Your ultimate resource for Ready VPS, KVM VPS, Dedicated Servers, and Web Hosting — step-by-step guides, expert tutorials, and quick solutions.

knowledgebase

Easily troubleshoot issues, learn best practices, and get the most out of TriangleCloud.net services — anytime, anywhere.

image

TriangleCloud.net

Server & Hosting Quick-Start Guides

Professional, step-by-step instructions to provision, secure, and manage Ready VPS, KVM VPS, Dedicated Servers, and cPanel Web Hosting.

Production-ready Security-focused Beginner → Advanced

Ready VPS

Provision & connect in minutes with full control.

KVM VPS

Full virtualization with dedicated resources.

Dedicated Servers

Maximum performance & hardware control.

Web Hosting (cPanel)

Launch and manage sites the easy way.

1) Ready VPS

Dedicated resources with full control—without hardware complexity.

1
Provision Your VPS
  1. Log in to your TriangleCloud.net client area.
  2. Navigate to Ready VPS → Create VPS.
  3. Select OS, CPU, RAM, Storage, etc.
  4. Click Provision — your VPS will be ready in minutes.
2
Obtain VPS Credentials
  • VPS IP / Hostname
  • Username (root/admin)
  • Password or SSH key pair
Security: Keep credentials private and rotate regularly.
3
Connect to VPS
  • Linux: Terminal / PuTTY → SSH
    ssh username@<vps_ip>
  • Windows: Remote Desktop (RDP) → enter IP, username, password.
4
Initial Setup
  • Update the system:
    sudo apt update && sudo apt upgrade -y
  • Configure firewall (e.g., UFW on Linux).
  • Install required software (web server, DB, apps).
Advanced Management
  • Create additional users and set permissions.
  • Automated backups or snapshots.
  • Monitor CPU, RAM, Disk, Network.
  • Configure services (Apache/Nginx, MySQL, PHP, etc.).
Security Best Practices
  • Use SSH keys instead of passwords.
  • Disable root SSH login.
  • Keep OS/software updated.
  • Enable firewall and fail2ban.

2) KVM VPS

Full virtualization with dedicated CPU, RAM, and storage.

1
Access Your KVM VPS
  • Linux: SSH
  • Windows: RDP
  • Use credentials from your TriangleCloud client area.
2
Reinstall Operating System
  1. Client Area → KVM VPSReinstall OS
  2. Choose the OS
  3. Confirm — all data will be erased
3
Resource Management
  • Upgrade/downgrade CPU, RAM, Disk anytime.
  • Use snapshots for safe rollback.
Security & Maintenance
  • Enable firewall & antivirus.
  • Use SSH keys for secure access.
  • Schedule automatic backups.
  • Monitor performance regularly.
Advanced Tips
  • Set up web servers (Apache/Nginx) & databases.
  • Optional control panels: cPanel, Webmin, etc.
  • Performance tuning (caching, DB tuning).

3) Dedicated Servers

Full hardware control and top performance for high-demand apps.

1
Initial Setup
  • Purchase/lease the server & select OS (Linux/Windows).
  • Configure IPs, DNS, and firewall rules.
2
Remote Access
  • Linux: SSH
  • Windows: RDP
  • Prefer VPN and SSH keys for secure login.
3
Security Measures
  • Apply updates and OS patches regularly.
  • Configure firewall & security software.
  • Disable unused services; restrict permissions.
  • Enable encryption for sensitive data.
4
Monitoring & Optimization
  • Track CPU, RAM, Disk, Network usage.
  • Tune server/apps for performance.
  • Backups & disaster recovery plan.
Advanced Management
  • Install stacks: LAMP, LNMP, or Windows Server roles.
  • Virtualization (VMware, KVM) if required.
  • Monitoring tools: Nagios, Zabbix, Prometheus.

4) Web Hosting — cPanel

Beginner-friendly website management with powerful tools.

1
Access cPanel
  1. Log in to your TriangleCloud.net client area.
  2. Go to Web Hosting → Manage → cPanel Login.
  3. Use the provided username and password.
2
Manage Website Files
  • File Manager → upload, edit, organize.
  • FTP for large uploads.
  • Site files live in public_html.
3
Install Applications
  • Open Softaculous Apps Installer.
  • Choose WordPress, Joomla, Drupal, etc.
  • Fill site info → click Install.
4
Manage Databases
  • MySQL Databases → create/manage DBs.
  • phpMyAdmin → manage DB content.
5
Manage Email Accounts
  • Email → Email Accounts → create addresses.
  • Use webmail or configure a client.
  • Set spam filters and forwarders.
Security & Maintenance
  • Enable SSL certificates.
  • Take regular backups.
  • Keep apps updated; use strong passwords.

