A simple self-managed server panel built with Laravel for automating Git deployments and managing your web server. Deploy websites from GitHub/GitLab, configure Nginx virtual hosts, monitor system health, manage SSL certificates, set up alerts, control your firewall, and moreβall through a clean, modern web interface.
- π― Multi-Provider Support - Works with GitHub and GitLab
- π Auto SSH Key Generation - Unique SSH key pairs for each webhook
- π€ Deploy User Control - Execute deployments as specific system users
- π Beautiful Dashboard - Modern Bootstrap 5 UI with statistics
- π Automated Deployments - Trigger deployments via webhooks or manually
- π Deployment History - Track all deployments with detailed logs
- π Webhook Verification - Secure webhook signatures validation
- βοΈ Pre/Post Deploy Scripts - Run custom commands before and after deployment
- π Multi-Project Support - Manage both PHP and Node.js projects
- β‘ Auto Nginx Configuration - Automatic vhost generation and deployment
- π SSL/TLS Support - Automated Let's Encrypt SSL certificate management with TLS 1.2/1.3
- π Auto SSL Renewal - Daily automatic certificate renewal (runs at 2:30 AM)
- π‘οΈ Security Hardened - Auto-applied security headers, HSTS, file protection, and hardened SSL
- π Version Management - Support for multiple PHP (7.4-8.4) and Node.js (16.x-21.x) versions
- π― Background Processing - Queue-based Nginx deployment and SSL requests
- π Status Tracking - Real-time Nginx and SSL status monitoring
- π§ Easy Configuration - Simple web interface for website management
- β‘ Performance Optimized - Static caching, gzip compression, optimized buffers
- π» System Metrics - Real-time CPU, Memory, and Disk usage monitoring
- π I/O Performance - Track Disk I/O (read/write) and Network I/O (upload/download) rates
- π Timeline Charts - Visual trend analysis with Chart.js integration (1h, 3h, 6h, 12h filters)
- β±οΈ Configurable Intervals - Customizable monitoring intervals and data retention
- π Background Collection - Automated metrics collection via Laravel Scheduler
- π― Cross-Platform - Supports both macOS and Linux/Ubuntu servers
- π Metric Monitoring - CPU, Memory, Disk usage, and Service status tracking
- π Multi-Channel Notifications - Email and Slack webhook integration
- βοΈ Custom Thresholds - Define alert conditions with flexible operators (>, <, ==, !=)
- β° Duration-Based Alerts - Prevent false alarms with time-based triggers
- π Alert History - Track, view, and resolve triggered alerts
- π― Severity Levels - Info, Warning, and Critical alert classification
- π Auto-Check - Runs every minute via Laravel Scheduler
- π₯ Firewall Control - Enable/disable firewall from web interface (UFW/firewalld)
- π Rule Management - Add, edit, and delete firewall rules
- π― Port-Based Rules - Allow/deny specific ports (e.g., 80, 443, 22)
- π IP Filtering - Restrict access by IP address or CIDR range
- β¬οΈβ¬οΈ Direction Control - Configure inbound, outbound, or both
- π Quick Actions - Reset to defaults, reload rules
- π₯οΈ Multi-Platform - UFW (Debian/Ubuntu) and firewalld (RHEL/Rocky/Alma)
- π Crontab GUI - Web interface for managing cron jobs
- βοΈ Schedule Builder - Easy configuration with predefined intervals
- π Sync to System - Direct integration with system crontab
- β Enable/Disable - Toggle jobs without deletion
- π Command History - Track all scheduled commands
