What are the daily maintenance contents of the server?
1. Hardware maintenance
Hardware maintenance refers to the detection, replacement, and upgrade of the server’s hardware. The most common is to upgrade the CPU, memory and increase the disk. Among them, disk expansion is the most common, because the longer the service runs, the greater the amount of data generated, and more disks need to be used for storage.
2. Software maintenance
(1) Operating system upgrade
There is no essential difference between servers and PCs, and they also run basic operating systems. Therefore, various patches need to be upgraded to protect system security and avoid possible system errors.
(2) Software maintenance
Software refers to various software running on the server. Since the services provided by the server are often increasing, the software providing services also needs to be upgraded, BUG repaired, or even rewritten.
(3) Data maintenance
Data is the core of the server, so doing data backup is a regular job.
(4) Safety maintenance
There are often undiscovered security holes in the system. By checking the database and system operation logs, we can identify and prevent attacks. Update the patches of the system in time to prevent hackers or viruses from exploiting vulnerabilities to attack the server.
(5) Log check
Check the system audit log to see if there is any abnormal access. You can use the software to audit or set the audit log that comes with the system.
(6) Server resource check
Resources include hard disk, cpu, memory, and bandwidth load for viewing, and resources should be configured in advance according to the traffic of the website.
How to properly maintain a server
1. Safety inspection
The server is related to all the important information online and is very important, and daily security testing is essential. The specific detection contents include the following aspects: check whether the server startup items are normal, and focus on checking whether the system directory and important application permissions have changed; check the server status, open the server process manager, and check the specific CPU usage and Check whether the task process is abnormal; check the server port usage to see if there are unused ports, and close them in time to prevent hackers from exploiting them; check the system service application to see if the started services are abnormal. In addition, you can periodically check related logs, security policies and system files.
2. Data backup
It is necessary to update the backup data for the daily maintenance of the independent server. During the establishment period, the system data is backed up once a month, and the application data is backed up once every two weeks. After ensuring the data safety, it is best to dump a copy, so that the data can be restored in time even if data is lost. This kind of backup basically uses a full backup, so only the last backup data and the current backup data can be retained on the backup data.
3. System optimization
When the independent server runs for a long time, many system files will be generated. You can uninstall some unused program components to free up the space of the independent server; delete some self-starting programs to reduce the reading time, thereby improving the response speed of the server and optimizing the memory.
4. Dedicated server performance optimization
Adjust the server’s cache policy, and implement appropriate policy restrictions on access traffic, such as site bandwidth restrictions, maintaining http connections, and enabling http compression. Performance optimization of independent servers is generally more common for periodic or special time period maintenance.
Disclaimer: The above methods are derived from the program system index or shared by netizens. They are only for your reference and use. They do not represent the research views of this website and are proved to be effective. Please pay attention to the authenticity and authority of the content source.
…
The post How to properly maintain a server first appeared on Lenix Blog .
This article is reprinted from https://blog.p2hp.com/archives/9785
This site is for inclusion only, and the copyright belongs to the original author.