Server Solutions
Dedicated Server Rental Meet your physical server needs with dedicated server rental Explore Now
Virtual Servers Scalable, high-availability server rental services with our high-performance cloud server solutions. Explore Now
İlkbyte Cloud Fully developed by Netinternet, flexible and scalable cloud servers with cloud technology Explore Now
GPU-Based AI Infrastructure High-performance GPU solutions created on a project basis for your AI and machine learning projects Explore Now
Server & Hardware Procurement Server and hardware procurement services with equipment suitable for your projects Explore Now
Customized Infrastructure Solutions Custom-designed infrastructure solutions and technical consulting services for your unique needs Explore Now
Hosting Services
Cabinet Rental Dedicated 15U, 24U and 48U smart cabinet systems allocated for you Explore Now
Server Colocation Individual server hosting service in shared cabinet systems Explore Now
Premium Connectivity Fast and reliable internet access with multi-carrier, multi-IXP and high-capacity Anti-DDoS protection Explore Now
Telecom Data Center Circuit Low-cost and high-performance internet access through a dedicated data center tariff Explore Now
Cross-Connect Direct connection between network carriers with low latency and high performance Explore Now
IP Address Pricing IP address and ASN rental services with RIPE LIR management services Explore Now
Managed Services
Managed Server Installation, configuration, regular maintenance, updates and 24/7 monitoring of your server operating system Explore Now
Managed Infrastructure End-to-end management of your entire IT infrastructure including data center, storage, virtualization and backup Explore Now
Managed Network Professional management and monitoring of network devices (router, switch, firewall) configuration, optimization and performance Explore Now
Managed Cloud (Public / Private) Professional management of your public and private cloud infrastructures to meet your cloud needs Explore Now
Managed Security 24/7 monitoring, analysis and response services against cyber security threats Explore Now
Managed Backup & Disaster Recovery Backup and disaster recovery plans, implementation, operation to ensure your data security and business continuity Explore Now
License Rental
cPanel Licenses cPanel software license rental solutions Explore Now
Plesk Licenses Plesk software license rental solutions Explore Now
DirectAdmin Licenses DirectAdmin software license rental solutions Explore Now
LiteSpeed Licenses LiteSpeed software license rental solutions Explore Now
CloudLinux Licenses CloudLinux software license rental solutions Explore Now
Cyber Security
HEIMWALL Fully developed by Netinternet, protect against cyber attacks with our Web Application Firewall solution Explore Now →
AntiDDoS High-capacity volumetric Anti-DDoS protection provided free by default on all our services Explore Now →
VPN Solutions Secure, encrypted tunnel connections for your remote offices and employees with our managed VPN solutions Explore Now →
Layer4 Stateless Firewall Layer4 stateless firewall solution for filtering and directing incoming traffic Explore Now →
SSL Certificates Secure connection solutions with free and paid SSL/TLS certificate options Explore Now →
Penetration Tests Penetration tests performed by third parties in cooperation with TSE-approved testing firms Explore Now →
Corporate Email
Corporate Email Solutions Fully domestic, KVKK compliant, 100% compatible with Outlook and all mail programs, professional, uninterrupted email service Explore Now →
Bulk Email Sending Manageable bulk email sending services with high delivery rates for your marketing campaigns Explore Now →
Email Archiving Secure archiving of all your email traffic to protect corporate memory and comply with legal requirements Explore Now →
Free Email Migration Service Wherever your email service is, we migrate you to Netinternet corporate email solution for free! Explore Now →
Traditional Web Hosting
cPanel Web Hosting Fast and reliable hosting packages with easy setup and management using cPanel, the world's most popular hosting management panel. Explore Now →
cPanel Reseller Hosting Fully customizable cPanel-based reseller hosting solution for starting your own hosting business Explore Now →
DirectAdmin Reseller Hosting Scalable and cost-effective reseller hosting powered by lightweight DirectAdmin control panel Explore Now →
Free Hosting Migration Service Professional migration services to move your existing systems to Netinternet data center infrastructure Explore Now →
Domain Names
Domain Registration Services Domain registration and easy management at the most affordable prices in all popular extensions (.com, .net, .org, etc.) Explore Now →
Domain Transfer Services Transfer your domains to Netinternet for professional domain management services Explore Now →
Domain Reseller Flexible and reliable reseller program and integration services for offering domain registration to your customers Explore Now →
Free Hosting with Domain Free hosting service for domains registered or transferred to Netinternet Explore Now →
Hosting & Cloud Service Providers High-density infrastructures, multi-tenant architectures and SLA-focused sustainable data center solutions for hosting and cloud providers Explore Now →
E-Commerce Companies High-performance, secure and uninterrupted e-commerce infrastructures resilient to sudden traffic surges during campaign periods Explore Now →
Software Developers Developer-friendly infrastructure solutions with CI/CD compatible, API-supported, automation-ready flexible resource management Explore Now →
SaaS Providers Scalable, high-availability and continuity-focused cloud infrastructures suitable for SaaS architectures serving many users. Explore Now →
AI & R&D GPU-based high-performance and scalable infrastructures for big data processing, model training and high computation tasks Explore Now →