- π₯οΈ User-Specific - Manages www-data user crontab for web tasks
- π Multi-Log Support - View Laravel, Nginx access/error, and system logs
- π Search & Filter - Quick search through log entries
- π Real-time Display - Shows last 500 lines with latest-first ordering
- ποΈ Log Management - Clear Laravel logs with one click
- π₯οΈ Terminal-Style UI - Dark theme for easy log reading
- π DNS Management - Automatic DNS record creation for websites
- π Auto-Sync - One-click DNS synchronization
- β Status Tracking - Monitor DNS record status (active/pending/failed)
- π Secure API - Uses CloudFlare API tokens for authentication
- π― A Record Support - Automatic A record creation pointing to server IP
- π§ System Services - Manage Nginx, PHP-FPM, MySQL, Redis, Supervisor from web UI
- π Service Status - Real-time status, PID, uptime, CPU and RAM usage per service
- π Service Control - Start, stop, restart, reload services with one click
- π Service Logs - View service logs (systemd journal) with configurable line counts
- β‘ Multi-Version PHP - Manage all PHP versions (7.4-8.4) individually
- π¦ Queue System - Asynchronous deployment and configuration processing
- π± Responsive Design - Modern card-based UI, works on all devices
- π¨ PSR-Compliant Code - Clean, maintainable codebase
- π Secure by Design - Proper permission management and validation
- π Beautiful UI - Clean, modern Bootstrap 5 interface with collapsible cards
- Ubuntu 20.04+ / Debian 11+
- Rocky Linux 8+ / AlmaLinux 8+ / CentOS Stream 8+
- Root access or sudo privileges
- Domain name pointed to your server
All other dependencies (PHP, MySQL, Nginx, Redis, etc.) will be installed automatically by the installer.
curl -fsSL https://raw.githubusercontent.com/hymns/hostiqo/master/scripts/install.sh | sudo bashOr download and run manually:
wget https://raw.githubusercontent.com/hymns/hostiqo/master/scripts/install.sh
sudo bash install.shNeed to re-run just part of the installer? Each phase is callable on its own:
sudo bash install.sh --phase1 # System prerequisites
sudo bash install.sh --phase2 # Sudoers configuration
sudo bash install.sh --phase3 # Laravel application setup
sudo bash install.sh --phase4 # Nginx + SSL configurationThe installer will:
- Clone Hostiqo to
/var/www/hostiqo - Install all system prerequisites (Nginx, PHP 8.2, MySQL, Redis, Node.js, Supervisor, etc.)
- Configure sudo permissions for www-data
- Setup Laravel application (database, migrations, admin user)
- Configure Nginx with SSL and security hardening
Time: ~15-25 minutes
| Component | Details |
|---|---|
| PHP | 7.4 - 8.4 (with OPcache + JIT auto-tuning) |
| MySQL/MariaDB | MySQL 8.0 (Debian) / MariaDB (RHEL) |
| Nginx | Latest |
| Redis | Latest |
| Node.js | 20.x LTS |
| Supervisor | Latest |
| Certbot | Latest |
| fail2ban | Latest |
Access your Hostiqo panel at https://your-domain.com
Login with the admin credentials you created during installation.
Update to the latest version:
cd /var/www/hostiqo
php artisan hostiqo:updateOptions:
--force- Skip confirmation prompt--no-backup- Skip database backup--sudoers- Refresh sudo permissions after update (run command withsudo)
Refresh sudoers automatically during the update:
cd /var/www/hostiqo
sudo php artisan hostiqo:update --sudoersNote: The
--sudoersflag executessudo bash scripts/install.sh --phase2to update/etc/sudoers.d/hostiqo-manager.