Knowledgebase

Dedicated Servers

How to manage Dedicated Servers #2

Managing a dedicated server involves tasks such as initial setup, ongoing maintenance, security measures, and monitoring to ensure optimal performance and security. Here’s a guide on how to manage a dedicated server:

  1. Initial Setup:
  • Provision the server: Purchase or lease a dedicated server from a hosting provider or data center.
  • Choose an operating system: Select the operating system (OS) that best suits your needs, such as Linux (e.g., Ubuntu, CentOS) or Windows Server.
  • Configure network settings: Set up networking configurations, including IP addresses, DNS settings, and firewall rules.
  1. Remote Access:
  • Use remote administration tools: Access the server remotely using tools like SSH (for Linux) or Remote Desktop Protocol (RDP) (for Windows).
  • Secure remote access: Ensure secure remote access by using strong authentication methods like SSH keys or VPN connections.
  1. Security Measures:
  • Install security updates: Regularly apply OS updates and patches to address security vulnerabilities.
  • Configure firewall: Set up a firewall to control incoming and outgoing traffic, and only allow necessary ports and services.
  • Implement security software: Install antivirus, intrusion detection/prevention systems, and other security tools to protect against malware and unauthorized access.
  • Harden server configurations: Follow security best practices to configure the server securely, such as disabling unnecessary services, limiting user permissions, and using encryption where appropriate.
  1. Monitoring and Performance Optimization:
  • Monitor server health: Use monitoring tools to track server resource usage (CPU, memory, disk, network) and detect performance issues or anomalies.
  • Optimize performance: Configure server settings and applications to maximize performance, such as adjusting resource allocation, optimizing database settings, and caching frequently accessed data.
  • Implement backups: Regularly back up critical data and configurations to prevent data loss in case of hardware failures, accidental deletions, or security breaches.
  1. Regular Maintenance:
  • Perform routine maintenance tasks: Schedule regular maintenance activities, such as disk defragmentation (for Windows), disk cleanup, log rotation, and database optimization.
  • Monitor logs: Review server logs for errors, warnings, and security-related events, and take appropriate actions to address any issues identified.
  • Update software: Keep server software up to date by installing patches, updates, and new releases to address bugs, security vulnerabilities, and performance improvements.
  1. Disaster Recovery Planning:
  • Develop a disaster recovery plan: Create a plan outlining procedures for restoring server functionality in case of disasters such as hardware failures, data corruption, or cyberattacks.
  • Test backups and recovery procedures: Regularly test backups and recovery procedures to ensure data integrity and verify that systems can be restored effectively in case of emergencies.

By following these steps and staying proactive in managing your dedicated server, you can ensure its security, reliability, and optimal performance for your business or organization.

Dedicated Servers

How to manage Dedicated Servers

Managing a dedicated server involves tasks such as initial setup, ongoing maintenance, security measures, and monitoring to ensure optimal performance and security. Here’s a guide on how to manage a dedicated server:

