Verdant TCS

Service Management: Nginx

Nginx Configuration Check Run either of these commands after making configuration changes to find issues before reloading or restarting the Nginx. gp ngx -t gp ngx -status Stop/Start Nginx These commands stop and start Nginx. Run them separately. gp ngx -stop gp ngx -start Restart Nginx The restart command issues a STOP and then START […]

Service Management: PHP

Stop/Start PHP These commands stop and start PHP. Run them separately. You have to designate the version in the command. gp php {php.version} -stop gp php {php.version} -start For example: gp php 7.3 -stop Restart PHP The restart command issues both a STOP and START command all in one. You have to designate the version in […]

Service Management: Redis

Stop/Start Redis These commands stop and start Redis. Run them separately. gp redis -stop gp redis -start Restart Redis The restart command issues a STOP and then START from one command. gp redis -restart Reload Redis Reload reloads the configuration without completely stopping the service. gp redis -reload

Service Management: MySQL

Stop/Start MySQL These commands stop and start MySQL. Run them separately. gp mysql -stop gp mysql -start Restart/Reload MySQL The restart and reload commands both issue a STOP and then START from one command. They are effectively interchangeable. gp mysql -restart gp mysql -reload Get MySQL Password Outputs the MySQL password for a specified system […]

Site Firewalls: 6G

The 6G WAF was originally developed by Jeff Starr at Perishable Press for Apache-based servers. 6G is an excellent lightweight firewall that parses requests for anything anomalous or malicious looking, looking for: Bad Bots Bad Referrers Bad Query Strings Bad Requests Disallowed Request Methods We have adapted the firewall for Nginx, but more details can be […]

Site Firewalls: ModSec

Introduction Developer plan accounts have access to the ModSecurity WAF for each of their sites on a vCanopy managed server. We use the full OWASP foundation 3+ Core Ruleset (CRS) to protect your sites from a wide array of attack vectors including: SQL Injection (SQLi) Cross-Site Scripting (XSS) Local File Inclusion (LFI) Remote File Inclusion (RFI) PHP Code […]