-
Navigate to Webhooks β Click "Create Webhook"
-
Fill in Basic Information:
- Name: Descriptive name for your webhook
- Domain: Optional website reference
- Status: Active/Inactive
-
Configure Repository:
- Git Provider: GitHub or GitLab
- Repository URL: SSH or HTTPS URL (e.g.,
git@github.com:user/repo.git) - Branch: Branch to deploy (e.g.,
main,develop) - Local Path: Absolute path for deployment (e.g.,
/var/www/html/myproject) - Deploy User: User to execute deployment commands (e.g.,
www-data,deployer,nginx)
-
SSH Key Configuration:
- Check "Auto-generate SSH Key Pair" to create unique SSH keys
- Public key will be shown after creation
-
Deploy Scripts (Optional):
- Pre-Deploy Script: Commands to run before deployment
- Post-Deploy Script: Commands to run after deployment
- Go to your repository β Settings β Webhooks β Add webhook
- Payload URL: Copy from webhook details page
- Content type:
application/json - Secret: Copy the secret token from webhook details
- Which events? Just the push event
- Active: β Checked
- Go to your repository β Settings β Webhooks β Add webhook
- URL: Copy from webhook details page
- Secret Token: Copy from webhook details
- Trigger: Push events
- SSL verification: Enable SSL verification
- Go to repository β Settings β Deploy keys β Add deploy key
- Title: Webhook Deploy Key
- Key: Paste the public SSH key from webhook details
- Allow write access: Not required (read-only is fine)
- Go to repository β Settings β Repository β Deploy Keys
- Title: Webhook Deploy Key
- Key: Paste the public SSH key
- Click Add key
- Navigate to Webhooks β Select your webhook
- Click Deploy Now button
- Deployment will be queued and processed by queue worker
- View deployment status in real-time
- Navigate to Deployments or click on a deployment
- View detailed logs including:
- Deployment status
- Commit information
- Terminal output
- Error messages (if failed)
- Execution time
The Server Health page provides real-time system performance metrics and historical trends.
- Navigate to Server Health from the sidebar menu
- View current system status:
- CPU Usage - Current processor utilization percentage
- Memory Usage - RAM usage with used/total display
- Disk Usage - Storage utilization percentage
System Performance Chart:
- Displays CPU, Memory, and Disk usage trends over time
- Default shows last 6 hours (configurable)
- Hover over chart for detailed values at specific times
I/O Performance Chart:
- Disk I/O - Read and write speeds in MB/s
- Network I/O - Download and upload rates in MB/s
- Real-time calculation based on metric intervals
- Helps identify performance bottlenecks
Configure monitoring settings in .env:
# Enable/disable monitoring
MONITORING_ENABLED=true
# Collection interval in minutes (how often to collect metrics)
MONITORING_INTERVAL=1
# Data retention in hours (how long to keep historical data)
MONITORING_RETENTION_HOURS=24
# Chart display hours (how many hours to show in charts)
MONITORING_CHART_HOURS=6βοΈ The automated installer already provisions Supervisor programs
hostiqo-queueandhostiqo-scheduler, so background workers start automatically on fresh installs. Only follow the manual steps below if you performed a custom/manual setup or need to reconfigure services.
Queue worker and Scheduler must be running for deployments and metrics collection:
# Development
php artisan queue:work
php artisan schedule:work
# Production (use Supervisor)
[program:hostiqo-queue]
command=php artisan queue:work --sleep=3 --tries=3 --max-time=3600
directory=/var/www/hostiqo
user=www-data
numprocs=2
autostart=true
autorestart=true
stopwaitsecs=3600
[program:hostiqo-scheduler]
command=php artisan schedule:work
directory=/var/www/hostiqo
user=www-data
autostart=true
autorestart=trueMonitor system metrics and receive notifications when thresholds are exceeded.