Agencies & Marketing Multi-client management compatible, quick setup, high-performance and flexible web hosting infrastructures Explore Now →
Media & Broadcasting High bandwidth and low latency infrastructure solutions for live streaming, video and heavy content traffic Explore Now →
Banks & Fintech Regulation-compliant, Tier-3/Tier-4 standard, highly secure financial infrastructures ensuring uninterrupted service Explore Now →
Government & Education Long-term, sustainable and secure infrastructure solutions compliant with regulations and data security requirements Explore Now →
Manufacturing / Industry Low-latency and high-availability infrastructure solutions compatible with Industry 4.0, IoT and production automation systems Explore Now →
Healthcare Organizations Highly secure and uninterrupted health informatics infrastructures prioritizing patient data privacy and continuity Explore Now →
HEIMWALL – Web Application Firewall Protect your web applications against advanced attacks with our 100% domestic WAF platform HEIMWALL Explore Now →
Ilkbyte - Cloud Server Service Scalable and high-performance cloud servers deployable in seconds with our domestically developed orchestration infrastructure Explore Now →
Netrafix - Bandwidth Monitoring Manage 5651 compliant logging and bandwidth billing (Burst, Traffic Quota, 95th Percentile) in one platform with sFlow, NetFlow and IPFIX supported Netrafix Explore Now →
Secure Internet - For ISPs Keep your DNS traffic in your own network with 100% domestic DNS software developed for authorized ISPs Explore Now →
DirectIP - IP Management System 100% domestic IP management platform developed by Netinternet for centralized IP address, subnet, VLAN and DHCP management Explore Now →
RuleDNS - Rule-Based DNS Management Dynamically manage DNS responses with rule-based RuleDNS, easily integrate CDN and services with API support Explore Now →
Documents / Whitepapers Developer-focused technical documentation covering all API endpoints, usage scenarios and automation examples Explore Now →
API Documentation Developer-focused technical documentation covering API endpoints, usage scenarios and automation examples for platform integration Explore Now →
Peering Policies Reference policies transparently explaining our network architecture, traffic exchange principles and peering criteria Explore Now →
Frequently Asked Technical Questions Clear and actionable answers to the most frequently asked technical questions about infrastructure, security and operations Explore Now →
System Status Status page transparently sharing real-time status, planned maintenance and past outages of all platforms and services Explore Now →
Our Physical Data Center
Our Physical Data Center Our corporate data center facility designed with high security standards and redundant power and cooling infrastructure Explore Now →
Power, Cooling, Security Facility architecture designed for critical infrastructures with redundant power lines, climate systems and multi-layered physical security Explore Now →
Internet Access Points Low-latency and high-availability backbone connections through multiple operators and internet exchange points Explore Now →
Network Infrastructure
Network Infrastructure Uninterrupted connectivity infrastructure with multi-carrier connections, redundant backbone and high-capacity network architecture Explore Now →
Network Policies Sustainable network operation policies with transparently defined rules for traffic management, peering, security and capacity usage Explore Now →
Planning and Processes Scalable and controlled network management approach with pre-designed network capacity planning, growth scenarios and operational processes Explore Now →
Certificates and Documents
Our Certifications We provide auditable and sustainable infrastructure standards with our certifications for information security and service continuity Explore Now →
Security Policy We ensure protection of infrastructure and data with our security policies covering information security, access control and risk management Explore Now →
KVKK Compliance Data processing and storage structure compliant with KVKK and related regulations with defined technical and administrative measures for personal data protection. Explore Now →
Quality Policy Our quality management policies within the scope of ISO 9001 for continuous improvement of service quality. Explore Now →
Service Management Policy Our policies and standards governing IT service management processes within the scope of ISO/IEC 20000-1. Explore Now →
Business Continuity Policy Our ISO 22301 compliant policies and procedures ensuring business continuity against possible outage scenarios. Explore Now →
Incident Management Policy Our incident management processes and action plans for the detection, response and resolution of security incidents. Explore Now →
Supplier Security Policy Our policy governing information security requirements and risk assessment processes in supplier relationships. Explore Now →
Disclosure Text Text prepared within the scope of our disclosure obligation regarding the processing of your personal data under KVKK. Explore Now →
Cookie Policy Our policy regarding cookies and data collection practices used on our website. Explore Now →
Hosting Provider and Legal Obligation Policy Legal obligations we fulfill as a hosting provider under Law No. 5651. Explore Now →
Blog Posts Technical analyses, sector evaluations and current content about data center, network, cyber security and cloud technologies Explore Now →
Case Studies Reference case studies describing needs encountered, solutions applied and outcomes achieved in real projects Explore Now →
Events and Announcements Events we attend and organize, technical meetings, launches and current announcements about Netinternet Explore Now →
Technical Support

