Controlling Store Logging

Table of ContentsVia MageRunLog into your Magento admin as normal, then go to, System > Configuration > Advanced > Developer Then configure the settings as follows, Via MageRun Using MageRun, use the following command (adjust mr_examplecom as necessary), mr_examplecom dev:log … Continue reading

Controlling Customer Logging

Table of ContentsDisable customer logging Rotating customer logs Enable Cron Enable log cleaningIt isn't always necessary to use the native customer logging feature of Magento if you are already using more powerful third party analytics. The majority of stores can … Continue reading

Implementing Varnish on Magento 1

Table of ContentsIs Varnish right for you? Implementation Automated installerIs Varnish right for you? Varnish isn’t the be-all and end-all of Magento performance. Its great to offset load from bots & window-shoppers – but it shouldn’t be your first port … Continue reading

Analysing DOS blocks by country

It can unfortunately be a common occurrence that certain countries are a source of DOS attacks or aggressive crawl bots. It is also possible that these countries do not form part of your target demographic, and as such, it isn't … Continue reading

Block by Country Code

Sometimes, your site may fall victim to country specific attacks or crawl bots. Blocking access to your server for a specific country is very straightforward, with a simple edit to your domain's ___general/example.com.conf file Eg. To block the country with … Continue reading

Implementing New Relic

New Relic can be an excellent diagnosis tool on development stores and non-production environments. It is natively supported by MageStack and can be enabled by a member of our support team. In order for us to enable New Relic, we … Continue reading

Configuring 3rd party remote backups

Table of ContentsInstallation steps On your acc server On your destination serverSonassi offer a cost-effective remote backup service which should be utilised to ensure fast backup and restoration. However, in addition to this, it is wise to maintain your own … Continue reading

Setting correct MTU for OpenVPN

Table of ContentsSymptoms of incorrect MTU Identifying correct MTU Setting the MTUVPN connections can be sensitive to incorrect/low MTU set within your network, or on networks between you and your server. It is important that the correct MTU is set, … Continue reading

Securely installing WordPress

Table of ContentsSecuring WordPress (standard) By Subdomain By Subdirectory Securing WordPress (Fishpig) Further SecurityWordPress unfortunately can be a target or entry point for server compromise (given the large amount of untested plugins available). There are a number of different ways … Continue reading

Securely installing Magmi

Table of ContentsSecuring MagmiDefault installations of Magmi are disabled by the firewall in MageStack due to the extremely severe security risks it poses. If you wish to utilise Magmi, it must be installed and secured properly before use. Securing Magmi … Continue reading