- π¨ Real-time Monitoring - Automatic metric checking every minute
- π Metric Types - CPU, Memory, Disk usage, and Service status monitoring
- π Multi-Channel Notifications - Email and Slack webhook support
- βοΈ Customizable Thresholds - Define your own alert conditions
- π― Smart Alerting - Duration-based triggers to prevent false alarms
- π Alert History - Track and resolve triggered alerts
- Navigate to Alerts & Monitoring β Create Alert Rule
- Configure your alert:
- Name: e.g., "High CPU Alert"
- Metric: Choose from CPU, Memory, Disk, or Service
- Condition:
>,<,==,!= - Threshold: e.g.,
80(for 80% CPU usage) - Duration: Minutes before alerting (prevents false alarms)
- Channel: Email, Slack, or Both
Setting Up Slack Notifications:
-
Create Slack Incoming Webhook:
- Go to your Slack workspace settings
- Navigate to: Apps β Incoming Webhooks
- Or visit: https://api.slack.com/messaging/webhooks
- Click Add to Slack
- Choose channel for notifications (e.g.,
#alerts,#monitoring) - Copy the Webhook URL (looks like:
https://hooks.slack.com/services/T00000000/B00000000/XXXXXXXXXXXX)
-
Configure Alert Rule with Slack:
- In the alert rule form, select Slack or Both for notification channel
- Paste your Slack Webhook URL in the Slack Webhook URL field
- Save the alert rule
-
Test Your Slack Integration:
# Quick test via curl curl -X POST YOUR_WEBHOOK_URL \ -H 'Content-Type: application/json' \ -d '{"text":"Test Alert from Hostiqo Manager π"}'
Slack Notification Format:
Alerts sent to Slack include:
- π΄ Critical alerts (red color)
β οΈ Warning alerts (yellow color)- βΉοΈ Info alerts (green color)
- Alert title and message
- Timestamp
- Formatted as rich attachments with colors
Example Slack Message:
π¨ Alert: High CPU Usage
ββββββββββββββββββββ
CPU is 85% (threshold: 80%)
ββββββββββββββββββββ
Hostiqo Manager
Today at 2:30 PM
Configuring Email:
Set up email in your .env file:
# Email Configuration
MAIL_MAILER=smtp
MAIL_HOST=smtp.gmail.com
MAIL_PORT=587
MAIL_USERNAME=your-email@gmail.com
MAIL_PASSWORD=your-app-password
MAIL_ENCRYPTION=tls
MAIL_FROM_ADDRESS=noreply@webhook.com
MAIL_FROM_NAME="Hostiqo Manager"Supported Mail Drivers:
- SMTP (Gmail, Outlook, SendGrid, Mailgun)
- Mailgun API
- Postmark
- Amazon SES
- Sendmail
- Log (for testing)
For Gmail:
- Enable 2-factor authentication
- Generate App Password: https://myaccount.google.com/apppasswords
- Use App Password in
MAIL_PASSWORD
Email Notification Format:
π΄ Alert: High Memory Usage
Memory is 92% (threshold: 90%)
Time: 2024-12-07 14:30:00
1. High CPU Alert:
Name: High CPU Usage
Metric: CPU
Condition: > (greater than)
Threshold: 80
Duration: 5 minutes
Channel: Both (Email + Slack)
2. Low Disk Space:
Name: Low Disk Space Warning
Metric: Disk
Condition: > (greater than)
Threshold: 90
Duration: 10 minutes
Channel: Email
3. Service Down Alert:
Name: Nginx Service Down
Metric: Service
Condition: != (not equal)
Threshold: 1
Service Name: nginx
Duration: 1 minute
Channel: Slack
4. Memory Spike:
Name: Memory Threshold Exceeded
Metric: Memory
Condition: > (greater than)
Threshold: 85
Duration: 3 minutes
Channel: Both
Every 2 minutes: SystemMonitorJob collects metrics
β
Every 1 minute: CheckAlertsJob checks rules
β
If condition met for duration β Trigger alert
β
Send notifications (Email/Slack)
β
Store alert in database
β
User can view and resolve in UI
Alerts are automatically categorized by severity:
- Critical (π΄) - Threshold exceeded by >20% or service is down
- Warning (
β οΈ ) - Threshold exceeded by 10-20% - Info (βΉοΈ) - Threshold exceeded by <10%
View Alerts:
- Navigate to Alerts & Monitoring
- See recent triggered alerts
- Filter by severity and status