Frequently Asked Technical Questions

Clear answers to frequently asked technical questions about infrastructure, security and operational processes.

Technical FAQ
Sunucu Yönetimi Ağ & DNS Güvenlik Yedekleme Veritabanı
24+
Technical Questions
5
Category
%95
Resolution Rate
7/24
Support

Sunucu Yönetimi

6 questions
Q How to Identify High CPU Usage on Linux Servers?

A sudden spike in CPU usage on Linux servers is one of the most common causes of performance degradation. The following tools should be used to analyze this situation:

  • top and htop: Display real-time CPU usage
  • ps aux --sort=-%cpu: Lists the processes using the most CPU
  • uptime: Provides load average values

In particular, high load average values (e.g., exceeding the number of CPU cores) indicate that the system has reached a bottleneck.

 

linux cpu kullanımı
Was this answer helpful?
Q How do I update my server's operating system and packages?

You should install updates regularly to patch security vulnerabilities and improve performance:

  • Ubuntu/Debian: sudo apt update && sudo apt upgrade -y
  • CentOS/AlmaLinux/Rocky Linux: dnf update -y or yum update -y
  • Windows: You should install the latest "Security Patch" and "Quality" updates via the "Check for Updates" menu and then restart the server.
SunucuGüncelleme LinuxPaketYönetimi SistemBakımı
Was this answer helpful?
Q What Is a Swap Area and How Do You Create One?

Swap refers to the virtual memory space created on the disk to prevent the server from freezing when RAM usage is limited. In Linux, you can create it by following these steps:

  • fallocate -l 2G /swapfile (allocates 2 GB of space)
  • chmod 600 /swapfile (Sets permissions)
  • mkswap /swapfile and swapon /swapfile (Enables the swap space)
  • Don’t forget to add it to the /etc/fstab file to make it permanent.
SwapFile LinuxPerformans RamOptimization
Was this answer helpful?
Q How can I install a free control panel (CyberPanel, Plesk, etc.) on my server?

If you prefer to manage your server using a graphical interface instead of the command line, you can install popular control panels. Most panels are installed on a clean operating system (Clean OS) using a single-line script. For example, to install CyberPanel, you can enter the command sh <(curl https://cyberpanel.net/install.sh || wget -O - https://cyberpanel.net/install.sh) in the terminal to launch the installation wizard.

NOTE: Before installation, make sure your server meets the minimum RAM requirements.

ControlPanel CyberPanel PleskKurulumu WebPanel SunucuYönetimi
Was this answer helpful?
Q How Can I Change the SSH Port for Security Reasons?

Port 22 is the port most frequently targeted by brute-force attacks. To improve security:

  1. Open the /etc/ssh/sshd_config file with a text editor.
  2. Remove the comment from the #Port 22 line and update it to Port 2222 (or an unused port).
  3. Important: Before saving the changes, allow the new port through the firewall (UFW/Firewalld).
  4. Restart the service using the systemctl restart sshd command.
SSH PortDeğiştirme SunucuGüvenliği BruteForceKoruması LinuxGüvenlik
Was this answer helpful?
Q How do I configure the new disk added to my server in the operating system?

When you increase your disk capacity or add a new disk via the customer panel, the operating system must be configured at the system level for this space to become available:

  • Linux: Use fdisk -l to locate the new disk, format it with mkfs.ext4, and mount it to a directory, then add it to the /etc/fstab file.
  • Windows: Open the "Disk Management" tool, initialize the new disk, and create a new simple volume to assign a drive letter.
DiskTanımlama LinuxStorage DiskGenişletme fdisk MountEtme
Was this answer helpful?

