

How to Install Let’s Encrypt on Apache2

Improving your website security through encryption, even on the most basic servers, can increase your visitors’ trust in your site and your ability to run it. Setting up encryption on your web host has generally been complicated and expensive, which often deters administrators who’s web applications might not depend on user input. Let’s Encrypt aims to change […]

Read More

How to Install Let’s Encrypt on Nginx

Improving your website security through encryption, even on the most basic servers, can increase your visitors’ trust in your site and your ability to run it. Setting up encryption on your web host has generally been complicated and expensive, which often deters administrators whose web applications might not depend on user input. Let’s Encrypt aims to change […]

Read More

How to Install HAProxy Load Balancer on CentOS

Load balancing is a common solution for distributing web applications horizontally across multiple hosts while providing the users a single point of access to the service. It aims to optimize resource usage, maximize throughput, minimize response time, and avoid overloading any single resource. HAProxy is one of the most popular opensource load balancing software, which also offers high availability […]

Read More

How to Install HAProxy Load Balancer on Ubuntu

Load balancing is a common solution for distributing web applications horizontally across multiple hosts while providing the users a single point of access to the service. It aims to optimize resource usage, maximize throughput, minimize response time, and avoid overloading any single resource. HAProxy is one of the most popular opensource load balancing software, which also offers high availability […]

Read More

How to Install HAProxy Load Balancer on Debian

Load balancing is a common solution for distributing web applications horizontally across multiple hosts while providing the users a single point of access to the service. It aims to optimize resource usage, maximize throughput, minimize response time, and avoid overloading any single resource. HAProxy is one of the most popular opensource load balancing software, which also offers high availability […]

Read More

Installing Snort on Debian

Network IDS or NIDS performs as its name suggests, it monitors the package data sent and received through a specific network interface it was configured for. It aims to catch threats targeting your system vulnerabilities using signature-based detection and protocol analysis technologies. NIDS software when installed and configured properly can identify the latest attacks, malware […]

Read More

Installing Snort on CentOS

Network IDS or NIDS performs as its name suggests, it monitors the package data sent and received through a specific network interface it was configured for. It aims to catch threats targeting your system vulnerabilities using signature-based detection and protocol analysis technologies. NIDS software when installed and configured properly can identify the latest attacks, malware […]

Read More

How to Configure Floating IP on Windows

Once you get a confirmation from the UpCloud Support that a floating IP has been added, you can find it attached to one of the servers at your UpCloud Control Panel, but using the added IP will require some manual setup. Follow the steps below to find out how to get this done on Windows servers. Set […]

Read More

How to Configure Floating IP on CentOS

Once you get a confirmation from the UpCloud Support that a floating IP has been added, you can find it attached to one of the servers at your UpCloud Control Panel, but using the added IP will require some manual setup. Follow the steps below to find out how to get this done on CentOS servers. […]

Read More

How to Configure Floating IP on Debian

Once you get a confirmation from the UpCloud Support that a floating IP has been added, you can find it attached to one of the servers at your UpCloud Control Panel, but using the added IP will require some manual setup. Follow the steps below to find out how to get this done on Debian servers. […]

Read More

How to Configure Floating IP on Ubuntu

Once you get a confirmation from the UpCloud Support that a floating IP has been added, you can find it attached to one of the servers at your UpCloud Control Panel, but using the added IP will require some manual setup. Follow the steps below on how to get this done on Ubuntu servers. Set up static IP […]

Read More

Installing Fail2ban on CentOS 7

Fail2ban is an intrusion prevention framework, which works together with a packet-control system or firewall installed on your server, and is commonly used to block connection attempts after a number of failed tries. It operates by monitoring log files for certain type of entries and runs predetermined actions based on its findings. Install the program using […]

Read More

Installing Fail2ban on Ubuntu 14.04

Fail2ban is an intrusion prevention framework, which works together with a packet-control system or firewall installed on your server, and is commonly used to block connection attempts after a number of failed tries. It operates by monitoring log files for certain type of entries and runs predetermined actions based on its findings. You can install […]

Read More

Installing Fail2ban on Debian 8.0

Fail2ban is an intrusion prevention framework, which works together with a packet-control system or firewall installed on your server, and is commonly used to block connection attempts after a number of failed tries. It operates by monitoring log files for certain type of entries and runs predetermined actions based on its findings. You can install […]

Read More

Scanning Ubuntu 14.04 Server for Malware

Some unexpected behaviour on a cloud Linux could be a result of malware infection, while other malicious software might not alert to their presence. Scanning your system for different types of unwanted programs can help identify issues, or at least give you the peace of mind for having a clean server. There are multiple options for making sure […]

Read More

Scanning Debian 8.0 Server for Malware

Some unexpected behaviour on a Linux server could be a result of malware infection, while other malicious software might not alert to their presence. Scanning your system for different types of unwanted programs can help identify issues, or at least give you the peace of mind for having a clean server. There are multiple options for making […]

Read More

Scanning CentOS 7 Server for Malware

Some unexpected behaviour on a Linux server could be a result of malware infection, while other malicious software might not alert to their presence. Scanning your system for different types of unwanted programs can help identify issues, or at least give you the peace of mind for having a clean server. There are multiple options for making […]

Read More

Configuring iptables on Ubuntu 14.04

The user-space application program iptables allows configuring the tables provided by the Linux kernel firewall, as well as the chains and rules it stores. The kernel module currently used for iptables only applies to IPv4 traffic, to configure firewall rules for IPv6 connections instead use ip6tables, which responds to the same command structures as iptables. Listing current rules […]

Read More