Resolve Alerts:
- Click Resolve button on an alert
- Marks alert as resolved
- Prevents duplicate notifications
Alert History:
- All alerts are stored with timestamps
- Track patterns and trends
- Audit alert activity
-
Navigate to Websites β PHP Projects β Add PHP Website
-
Fill in website details:
- Name: Project identifier
- Domain: e.g.,
example.com - Root Path: e.g.,
/var/www/example_com - Working Directory: e.g.,
/public(Laravel),/public_html(other) - PHP Version: Select from 7.4 to 8.3
- PHP Pool Name: Custom FPM pool name (optional)
- SSL Enabled: Check for HTTPS support
-
System automatically generates:
- Nginx virtual host configuration
- PHP-FPM pool configuration
- Webroot directory (in local mode)
- Sample index.html (in local mode)
-
Navigate to Websites β Node Projects β Add Node Website
-
Fill in website details:
- Name: Project identifier
- Domain: e.g.,
api.example.com - Root Path: e.g.,
/var/www/api_example_com - Node Version: Select from 16.x to 21.x
- Port: Application port (e.g.,
3000,8080) - SSL Enabled: Check for HTTPS support
-
System automatically generates:
- Nginx reverse proxy configuration
- PM2 ecosystem configuration file
- Log directories
Complete workflow for Node.js applications:
- Add Website β Generate Nginx + PM2 config
- Setup Webhook β Configure git deployment
- Configure Post-Deploy Script:
# Install dependencies
npm install --production
# Start or restart PM2 app (works for both first deploy and updates)
pm2 restart api-example-com --update-env || pm2 start /etc/pm2/ecosystem.api-example-com.config.js
# Save PM2 process list
pm2 save- Push to Git β Webhook triggers:
- Git pulls code
- Runs post-deploy script
- PM2 starts/restarts application automatically
PM2 Generated Configuration:
The system creates PM2 ecosystem files with:
- Node.js version from website settings
- Application port configuration
- Cluster mode (auto-scale based on CPU cores)
- Auto-restart on failure
- Memory limits (1GB)
- Environment variables (NODE_ENV, PORT)
- Log file paths
File Locations:
- Production:
/etc/pm2/ecosystem.{domain}.config.js - Local/Dev:
storage/server/pm2/ecosystem.{domain}.config.js
The Magic Command:
pm2 restart {app-name} || pm2 start {config-path}This single command handles both scenarios:
- First deployment: App doesn't exist β PM2 starts it
- Subsequent deployments: App exists β PM2 restarts it
No need to change webhook scripts after first deployment!
The system automatically renews Let's Encrypt SSL certificates to prevent expiration.
How It Works:
- Automated Schedule: Runs daily at 2:30 AM
- Certbot Renewal: Executes
certbot renewto check and renew expiring certificates - Auto-Reload: Nginx automatically reloads after successful renewal
- Zero Downtime: Renewal happens without service interruption
Manual Renewal (if needed):
# Run renewal manually
sudo certbot renew
# Force renewal (even if not expiring soon)
sudo certbot renew --force-renewal
# Check certificate expiration
sudo certbot certificatesMonitoring:
- Renewal attempts are logged to
storage/logs/laravel.log - Check logs with:
tail -f storage/logs/laravel.log | grep "SSL" - Certbot logs:
/var/log/letsencrypt/letsencrypt.log
Important Notes:
- Certificates auto-renew when they have 30 days or less remaining
- Let's Encrypt certificates are valid for 90 days
- Daily checks ensure you never miss a renewal
- Failed renewals are logged for investigation
app/
βββ Contracts/ # Service interfaces
β βββ FirewallInterface.php # Firewall service contract
β βββ NginxInterface.php # Nginx service contract
β βββ PhpFpmInterface.php # PHP-FPM service contract
β βββ ServiceManagerInterface.php # Service manager contract
