Accéder au contenu principal

cPanel limit access APACHE

 how can i limit access APACHE only in "domaine.dz" ?



Not necessarily through Apache, however, php-fpm would do this if this domain was set to use the PHP-FPM handler. Activating fpm for this domain would allow them to limit the amount of traffic this user can have concurrently through the max_children variable. Information on this variable will be below.
PHP-FPM Performance Tuning Basics

I see that the PHP-FPM php handler isn't enabled or installed on this server. So what I'd suggest if you'd like to do this is to install the PHP-FPM handler and set this domain to use this:
How to install PHP-FPM
How to change PHP handlers
 

How can i add performance of my APACHE, without disrupting mail which is important then to the APACHE ?

I see that the server's Apache installation reached the maxrequestworkers variable which prevented traffic for the server from being processed. The MaxRequestWorkers variable limits the amount of concurrent processes apache is handling at one time, currently, this is set to be 150:

You can update the MaxRequestWorkers value in WHM with the following steps:

  1. Log in to WHM as the root user.
  2. Navigate to Home »Service Configuration »Apache Configuration »Global Configuration.
  3. Update the "Max Request Worker" value.
  4. Set the ServerLimit value to something larger than MaxRequestWorkers
  5. Select Save.


Updating this variable will allow apache to handle more concurrent processes which will prevent your websites from going down if the same amount of traffic occurs again.
Tuning MaxRequestWorkers for Apache

Commentaires

Posts les plus consultés de ce blog

Open Media Vault NAS change password

Known Root Password Login to the OMV using the root user and the current password via SSH or Console enter the following command passwd root The new password is now active. Unknown Root Password, but Admin Access to OMV GUI is Available In this scenario we still can help ourselves with the GUI. The method we use is, that we create a cron job for the root user which then resets the password. Navigate to System -> Cron Jobs Press the +Add button UN-tick the enabled box, so that the cronjob does not run automatically. put into the command field the following line, replace newpasswd with your password: echo "root:newpasswd" | chpasswd press okay select the newly created cron job Click the run button. in the opening window click the start button. It will shortly deactivate and activate again. open ssh or console and login as root with your new password. Root and Admin Password Unknown If you do not know the root password, you need to boot with a Li

Zimbra install let's encrypt

 https://inguide.in/how-to-install-free-ssl-certificate-on-zimbra-mail-server/ Je change le domaine  ingu.pw In the article  Install Zimbra Mail Server o n CentOS 8, we learned to install Zimbra on CentOS. This article discusses the steps required to install the Let’s Encrypt free SSL certificate in Zimbra. Installing Free SSL Certificate on Zimbra: Method 1 This method is a proven one though you have to manually do all the steps. Another method discussed below is partially automatic, which might come in handy if you didn’t encounter any error during installation (working at the time of writing this article). So, let’s begin with method 1. First of all, add  epel repository  to the server 1 [root@mail ~]# yum -y install epel-release Install snapd Now, install  snapd  package with the following command 1 [root@mail ~]# sudo yum install snapd After the above step, you need to enable snapd. 1 [root@mail ~]# sudo systemctl enable --now snapd.socket Sometimes, the above command isn’t suffic

cPanel DDOS attack - Mitigate Slowloris Attacks - mod_qos

Apache mod_evasive Mod_evasive is a module available for the Apache HTTP server that can automatically block attacks by rate-limiting any IP that sends too many requests in a short time. Start by installing the module from WHM’s  EasyApache 4  interface. Select the  Currently Installed Packages  profile, search for  mod_evasive  in the  Apache Modules  section, and then install it. The default settings are good for most servers, but you can tweak them further by editing the configuration file  /etc/apache2/conf.d/300-mod_evasive.conf . You can also whitelist specific IP addresses or classes, so legitimate requests are not blocked. Configure CSF to block attacks While  mod_evasive  works very well, it only protects the Apache webserver. In order to harden other services as well, you can install the free  ConfigServer Security & Firewall  (CSF), which also includes a WHM plugin. As the  root  user, install CSF with these terminal commands: cd /usr/src rm -fv csf.tgz wget https://down