Ağ & DNS

5 questions
Q What Is DNS "Anycast" Technology and What Does It Offer Us?

Anycast DNS involves hosting your domain’s DNS records simultaneously on multiple servers located in various geographic regions around the world. When a user attempts to access your site, the DNS query is routed to the server physically closest to them. This technology reduces DNS resolution time to the millisecond level and enhances your site’s availability by distributing the load to mitigate potential DDoS attacks.

AnycastDNS DNSPerformans Latency GlobalRouting NetworkSpeed
Was this answer helpful?
Q What Are the Benefits of a Private VLAN Configuration?

If you have multiple servers (for example, an application server and a database server), you can configure these servers to communicate with each other over a local network (VLAN) without accessing the internet. This configuration:

  • Security: Ensures that database traffic remains isolated from the outside world.
  • Speed: Minimizes latency by leveraging local network speeds of 1 Gbps or 10 Gbps.
  • Cost: Data traffic passing through the local network is generally not deducted from your bandwidth quota.
PrivateVLAN InternalNetwork LocalNetwork VeriGüvenliği
Was this answer helpful?
Q What Is the Main Difference Between an A Record and a CNAME Record?
  • A Record: Directs a domain name to an IPv4 address (e.g., 185.x.x.x). It is the fastest type of record.
  • CNAME Record: Redirects a domain name to another domain name (alias) (e.g., blog.site.com -> site.com).
    Important Rule: Due to technical standards, a CNAME record cannot be used for the root domain (site.com); an A record must be used instead. For subdomains, however, a CNAME record is preferred to allow for greater flexibility.
ARecord CNAME DNSKayıtları Alias DomainYönlendirme
Was this answer helpful?
Q What Is a PTR (Reverse DNS) Record and Why Is It Important?

A PTR record is a "reverse" record that indicates which domain name an IP address is associated with. It is particularly critical for users who manage their own mail servers. Most email service providers (Gmail, Outlook, etc.) check the sender’s IP address PTR record to verify the legitimacy of incoming emails. If your PTR record does not match the domain you’re sending from, your emails may end up in the "Spam" folder or be rejected.

PTRRecord ReverseDNS MailGüvenliği SMTPSecurity IPReverse
Was this answer helpful?
Q Why Does It Take Time for DNS Records to Update (Propagate)?

When you change a DNS record (A, CNAME, MX, etc.), it typically takes between 2 and 24 hours for the change to propagate to all DNS servers worldwide. This is related to the TTL (Time to Live) value associated with the records. Until the TTL expires, internet service providers keep the old records in their cache. To speed up the process, you can lower the TTL value before making the change.

DNSPropagation TTLSüresi DNSGüncelleme CacheRefresh DNSResolving
Was this answer helpful?

Güvenlik

5 questions
Q Why Is Using an SSH Key More Secure Than a Password?

Traditional passwords can be compromised through brute-force attacks. With the SSH key system, however, you connect to the server using a "private key" file that you physically possess.

  • Advantage: It becomes impossible to gain access to the server through trial-and-error password attempts.
  • Procedure: After adding the "Public Key" you created with ssh-keygen to the authorized_keys file on the server, you can ensure the highest level of security by completely disabling password-based login (set PasswordAuthentication to no).
SSHKey KeyAuthentication SunucuBağlantı SecureShell
Was this answer helpful?
Q Why Should Two-Factor Authentication (2FA) Be Enabled in the Control Panel?

Your server management panel (Netinternet Customer Panel) is the key to your entire infrastructure. Enabling 2FA (Two-Factor Authentication) via Google Authenticator or SMS when logging into the panel prevents your servers from being deleted or your data from being stolen, even if your password is compromised. This acts as a "second lock" for your digital assets.

2FA İkiFaktörlüDoğrulama HesapGüvenliği AccountProtection
Was this answer helpful?
Q Is an SSL Certificate (HTTPS) Required Only for Security?

An SSL certificate prevents "man-in-the-middle" attacks by encrypting the data transmitted between the user and the server. However, today it is not only a security requirement but is also essential for the following reasons:

  • SEO: Google pushes websites without an SSL certificate to lower rankings in search results.
  • Trust: The "Not Secure" warning in browsers leads to user loss.
  • Payment Systems: The use of SSL (TLS 1.2+) is a legal requirement for accepting credit card payments.
SSLSertifikası HTTPS TLSEncryption WebSecurity SEOGüvenlik
Was this answer helpful?
Q What Is Fail2ban and How Does It Protect the Server?

Fail2ban is a security tool that continuously scans server logs. It automatically blocks IP addresses that exceed the specified number of failed login attempts by using the system’s firewall (iptables). It is a critical tool for stopping bot attacks targeting SSH, FTP, and SMTP services.

Fail2ban BruteForceDefense LogAnalysis SaldırıEngelleme
Was this answer helpful?
Q How Should a Firewall Be Configured?

Your server's security starts with opening only the necessary ports to the outside world. By default, you should close all ports and allow access only for the services you use:

  • Linux (UFW): You can allow web traffic using the commands ufw allow 80/tcp (HTTP) and ufw allow 443/tcp (HTTPS).
  • Windows: You can set restrictions in the "Inbound Rules" section of the "Windows Firewall with Advanced Security."
  • Recommendation: Opening SSH or RDP ports exclusively for your own static IP address will reduce your attack surface by 99%.
Firewall PortFilter UFW AğGüvenliği
Was this answer helpful?

Yedekleme

3 questions
Q Why Should I Store My Backups Off-site?

Storing backups on the same disk or in the same physical cabinet as the server is a major risk. In the event of a hardware failure, file system corruption, or ransomware attack, both your primary data and your backups could be destroyed simultaneously. Off-site backup is the "last refuge" for your data during a disaster.

OffSite RemoteStorage Ransomware DisasterRecovery Güvenlik
Was this answer helpful?
Q What is the "3-2-1" Backup Rule for Preventing Data Loss?

This golden rule is the foundation of security: You should have at least 3 copies of your data, stored on 2 different storage technologies (e.g., disk and cloud), and 1 copy must be kept in a physically different location (Off-site) from the data center where the server is located.

321Rule DisasterRecovery BestPractices VeriGüvenliği
Was this answer helpful?
Q What is the Difference Between Snapshot and Backup?

Snapshot is a quick copy of your server's state (including file system and RAM) at a specific moment, usually used as a "restore point" before updates. Backup, however, is the copying of your data to an independent storage unit outside the server. Snapshots are not suitable for long-term storage; regular backups are essential for true data security.

Snapshot Backup DataSecurity Yedekleme Recovery
Was this answer helpful?

Veritabanı

5 questions
Q How to Identify Slow Queries?

To find performance issues at their source, you should enable the "Slow Query Log" feature. This logs queries that take longer than a specified duration (e.g., 1 second) to a file. You can then analyze these queries using the EXPLAIN command to easily see where bottlenecks occur and identify missing indexes.

SlowQueryLog Explain Debugging DatabasePerformance Darboğaz
Was this answer helpful?
Q How Does Database Indexing Affect Performance?

Indexes allow the database to search through an "index" rather than scanning the entire table (Full Table Scan). Properly applied indexes to specific columns can speed up SELECT queries thousands of times. However, keep in mind that every unnecessary index slows down INSERT and UPDATE operations because the index must also be updated with each transaction.

Indexing PerformanceTuning SQLOptimization DatabaseIndexing SorguHızı
Was this answer helpful?
Q How to Export (Dump) and Restore an SQL Database?

The fastest method for taking a backup via the command line is the mysqldump tool. Use mysqldump -u user -p db_name > backup.sql to export and mysql -u user -p db_name < backup.sql to restore. For large databases, performing this action in a screen or tmux session protects you against connection drops.

MySQLDump BackupRestore SQL CLI VeritabanıYedekleme
Was this answer helpful?
Q How Do I Fix the "Too Many Connections" Error?

This error indicates that the number of clients trying to connect simultaneously exceeds the max_connections limit. To resolve it, you can increase this limit in the database configuration file or optimize your application's "Connection Pool" settings to ensure connections are properly closed once their task is complete.

Performance MaxConnections DatabaseError Optimization Concurrency
Was this answer helpful?
Q How Can I Connect to My Database Remotely?

For security reasons, databases are open only to the local network (localhost) by default. To allow remote access, you must change the bind-address value to 0.0.0.0 in the my.cnf file for MySQL/MariaDB and grant privileges to the user for your specific IP address. Also, ensure that port 3306 (MySQL) or 5432 (PostgreSQL) is open in the firewall.

RemoteAccess MySQL PostgreSQL BindAddress DatabaseSecurity
Was this answer helpful?

No results found

Try a different search term or contact our support team.

Couldn't find an answer?

Our technical support team is ready to help you.