βββ Http/Controllers/
β βββ AlertController.php # Alert rules & history management
β βββ ArtisanController.php # Artisan command runner
β βββ CloudflareController.php # CloudFlare DNS management
β βββ CronJobController.php # Cron jobs management
β βββ DashboardController.php # Dashboard & statistics
β βββ DatabaseController.php # Database management
β βββ DeploymentController.php # Deployment management
β βββ FileManagerController.php # File manager
β βββ FirewallController.php # Firewall management (UFW/firewalld)
β βββ HealthCheckController.php # Health check endpoint
β βββ LogViewerController.php # Log viewer
β βββ QueueController.php # Queue monitoring
β βββ ServerHealthController.php # Server health monitoring
β βββ ServiceManagerController.php # Service manager (systemctl)
β βββ SupervisorProgramController.php # Supervisor program management
β βββ WebhookController.php # Webhook CRUD operations
β βββ WebhookHandlerController.php # Webhook API handler
β βββ WebsiteController.php # Website/vhost management
β βββ WordPressDeploymentController.php # WordPress deployment
βββ Jobs/
β βββ CheckAlertsJob.php # Alert checking & notification
β βββ CheckSslCertificates.php # SSL certificate monitoring
β βββ DeployNginxConfig.php # Async Nginx/PHP-FPM deployment
β βββ ProcessDeployment.php # Async deployment job
β βββ RenewSslCertificates.php # SSL auto-renewal job
β βββ RequestSslCertificate.php # SSL certificate request
β βββ SystemMonitorJob.php # System metrics collection
βββ Models/
β βββ Alert.php # Triggered alerts model
β βββ AlertRule.php # Alert rules model
β βββ CronJob.php # Cron jobs model
β βββ Database.php # Database model
β βββ Deployment.php # Deployment model
β βββ FirewallRule.php # Firewall rules model
β βββ SshKey.php # SSH key model
β βββ SupervisorProgram.php # Supervisor program model
β βββ SystemMetric.php # System metrics model
β βββ Webhook.php # Webhook model
β βββ Website.php # Website/vhost model
βββ Services/
βββ CloudflareService.php # CloudFlare API integration
βββ DatabaseService.php # Database management
βββ DeploymentService.php # Git deployment logic
βββ FileManagerService.php # File manager service
βββ Pm2Service.php # PM2 ecosystem management
βββ QueueService.php # Queue management
βββ SshKeyService.php # SSH key generation
βββ SslService.php # SSL certificate management
βββ SupervisorService.php # Supervisor management
βββ SystemMonitorService.php # System metrics collection
βββ WordPressInstallerService.php # WordPress installer
βββ Firewall/ # Firewall services (multi-platform)
β βββ FirewallFactory.php # Factory for OS detection
β βββ UfwService.php # UFW (Debian/Ubuntu)
β βββ FirewalldService.php # firewalld (RHEL/Rocky/Alma)
βββ Nginx/ # Nginx services (multi-platform)
β βββ NginxFactory.php # Factory for OS detection
β βββ DebianNginxService.php # Debian/Ubuntu Nginx
β βββ RhelNginxService.php # RHEL/Rocky/Alma Nginx
β βββ LocalNginxService.php # Local development
βββ PhpFpm/ # PHP-FPM services (multi-platform)
β βββ PhpFpmFactory.php # Factory for OS detection
β βββ DebianPhpFpmService.php # Debian/Ubuntu PHP-FPM
β βββ RhelPhpFpmService.php # RHEL/Rocky/Alma (Remi) PHP-FPM
β βββ LocalPhpFpmService.php # Local development
βββ ServiceManager/ # Service manager (multi-platform)
βββ ServiceManagerFactory.php # Factory for OS detection
βββ DebianServiceManagerService.php # Debian/Ubuntu services
βββ RhelServiceManagerService.php # RHEL/Rocky/Alma services
resources/views/
βββ layouts/app.blade.php # Main Bootstrap 5 layout
βββ dashboard.blade.php # Dashboard with system overview
βββ server-health.blade.php # Server health monitoring
βββ websites/ # Website management views
