NGINX® with Reverse Proxy
This document explains how to install NGINX® with reverse proxy on a server that runs cPanel & WHM and EasyApache 4.
This document explains how to install NGINX® with reverse proxy on a server that runs cPanel & WHM and EasyApache 4.
This script allows you to manage the task queue system.
You can edit backup retention behavior in WHM's Backup Configuration interface.
Installing cPanel & WHM from a templated environment reduces your setup time so that you can spend more time on your website, not your server.
The Calendar and Contacts Server (CCS) allows your cPanel users to manage their CalDAV (calendar) and CardDAV (contacts) accounts from your cPanel & WHM server.
This interface allows you to configure the upcp, backup, and cpbackup scripts' cron jobs on your server.
A list of common terms, web hosting terms, and terms in cPanel & WHM.
This guide details information about cPanel's linked nodes feature.
cPanel & WHM includes PHP and its modules as a set of packages, including the associated PEAR and PECL packages and PHP loaders.
If a user fails to authenticate with cPanel through a custom login form, the /var/cpanel/failurls file allows a reseller to redirect that user to a custom error page.
This file contains all of the cPanel-provided settings for the rpm.versions system.
The splitlogs binary optimizes your resources and performance when you create Apache logs.
The /etc/stats.conf file stores the configuration changes that you make in WHM's Statistics Software Configuration interface.
Use this script to update the /var/cpanel/rpm.versions.d/local.versions file.
cPanel & WHM ships with a large collection of third-party software that performs a wide variety of functions.
This document lists common IPv6 problems and steps to resolve them.
You can use several different methods to uninstall Ruby.
The Domain TLS system stores and manages the server's verified certificates in a domain-indexed repository.
You can use the interface to determine which version of cPanel & WHM you're using.
This document explains why you can't clean a hacked machine.