Русский flag Русский Español flag Español

Optimization

2025-09-10

In the previous article, we deployed a basic Jitsi Meet server using Docker.
Now let’s look at how to secure your server, enable authentication, and optimize performance for stable video calls.


Authentication: Invite-Only Access

By default, Jitsi Meet allows anyone to create rooms. To restrict access — enable Secure Domain.

  1. Open the .env file and find the Prosody (XMPP server) section.
    ENABLE_AUTH=1
    AUTH_TYPE=internal
    

Here, internal means that users will be stored locally.

Read more
2025-09-05


Introduction

Logrotate is a powerful tool for log management in Linux, but its interaction with Docker has its own specifics. This guide explains how to properly use logrotate with Docker containers and when it’s better to rely on Docker’s built-in log management tools.


Docker Containers and Logs

Docker collects logs from the standard output streams (stdout and stderr) of containers and, by default, stores them as JSON files:


/var/lib/docker/containers/\<container\_id>/\<container\_id>-json.log

If a container generates a lot of logs, these files can take up gigabytes and quickly consume all available disk space.

Read more
2025-09-03

Swap is virtual memory on disk that saves your VPS from crashing when RAM runs out. On low-cost servers, it’s an indispensable tool to avoid failures during short-term memory usage spikes. Setup is simple: create a file, enable it, and add it to autoload. But remember — it’s insurance, not a replacement for RAM.


Introduction

Modern VPSs are usually provisioned with enough RAM but often without swap (swap file or partition). This is a deliberate choice by providers who want you to quickly upgrade to a more expensive plan.

Read more
2025-07-04

Introduction: Why Do You Need a Website Control Panel?

Imagine you’ve bought a piece of land and built a house on it (your website). Now you need to manage the house: connect electricity (domains), install plumbing (databases), set up security (SSL certificates), maintain order (files), and even let tenants in (FTP users). You could do all of this manually, but it’s complex, time-consuming, and requires specialized skills.

This is where website control panels come in. These are graphical web interfaces that significantly simplify the process of managing your web server and all the components needed to run a website. Instead of entering complex terminal commands, you simply click buttons and fill out forms in a user-friendly browser interface.

Read more
2025-07-01

Part 1: Getting to Know n8n – Your Swiss Army Knife for Automation

Introduction to n8n: What is it and why does it matter?

In today’s fast-paced world, routine tasks can consume too much time and energy. This is where automation tools come to the rescue. You’ve probably heard of “low-code” and “no-code” concepts that allow you to build powerful applications and automate processes without deep programming knowledge. One of the most prominent tools in this space is n8n.

Read more
2025-06-19

In today’s internet-driven world, where data constantly travels between millions of devices, it’s often not enough to establish a direct connection — you may need a “middleman.” That’s where a proxy server comes in. It acts as a bridge between you (the client) and the destination resource (server), handling network requests on your behalf. Understanding how proxies work is critical for network security, optimization, and access management.


What is a Proxy Server?

A proxy server (from the English proxy — representative, intermediary) is a server in a computer network that acts as an intermediary between a user (client) and other internet servers. All client requests go through the proxy first, which then forwards them to the destination server. Responses from the destination server also return to the proxy first before being sent back to the client.

Read more
2025-01-20

Professional DevOps Audit for Your Startup

I conduct comprehensive DevOps audits of infrastructure with focus on security, performance, and scalability. With 20+ years of experience working with infrastructure of various scales, I specialize in helping startups build reliable and efficient IT infrastructure.

What You’ll Get

Detailed analysis of all aspects of your infrastructure:

  • Architecture and design
  • Security configurations
  • CI/CD processes
  • Monitoring and logging
  • Backup and recovery
  • Cost optimization

Prioritized action plan with specific recommendations that will help:

Read more
0001-01-01

I’ll optimize the operation of PHP-FPM and databases to reduce load and prevent 5XX errors.
I’ll configure the correct process, memory, and timeout settings.
I’ll analyze slow SQL queries and fix bottlenecks.
I’ll enable caching (OPcache, Redis/Memcached) and provide recommendations for scaling.

Result — a fast and stable site ready for high load without crashes.

Read more