βββ webhooks/ # Webhook views
βββ deployments/ # Deployment views
βββ alerts/ # Alert management views
βββ firewall/ # Firewall management views
βββ cron-jobs/ # Cron jobs views
βββ logs/ # Log viewer views
βββ databases/ # Database management views
βββ queues/ # Queue monitoring views
βββ file-manager/ # File manager views
βββ supervisor/ # Supervisor management views
config/
βββ monitoring.php # System monitoring configuration
storage/server/ # Local development configs
βββ nginx/sites-available/ # Generated Nginx configs
βββ php/{version}/pool.d/ # Generated PHP-FPM pools
βββ pm2/ # Generated PM2 ecosystems
βββ logs/ # Application logs
#!/bin/bash
# Debian/Ubuntu - use specific PHP version (e.g., PHP 8.3)
/usr/bin/php8.3 /usr/bin/composer install --no-dev --optimize-autoloader
/usr/bin/php8.3 artisan migrate --force
/usr/bin/php8.3 artisan config:cache
/usr/bin/php8.3 artisan route:cache
/usr/bin/php8.3 artisan view:cache
# RHEL/Rocky/Alma - use Remi PHP paths (e.g., PHP 8.3)
# /opt/remi/php83/root/usr/bin/php /usr/bin/composer install --no-dev --optimize-autoloader
# /opt/remi/php83/root/usr/bin/php artisan migrate --force
# /opt/remi/php83/root/usr/bin/php artisan config:cache
# /opt/remi/php83/root/usr/bin/php artisan route:cache
# /opt/remi/php83/root/usr/bin/php artisan view:cache
npm install
npm run build#!/bin/bash
# Install dependencies
npm install --production
# Build if needed
npm run build
# Start or restart PM2 app (handles both first deploy and updates)
# Replace 'app-name' with your actual app name (domain with dashes)
pm2 restart app-name --update-env || pm2 start /etc/pm2/ecosystem.app-name.config.js
# Save PM2 process list
pm2 save#!/bin/bash
npm install
npm run build
# Copy built files to public directory (adjust paths as needed)
rsync -avz dist/ ./public/- Never commit
.envfile - Contains sensitive credentials - Use unique secret tokens - Auto-generated per webhook
- Enable webhook signature verification - Always verify signatures
- Restrict file permissions - Ensure proper permissions on deployment directories
- Use read-only deploy keys - Don't give write access unless necessary
- Run queue worker as limited user - Don't run as root
- Validate deploy scripts - Review scripts before saving
Problem: Deployments stuck in "pending" status
Solution:
- Ensure queue worker is running:
php artisan queue:work - Check queue driver in
.env:QUEUE_CONNECTION=databaseorQUEUE_CONNECTION=redis - Check pending jobs:
- Database:
SELECT * FROM jobs; - Redis:
redis-cli LLEN queues:default
- Database:
- Review logs:
tail -f storage/logs/laravel.log
Problem: Git clone/pull fails with permission denied
Solution:
- Verify SSH key is added to Git provider
- Check key permissions:
chmod 600 storage/app/temp/temp_key_* - Test SSH connection:
ssh -T git@github.com
Problem: Git provider webhook not triggering deployments
Solution:
- Verify webhook URL is correct and accessible
- Check webhook secret token matches
- Review Git provider webhook delivery logs
- Ensure webhook is active
Problem: Cannot write to deployment directory
Solution:
# Set proper ownership
sudo chown -R www-data:www-data /var/www/html/myproject
# Set proper permissions
sudo chmod -R 755 /var/www/html/myprojectContributions are welcome! Please ensure your code:
- Follows PSR-12 standards
- Includes proper documentation
- Has meaningful commit messages
- Is tested before submission
This project is open-sourced software licensed under the MIT license.
For issues, questions, or suggestions:
- Create an issue in the repository
- Check existing documentation
Made with β€οΈ by Muhammad Hamizi Jaminan
Powered by Laravel & Bootstrap 5