Server Management & Fortnightly Checks

Замовник: AI | Опубліковано: 22.11.2025
Бюджет: 250 $

Require a freelancer with server administration knowledge (Linux, cPanel and Azure) as well as PHP, HTML, Jacascript and CSS and good knowledge or Laraval. Requiring fortnightly server checks and application checks. Please see below for the checks required. I also require a report on what has been checked and any areas of concern. To an experienced sysadmin and programmer these checks and the report shouldn’t take much more then 90 minutes. • Clear and rebuild cache: php artisan config:cache php artisan route:cache php artisan view:clear • Review Laravel logs (storage/logs) for: • Authentication failures • SQL errors • Exceptions • Suspicious activity • Run composer update --security to patch security-only vulnerabilities. • Check for outdated PHP packages via composer outdated. • Review failed jobs & queue failures. • Verify CSRF, session, cookie security settings still enforced. • Confirm HTTPS certificate not expiring soon. • Check for any unused endpoints/routes and disable them if found. • Confirm no debug tools active (Telescope, DebugBar, Horizon debug mode). • Check for mass-assignment risks and model fillables. • Review any new file uploads for malformed files. Azure db checks • Review database audit logs for unusual queries or new IP connections. • Confirm firewall rules still locked to your server’s IP only. • Verify SSL enforced for DB connections. • Check DB performance metrics: • Slow queries • Deadlocks • CPU/RAM spikes • Optimise tables: OPTIMIZE TABLE (if needed). • Validate backups & restore points exist and are usable. • Check storage usage and ensure no risk of hitting limits. • Review user accounts for unnecessary privileges or unused accounts. • Rotate DB user passwords every cycle or quarterly (optional). CPanel checks • Update system packages (yum update or WHM → System Update). • Ensure Imunify360/CSF firewall has no blocked essential services. • Review ModSecurity logs for attacks or false positives. • Check for brute-force attempts (SSH, email, cPanel). • Verify no suspicious cron jobs were added. • Scan for rootkits/malware using: • Imunify360 Malware Scanner • ClamAV • Check SSH logs for unauthorized login attempts. • Review server users & remove unused ones. Performance • Check disk usage (df -h) — ensure no partition approaching 80%. • Check inode usage — prevent “No space left on device” errors. • Review CPU/RAM load averages. • Restart PHP-FPM pools if memory leaks detected. • Rotate logs to prevent oversized files. • Ensure backups are running daily and completing without errors. Apche & PHP checks • Confirm Apache & PHP-FPM are running cleanly with no failed restarts. • Check that the domain’s PHP version is still supported. • Inspect error logs: • /usr/local/apache/logs/error_log • Domain-specific logs in cPanel • Ensure no .htaccess changes introduced vulnerabilities. • Make sure public_html only contains public assets, not the full Laravel app. Security checks Run OWASP-based quick scan: • SQL injection testing • XSS input testing • Authentication & session testing • Check user roles & permissions for leaks or incorrect assignments. • Validate Stripe keys or API tokens haven’t accidentally expired. • Test app endpoints manually for failure points. • Review user account activity for abuse (login attempts, spam). • Make sure rate limiting still works. Monitoring Confirm uptime monitoring alerts functional (UptimeRobot, BetterStack). • Check SSL expiry monitors. • Verify server resource alerts still firing (disk, load, RAM). • Confirm email alerting for failed jobs or exception logs. Miscellaneous checks • Remove old log files older than 30 days. • Clean unused backups to save space. • Remove unused DBs or staging environments. • Confirm Laravel scheduler (cron) running correctly: