Nexcess Logo

Nexcess Knowledge Base

Knowledge Base Home
|
Author : Jason Dobry
Jason Dobry
September 11, 2019

How to add admins in Magento 2

Learn how to give someone temporary access to your Magento 2 store.
September 11, 2019

Frequently Asked Questions for MageMojo Customers

This FAQ addresses common concerns of MageMojo customers about to migrate to Nexcess services.
September 11, 2019

How to clear Redis from CLI in Magento

Redis is commonly used on Magento stores for object caching and page caching. The Redis CLI will make clearing/flushing the Redis cache on your Magento store fast. Learn how in this article.
September 11, 2019

How to request and revoke facility access (OTR)

Learn how colocating clients request and revoke access cards for regular access and one-time visitor badges for entry into the Dearborn, Michigan facility (OTR) — the Nexcess data center.
September 11, 2019

How to create Magento 2 dev sites

How Nexcess clients on physical (non-cloud) clients can create Magento 2 development (dev) sites.
September 11, 2019

How to issue a reindex in Magento

Learn how to issue a reindex to optimize performance in Magento 1 from the admin panel or command line, which requires SSH access and some familiarity with the command line interface (CLI).
September 11, 2019

How to reset your SSH password and add SSH keys in SiteWorx

How Nexcess clients on a physical (non-cloud) servers can reset SSH passwords and add SSH keys.
September 11, 2019

What is phpMyAdmin?

Browser-based management of MySQL/MariaDB databases, tables, indexes, permissions, and SQL statements can be done using phpMyAdmin from within SiteWorx (non-cloud) or your Nexcess Client Portal.
September 11, 2019

How to set up Magento 2 to use your SSL certificate

Learn how to configure your Magento 2 store to use SSL certificates using either the Magento 2 Dashboard or SSH.
September 11, 2019

How can I prevent my site from being compromised?

If your site was recently compromised and the cause has yet to be identified, start with evaluating the list of possible root causes in this article before proceeding to the study of more exotic exploits.
We use cookies to understand how you interact with our site, to personalize and streamline your experience, and to tailor advertising. By continuing to use our site, you accept our use of cookies and accept our Privacy Policy.