New VPS Node with 64 CPU Cores

Until now we have been using Dual Xeon 5680 or similar CPU for our VPS Nodes but these CPU had 6 Cores in each CPU and with hyper threading it increases to 12 Virtual Cores per CPU so basically we were getting in total 24 CPU Cores Per VPS Node which means multiple VPS were sharing same CPU Core but since we were using Xeon 5680 CPU due to it’s high Clock Speed of upto 3.3 Ghz it was not affecting VPS Performance, but now our new VPS Node will with Quad AMD Opteron 6380 CPU.

AMD Opteron 6380 CPU comes with 16 Core Per CPU and since we are using Quad we will get total 16 x 4 = 64 CPU Cores

But clock speed of this CPU is 2.5 Ghz and not 3.3 Ghz. But now since we got a lot more CPU core per VPS Node it means that a CPU Core will be hardly shared among multiple VPS, most of the times all VPS Will get a dedicated CPU Core which means better performance even though it’s clock speed is a little slow then our current VPS Node. This new VPS Node is costlier then our current VPS Node setup, but we want to keep improving quality of service without increasing the price hence we are doing this change.

We expect our new VPS Node to be ready by next week, it will not affect any existing customer, but once our current VPS Nodes are full all new VPS will be setup on our new VPS Nodes.

We will be still using KVM Virtualisation with Pure SSD RAID 10 setup for best performance.

For any queries submit a support ticket from our website


Custom VPS Now available at

Now you can design your own custom VPS at, we are now allowing our clients to design their own VPS Package and only pay for the resources they need, our regular VPS packages are still available at

You can design and order your own custom vps from –¬†

Now you can decide how many CPU cores do you want, how much RAM do you need or how much Disk Space do you need, you can even order additional IP.

For any queries please just submit a support ticket from

Stay away from AMD EPYC based VPS Providers

Some german researches have found a flaw in the AMD EPYC CPU architecture and were able to read all data of VPS hosted with AMD EPYC based CPU, and it seems currently there is no patch for it so it’s best to stay away from it for now, more information is available at:


AMD responds to security flaws in its EPYC virtual machine encryption


We at Hosteons are not using AMD EPYC CPU, we are using Dual XEONS for VPS Hosting

How to enable iptables in CentOS 7

Just use the following commands to disable firewalld and enable the good old iptables in any CentOS 7 based VPS or server:

[root@test2 ~]# systemctl stop firewalld

[root@test2 ~]# systemctl mask firewalld
Created symlink from /etc/systemd/system/firewalld.service to /dev/null.

[root@test2 ~]# yum install -y iptables iptables-services
Loaded plugins: fastestmirror
Loading mirror speeds from cached hostfile
* base:
* extras:
* updates:
base | 3.6 kB 00:00:00
extras | 3.4 kB 00:00:00
updates | 3.4 kB 00:00:00
Package iptables-1.4.21-24.1.el7_5.x86_64 already installed and latest version
Resolving Dependencies
–> Running transaction check
—> Package iptables-services.x86_64 0:1.4.21-24.1.el7_5 will be installed
–> Finished Dependency Resolution

Dependencies Resolved

Package Arch Version Repository Size
iptables-services x86_64 1.4.21-24.1.el7_5 updates 51 k

Transaction Summary
Install 1 Package

Total download size: 51 k
Installed size: 25 k
Downloading packages:
iptables-services-1.4.21-24.1.el7_5.x86_64.rpm | 51 kB 00:00:00
Running transaction check
Running transaction test
Transaction test succeeded
Running transaction
Installing : iptables-services-1.4.21-24.1.el7_5.x86_64 1/1
Verifying : iptables-services-1.4.21-24.1.el7_5.x86_64 1/1

iptables-services.x86_64 0:1.4.21-24.1.el7_5

[root@test2 ~]#

[root@test2 ~]# systemctl enable iptables
Created symlink from /etc/systemd/system/ to /usr/lib/systemd/system/iptables.service.
[root@test2 ~]#
[root@test2 ~]# systemctl start iptables

How to update SSH Port in CentOS 7

Update SSH Port in CentOS 7

Here are few simple steps on how to update SSH Port in CentOS 7 VPS or Dedicated Server

Edit the SSHD configuration file :

nano -w /etc/ssh/sshd_config

(if nano is not installed use any other text editor or install it with yum -y install nano)

and change the Port number from 22 to any custom port you choose :

e.g. Port 18989

Make sure to even remove the # mark before Port

Save the config file

SELinux is enabled by default in CentOS 7 so you need to even inform SELinux to change the SSH Port else it won’t allow you to restart SSHD with new Port.