  1. Initial Setup:
  • Provision the server: Purchase or lease a dedicated server from a hosting provider or data center.
  • Choose an operating system: Select the operating system (OS) that best suits your needs, such as Linux (e.g., Ubuntu, CentOS) or Windows Server.
  • Configure network settings: Set up networking configurations, including IP addresses, DNS settings, and firewall rules.
  1. Remote Access:
  • Use remote administration tools: Access the server remotely using tools like SSH (for Linux) or Remote Desktop Protocol (RDP) (for Windows).
  • Secure remote access: Ensure secure remote access by using strong authentication methods like SSH keys or VPN connections.
  1. Security Measures:
  • Install security updates: Regularly apply OS updates and patches to address security vulnerabilities.
  • Configure firewall: Set up a firewall to control incoming and outgoing traffic, and only allow necessary ports and services.
  • Implement security software: Install antivirus, intrusion detection/prevention systems, and other security tools to protect against malware and unauthorized access.
  • Harden server configurations: Follow security best practices to configure the server securely, such as disabling unnecessary services, limiting user permissions, and using encryption where appropriate.
  1. Monitoring and Performance Optimization:
  • Monitor server health: Use monitoring tools to track server resource usage (CPU, memory, disk, network) and detect performance issues or anomalies.
  • Optimize performance: Configure server settings and applications to maximize performance, such as adjusting resource allocation, optimizing database settings, and caching frequently accessed data.
  • Implement backups: Regularly back up critical data and configurations to prevent data loss in case of hardware failures, accidental deletions, or security breaches.
  1. Regular Maintenance:
  • Perform routine maintenance tasks: Schedule regular maintenance activities, such as disk defragmentation (for Windows), disk cleanup, log rotation, and database optimization.
  • Monitor logs: Review server logs for errors, warnings, and security-related events, and take appropriate actions to address any issues identified.
  • Update software: Keep server software up to date by installing patches, updates, and new releases to address bugs, security vulnerabilities, and performance improvements.
  1. Disaster Recovery Planning:
  • Develop a disaster recovery plan: Create a plan outlining procedures for restoring server functionality in case of disasters such as hardware failures, data corruption, or cyberattacks.
  • Test backups and recovery procedures: Regularly test backups and recovery procedures to ensure data integrity and verify that systems can be restored effectively in case of emergencies.

By following these steps and staying proactive in managing your dedicated server, you can ensure its security, reliability, and optimal performance for your business or organization.

Cloud VPS

How to connect Cloud VPS #2

Connecting to a Cloud VPS (Virtual Private Server) typically involves several steps, including provisioning the server, accessing it remotely, and configuring it according to your needs. Here’s a general guide on how to connect to a Cloud VPS:

  1. Provision the VPS: Depending on the cloud provider you’re using (such as Amazon Web Services, Google Cloud Platform, Microsoft Azure, DigitalOcean, etc.), you’ll need to log in to the provider’s dashboard, navigate to the VPS or instance creation section, and follow the steps to create a new virtual server. This usually involves selecting the operating system, server size, region, and other configuration options.
  2. Obtain Server Credentials: Once the VPS is provisioned, the cloud provider will usually provide you with credentials to access the server. This typically includes an IP address or hostname, a username, and a password or SSH key pair. Make sure to keep these credentials secure.
  3. Connect via SSH (Secure Shell): SSH is a common method for securely accessing remote servers. If you’re using a Unix-based system (such as Linux or macOS), you can open a terminal and use the ssh command to connect to your VPS. For example: ssh username@server_ip Replace username with your actual username and server_ip with the IP address or hostname of your VPS. If you’re prompted for a password, enter the password provided by your cloud provider.
  4. Connect via Remote Desktop Protocol (RDP): If you’re using a Windows-based VPS, you can connect via RDP instead of SSH. On a Windows computer, you can use the Remote Desktop Connection application to connect to your VPS. Enter the IP address or hostname of your VPS, and then enter the username and password provided by your cloud provider.
  5. Initial Server Setup: Once connected to your VPS, you may want to perform some initial configuration tasks, such as updating the system packages, setting up firewalls, installing necessary software, and securing the server. This may vary depending on your specific requirements and the operating system you’re using.
  6. Install Additional Software: Depending on your needs, you may need to install additional software on your VPS, such as a web server (e.g., Apache or Nginx), a database server (e.g., MySQL or PostgreSQL), or other applications.
  7. Regular Maintenance: Keep your VPS up to date with security patches and software updates, and regularly monitor its performance and security.

Remember to follow best practices for security, such as using strong passwords or SSH keys, keeping software up to date, and configuring firewalls to restrict access to your server.

