Server Configuration Documentation

This documentation provides a structured approach to configuring servers for production use.

Initial Server Setup

Update Package Index and Upgrade Packages

# Debian/Ubuntu
apt update && apt upgrade -y

# CentOS/RHEL
yum update -y

Create a Non-Root User with Sudo Access

adduser clouduxe
usermod -aG sudo clouduxe

Tip Always disable direct root access and use a non-root sudo user for daily operations.

SSH Configuration

Configure SSH Access

  1. Log in as root.

  2. Open the SSH configuration file:

    nano /etc/ssh/sshd_config
  3. Apply the following changes:

    PermitRootLogin no
    PasswordAuthentication no
    PubkeyAuthentication yes
  4. Restart the SSH service:

    systemctl restart ssh

Generate and Deploy SSH Keys

On your local machine:

Warning Do not disable password authentication until you have successfully set up SSH keys and verified access.


Firewall Configuration

UFW (Ubuntu/Debian)

Firewalld (CentOS/RHEL)

Tip Only open the ports required for your applications. Close everything else by default.


Networking Configuration

View Network Interfaces

Set a Static IP (Netplan - Ubuntu 20.04+)

Edit configuration:

Example:

Apply changes:


Software Installation

Web Server (Nginx Example)

Database Server (MySQL Example)

Application Runtime (Node.js Example)


System Optimization

Enable Swap (if needed)

Configure Automatic Updates

Tune Kernel Parameters

Edit sysctl:

Recommended settings:

Apply changes:


Logging and Monitoring

Enable System Logs

Install Monitoring Tools

Tip Clouduxe integrates Prometheus + Grafana for advanced monitoring and alerting.


Backup Configuration

Manual Backup

Automated Backup (Cron Example)

Edit crontab:

Add job:

Warning Always test your restore process. A backup is useless unless it can be restored successfully.


Final Checklist


Conclusion

Proper server configuration is critical for performance, security, and reliability. At Clouduxe, we provide pre-configured and hardened servers out-of-the-box, ensuring your applications are deployed on a secure and optimized infrastructure from day one.

Last updated

Was this helpful?