Yes noticed it gave us a message that it cannot be used and it skipped those :)
Thanks - awesome tool
We have shared hosting servers and considering implementing this wordpress caching now via the mass enable feature.
I'd like to however confirm...
Does having the 1CPU Litespeed licence only allow me one core usage hence the CPU Usage limit in LVE for cloudlinux for each site is...
Yes but then its harder to read logs in realtime using "tail"
Will do some testing and see
I noticed that we are using loglevel NOTICE on our shared hosting platform. What is the negatives in having in like that?
Is it better at...
Thanks worked well though just one client informed me that they were seeing someone else website. I think went into their /home/username/lscache...
Thanks followed that as written.
I assumed this folder needed to be created /home/lscache
I however see nothing in that...
I'm using 5.1.15 and loving it. Can use CXS with it and many other mod security rules whic hare awesome
I see there is a plugin on Litespeed 5.1.15 for mass install of wordpress cache.
I enabled it and it enabled for all wordpress installs I...
ok thanks for this - had to same issue on 5.1 with respect to oscp stapling. But atleast I know why it is showing up now. It was making me nuts :)
Awesome that helped a lot.
Got it to work by Going in WHM of cpanel then Apache configuration then searching for index and unticking Indexes....
Usually we used to get 404 page of litespeed when a new cpanel account is created.
Now it shows cgibin folder as per attached.
We are considering using litespeed wp cache however got a few questions.
1. Can I add the htaccess rules into Apache Include Editor for all...
Ok but you stating that using INFO is recommended for mod security with comodo rules?
Are you stating not all rules would be seen on NOTICE?
You think its ready web hosting companies to use 5.1? Are there some web hosting providers using it? I really like the improvement on mod security...
I assume setting it to NOTICE is also enough? and not INFO?
Reason is I see this:
[Tue Feb 9 12:51:22 2016] [error] [client 126.96.36.199]...
We host over 500 sites per server.
I see the following:
top - 10:36:37 up 1 day, 16:34, 3 users, load average: 4.95, 4.20, 3.81...
Is it good or bad idea to Enable Request Filtering on cpanel server when already having mod security enabled?
What is recommend for shared hosting with comodo waf rules. Should we use INFO with Level high so it blocks rules well or a different level?
not an exploit. The exploit scanner it required...
Separate names with a comma.