Cloud VPS

How to connect Cloud VPS

Connecting to a Cloud VPS (Virtual Private Server) typically involves several steps, including provisioning the server, accessing it remotely, and configuring it according to your needs. Here’s a general guide on how to connect to a Cloud VPS:

  1. Provision the VPS: Depending on the cloud provider you’re using (such as Amazon Web Services, Google Cloud Platform, Microsoft Azure, DigitalOcean, etc.), you’ll need to log in to the provider’s dashboard, navigate to the VPS or instance creation section, and follow the steps to create a new virtual server. This usually involves selecting the operating system, server size, region, and other configuration options.
  2. Obtain Server Credentials: Once the VPS is provisioned, the cloud provider will usually provide you with credentials to access the server. This typically includes an IP address or hostname, a username, and a password or SSH key pair. Make sure to keep these credentials secure.
  3. Connect via SSH (Secure Shell): SSH is a common method for securely accessing remote servers. If you’re using a Unix-based system (such as Linux or macOS), you can open a terminal and use the ssh command to connect to your VPS. For example: ssh username@server_ip Replace username with your actual username and server_ip with the IP address or hostname of your VPS. If you’re prompted for a password, enter the password provided by your cloud provider.
  4. Connect via Remote Desktop Protocol (RDP): If you’re using a Windows-based VPS, you can connect via RDP instead of SSH. On a Windows computer, you can use the Remote Desktop Connection application to connect to your VPS. Enter the IP address or hostname of your VPS, and then enter the username and password provided by your cloud provider.
  5. Initial Server Setup: Once connected to your VPS, you may want to perform some initial configuration tasks, such as updating the system packages, setting up firewalls, installing necessary software, and securing the server. This may vary depending on your specific requirements and the operating system you’re using.
  6. Install Additional Software: Depending on your needs, you may need to install additional software on your VPS, such as a web server (e.g., Apache or Nginx), a database server (e.g., MySQL or PostgreSQL), or other applications.
  7. Regular Maintenance: Keep your VPS up to date with security patches and software updates, and regularly monitor its performance and security.

Remember to follow best practices for security, such as using strong passwords or SSH keys, keeping software up to date, and configuring firewalls to restrict access to your server.

Hosting

How to Create, Update, and Delete a Project? #2

Lorem ipsum dolor sit amet consectetur adipisicing elit. Veniam impedit similique, veritatis nesciunt eligendi repudiandae nemo consequuntur mollitia ea incidunt. Amet itaque repudiandae tempora quia a ipsam voluptatum odit ipsa perferendis repellat ipsum enim fugiat, excepturi voluptate, laudantium autem, dignissimos adipisci. Blanditiis id possimus laborum aspernatur assumenda praesentium nesciunt atque dicta aperiam et! Magni nihil reiciendis cumque dolores quo cupiditate magnam asperiores sit architecto impedit molestias nesciunt quasi aut est, deleniti praesentium exercitationem quos ad soluta minima dignissimos! Voluptas eius accusantium quas, accusamus deserunt autem vel necessitatibus fugiat maxime a, cumque magnam voluptates deleniti hic. Dolor incidunt harum, odit labore pariatur ut libero error perspiciatis maxime necessitatibus commodi quo eius ea reiciendis fugit aperiam provident illo eveniet dolorem. Beatae ex harum ipsa assumenda repudiandae magnam, qui eos voluptatem distinctio obcaecati facere perspiciatis rem consectetur corrupti voluptas, praesentium maxime? Eaque cupiditate reiciendis modi harum illo earum laborum, velit delectus rem ratione minima, hic numquam. Quam sit facere vel repudiandae adipisci reprehenderit, necessitatibus porro odit mollitia exercitationem, voluptatibus, culpa accusamus commodi debitis nisi explicabo! Cumque asperiores alias similique doloribus quis illo quidem incidunt quae suscipit aut officiis soluta nostrum facilis qui amet tempora commodi, consequatur assumenda dolorum enim unde natus fugiat! Voluptate a voluptatibus quibusdam ipsam magnam voluptas aperiam? Laborum, impedit earum nulla consequatur autem tenetur enim harum ex non consequuntur! Sequi deserunt beatae error quia sed pariatur. Omnis iure animi excepturi commodi quam, cum eveniet voluptatibus vel inventore. Eaque porro doloribus omnis asperiores sapiente delectus sunt saepe? Impedit saepe quasi, mollitia eum tempora minus? Rem, autem, quia aliquam unde facere repellendus nemo, distinctio optio dolore ab recusandae? Suscipit sunt nulla, fugiat corrupti dolorem voluptas dolorum nihil. Quos, assumenda itaque vel nam natus, suscipit quas, aspernatur quam recusandae illum accusantium repellat cum? Necessitatibus repellat aliquam sapiente amet dolorem soluta et vel voluptas.

24/7 World-Class Support

Ran into trouble? Contact our Customer Success team any time via live chat or email.