To run semanage for updating SSHD Port you nee to first install policycoreutils, install it with :

yum -y install policycoreutils-python

now update SeLinux policy to allow new port for SSH service. to do this, run below :

semanage port -a -t ssh_port_t -p tcp 18989

now you need to update Firewall policy to allow new SSH Port, to do this run below :

firewall-cmd –permanent –zone=public –add-port=18989/tcp
firewall-cmd –reload
systemctl restart sshd.service

SSHD Port is now updated, you can now connect to your new SSH Port: 18989

Free upgrade to Gigabit port for all VPS (Beta)

We have temporarily removed the 100Mbps cap from all VPS, if you think your VPS is still capped at 100Mbps, please just reboot it once from your VPS control panel and it should switch to full unmetered Gigabit Port, but please note we are just testing with Gigabit port, if we find that giving uncapped Gigabit port is affecting overall performance of our VPS services then we may again cap it to 100Mbps unmetered but for now all VPS should work on Gigabit Port

Setup OpenVPN on a KVM Based VPS like hosteons

install openvpn on lvm based vps

Just run following command as root on a CentOS / Ubuntu / Debian based VPS or Dedicated Server and follow the prompts to install OpenVPN:

wget -O && bash

Once it ends, you can run it again to add more users, remove some of them or even completely uninstall OpenVPN.

It works even on the cheapest VPS Package provided by


Quick setup of L2TP or IPsec VPN on CentOS, Ubuntu or Debian

One line setup:

First get a fresh install of Ubuntu LTS, Debian or CentOS on your hosteons VPS or Dedicated Server (VPS should be KVM based not OpenVZ, if you are using VPS then need not worry as it’s KVM based VPS)

Use following command to set up an IPsec VPN server on Ubuntu or Debian:

wget -O && sudo sh

If you are on CentOS then use following command:

wget -O && sh

Your VPN login details will be randomly generated, and displayed on screen when finished.

Also it’s best to run these commands in a screen session to avoid any interruptions due to any reasons.

Custom Setup of VPN:

Ubuntu and Debian:

Make sure your VPS/Dedicated server is upto date, you can do it with following commands:

apt-get update && apt-get dist-upgrade

and reboot.

Now Edit the script and provide your own VPN credentials:

wget -O
nano -w
[Replace with your own values: YOUR_IPSEC_PSK, YOUR_USERNAME and YOUR_PASSWORD]

sudo sh


Make sure your VPS/Dedicated server is upto date, you can do it with following commands:

yum -y update

(if you are using vps then need not worry, our templates update everything when the VPS is setup)

Now Edit the script and provide your own VPN credentials:

wget -O
nano -w
[Replace with your own values: YOUR_IPSEC_PSK, YOUR_USERNAME and YOUR_PASSWORD]



Your VPN server is now ready, just connect using the Shared Key, username and password you provided during setup or displayed on script, depending upon how you setup your VPN.

Benefits of KVM VPS over other virtualisation technology

1. Dedicated Resources: KVM VPS are not like shared servers or other types of virtualisation e.g. OpenVZ where resources are shared among users, with KVM VPS you get dedicated resources as it’s not possible to oversell resources with KVM Virtualisation. If you have a KVM VPS from you can be sure that you are getting the exact same amount of resources as you ordered. With OpenVZ it’s very easy to oversell all resources on the server but not with KVM.

2. Free from neighbourhood troubles: If you are using KVM VPS from you need not worry about bad scripts or softwares being run by other users on the same server because with KVM since all VPS runs on their own dedicated resources, any abusive activity by another VPS user won’t affect your VPS. Since you have full control over your VPS you can keep your VPS updated and secure and need not worry even if your neighbourhood VPS users are updated/secure or not.

3. Dedicated IP for mail and other activities: Hosteons VPS comes with dedicated IP with full RDNS control hence you need not worry about other VPS users spoiling IP reputation, and since you get RDNS control you can be sure that your mail will be delivered to the inbox of the recipient and won’t get bounced or going to junk mail.

4. Quick Reboot and Reinstalls: Hosteons KVM VPS comes with SolusVM control panel which gives complete control for Reboot, Reinstalls as well as VNC access