Hosting: Why Manual Monitoring is Vital for Special Orders

Started by tomjohn, Sep 11, 2022, 07:46 AM

Previous topic - Next topic

tomjohnTopic starter

VDS hosting management involves three levels: strategic, operational, and intermediate tactical. The strategic level determines the web hosting DNA - choosing product type, hardware, data centers, and conditions of setup.



 The operational level involves routine tasks such as managing IP address range and resolving hardware issues. At the intermediate tactical level, decisions are made by the operations director based on available resources, financial parameters, and marketing data.

In order to make informed decisions, a good chief operating officer already has all necessary data at their disposal. Automation and autoforming of reports allow for quick access to important indicators.

Regarding IP addresses, clients receive a static address that is not changed unless there is a problem with the address that cannot be resolved. This can include complaints or previous associations with spammers.

It's important for businesses to have access to all company information for effective management.

Our company has a low turnover rate, which may be due to the absence of routine work and continuous progress.

Salaries in the IT industry are constantly increasing, making it challenging to attract and retain skilled developers. To address this, we train our own specialists who are familiar with hosting and understand our product deeply. We also prioritize hiring individuals who are likely to stay with the company for a significant period of time.

We have a collegial management structure where decisions are made through collaboration and consensus-building rather than by a single leader. This can be frustrating at times, but it's a good model for our current size. As we continue to grow, this structure may need to change.

Equipment delivery is automated up to a point, but specific orders require manual monitoring.
  •  

tinjuashok

Could you explain to me how the client is safeguarded against a dishonest administrator who copies the virtual machine's .raw/.raw/etc. disk file and gains unrestricted access to the client's information? This is assuming that the disk is not encrypted.
  •  

sebastian

We once decided to give Ajenti-V a try and during the initial deployment everything went smoothly: we installed, configured and added a website without any hiccups. However, when we needed to add a second site a few months later, we encountered a problem. We couldn't create a PHP FastCGI filter for processing PHP files in the web site content settings menu, despite the fact that the option was present when we added the first site.

To work around the issue, we had to dig into the virtual host configs of Ajenti-V and copy the necessary parameters from the config of the first site. This caused the necessary options to reappear in the menu, but we were left with an underlying sense of unease. Additionally, there were also times when updates caused issues with site functionality due to rights problems between NGINX and PHP, which required manual configuration file editing outside of the control panel.

On a related note, it's worth noting how crucial it is to thoroughly test all aspects of a tool during initial deployment to avoid such issues down the road.
  •