Vepp Documentation

Connecting to Vepp

Vepp is a  SaaS-control panel for website management on virtual and dedicated servers. You don't need to install Vepp. You simply need to log in and connect your server. The website and its environment will be stored on your server. 

Step 1. Sign in


  1. Go to the  Vepp log in form, enter your Email and click  Next
  2. Set a new access password and enter it into the Set a password field. Clicking generate will generate a random password automatically. 
  3. Agree to the Terms of use and click Next. To read the Terms of use, click on details
  4. Vepp will send a registration notification to the email you have entered above. Find and open the email and click Confirm

Step 2. Connect your server


Note.

To connect to Vepp you need to have a server with CentOS 7 x64, Internet access, and public IP address.

We recommend a clean install of the operating system without third-party repositories and additional services, such as MariaDB or Nginx.

How to connect:

  1. Enter the public IP address of the server.
  2. Enter the SSH-port to connect to the server 
  3. Enter the Username, that will manage the server in Vepp. The selected user must have super-user permissions, normally root.
  4. Select the login method  By password and enter the user password. Vepp will connect to the server and add the SSH-key for further connections. The password is not saved in the control panel.
  5. Click Add and wait for the service to complete the preparation procedure. 

Note.

Servers on AWS (Amazon Web Services) can be connected to Vepp only with an SSH-key. 

Alternatively, you can use the SSH-key generated by Vepp. To add the key to the server manually:

  1. Select the login method By SSH-key
  2. Click show key to view the contents of the key. Click copy to copy the key contents into the clipboard. 
  3. Connect to the server via SSH with the superuser permissions, normally root. If your server is in AWS:
    1. Go to the AWS website and log in to the Client area: My account → AWS management console
    2. Navigate to Services → Compute → EC2.
    3. Go to Instances → Instances, right-click on the VPS and Connect to connect to the server terminal. 
    4. Follow the AWS instructions. 
  4. Execute the following command to make sure the ~/.ssh directory exists on the server: 

    mkdir -p ~/.ssh

    mkdir will create this directory if it is not present. 

  5. Execute the command to add the SSH-key: 

    echo <SSH-key> >> ~/.ssh/authorized_keys

    Change "<SSH-key>" into the contents of the SSH-key you have copied on step 2. 

  6. Set the access permissions to the file with the SSH-key: 

    chmod 400 ~/.ssh/authorized_keys 

Step 3. Set up a domain


Note.

This is an optional step because Vepp is in alpha and we don't recommend using it for existing websites.

If you do not assign a domain, you can access Vepp by a technical domain in the format <IP address>:<port>.

It is easier to open a website by a domain name than by its IP address. An A-record maps a domain name to the IP address. It is created on the domain server where resource records are processed. Currently, Vepp doesn't provide a tool for domain server management, so you need to add the A-record manually. To do so, perform the following steps: 

  1. Log into the Client area of your domain registrar. 
  2. Open the domain configuration form. 
  3. Open a list of the domain's resource records.  
  4. Add an A-record. Enter the public IP address of your server (it was specified when you connected the server). 
  5. Save the domain settings. 

If your server uses several public IP addresses:

  1. Add the website with your domain into Vepp (step 4). 
  2. Click on Websites and copy the IP address
  3. Log into to the Client area of your domain registrar. 
  4. Open the domain configuration form. 
  5. Open a list of the domain's resource records.  
  6. Add an A-record. Enter the IP address that you have copied above.
  7. Save the domain settings. 

Note.

Domain records can take up to 72 hours to update.

Step 4. Add a website


Select how you want to create a website:

For more information please refer to the article How to create a website

If your server runs behind the NAT


If your server is behind the NAT,  create the rules to open the ports.

Note

If you purchased a VPS for your website, you need to go to your provider's Client area to set the NAT rules.

Type

Protocol

Port Range

Source

Description

SSH*

TCP

22

0.0.0.0/0

This port is used to connect to a server via SSH. We recommend that you enter a specific IP address to connect to the server.

Custom TCP Rule*

TCP

20000:22000

0.0.0.0/0

This port is used for a technical domain,

DNS (UDP)

UDP

53

0.0.0.0/0

This port is used for DNS.

HTTP

TCP

80

0.0.0.0/0

This port is used for WWW-domains that run via HTTP.

HTTPS

TCP

443

0.0.0.0/0

This port is used for WWW-domains that run via HTTPS.

SMTP

TCP

25

0.0.0.0/0

This port is used for mail domains (send emails).

POP3

TCP

110

0.0.0.0/0

This port is used for mail domains (receive emails).

IMAP

TCP

143

0.0.0.0/0

SMTPS

TCP

465

0.0.0.0/0

This port is used for secure SMTP.

POP3S

TCP

995

0.0.0.0/0

This port is used for secure POP3.

IMAPS

TCP

993

0.0.0.0/0

This port is used for secure IMAP.

Custom TCP Rule

TCP

3306

0.0.0.0/0

This port is used to connect to a database management system.

Custom TCP Rule

TCP

21

0.0.0.0/0

This port is used to connect to the server via FTP.

Configuring NAT rules on AWS (Amazon Web Services)

Perform the following steps to add NAT rules for a VPS in Amazon Web Services:

  1. Go to the AWS website and login in the Client area: My accountAWS management console
  2. Navigate to Services → Compute → EC2.
  3. Go to Network & Security → Security Groups and click on Create Security Group, to add a new table with rules. 
  4. On the Inbound tab add the rules from the above table and click Create
  5. Go to Instances → Instances, select the VPS, and click ActionsNetworkingChange Security Groups
  6. Select the group that you have created on step 4 and click Assign Security Groups