{"id":1708,"date":"2020-06-16T16:05:56","date_gmt":"2020-06-16T13:05:56","guid":{"rendered":"https:\/\/www.virtono.com\/community\/?p=1708"},"modified":"2020-06-16T16:23:02","modified_gmt":"2020-06-16T13:23:02","slug":"the-proxy-server-what-why-and-how","status":"publish","type":"post","link":"https:\/\/www.virtono.com\/community\/knowledgebase\/the-proxy-server-what-why-and-how\/","title":{"rendered":"The Proxy Server, What, Why and How"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\"><strong>In the current world where billion-dollar enterprises are doing their best to figure out everything about you. Talking about a simple proxy server that you can easily configure and keep them guessing seems justified.<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">If you just want to jump to configuring a proxy server here is the <a href=\"https:\/\/www.virtono.com\/community\/?p=1714\" target=\"_blank\" rel=\"noreferrer noopener\">How<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Think of your bedroom door, now there\u2019s a lot of things you can do in your bedroom \ud83d\ude09 but in order to interact with the outside world you have to pass through the door and if anyone wants to interact with you, they have to either knock on your door if you\u2019ve locked it or just enter through it if you haven\u2019t which I\u2019d advice against.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">A proxy server fits this analogy of a bedroom door. It is a gateway between your machine and the internet.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">So technically speaking if you are using a proxy server your internet traffic flows through the proxy server on its way to the address you requested. The request then comes back to your proxy server then to you.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"332\" data-attachment-id=\"1709\" data-permalink=\"https:\/\/www.virtono.com\/community\/knowledgebase\/the-proxy-server-what-why-and-how\/attachment\/client-to-proxy-server-to-remote-server-communication\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/06\/client-to-proxy-server-to-remote-server-communication.gif?fit=848%2C375&amp;ssl=1\" data-orig-size=\"848,375\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"client-to-proxy-server-to-remote-server-communication\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/06\/client-to-proxy-server-to-remote-server-communication.gif?fit=750%2C332&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/06\/client-to-proxy-server-to-remote-server-communication.gif?resize=750%2C332&#038;ssl=1\" alt=\"\" class=\"wp-image-1709\"\/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">The question arises why even use it though if all it does is play ping pong with your requests, well here are a couple of reasons why you should give it a try. Modern proxies are capable of doing much more.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Privacy<\/strong>: Hiding yourself in plain sight.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Caching<\/strong>: Reducing that sweet sweet bandwidth and redundant data saving.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Security<\/strong>: Proxy can act as one more layer of security to your entire infrastructure.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Bypass censorship<\/strong>: Access websites that are blocked. On the same lines as the above statement, you can access content blocked due to geography.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Control and log internet usage<\/strong>: It is able to log your internet activity.<\/li><\/ul>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>If you wanna build a proxy server right now click here: <a rel=\"noreferrer noopener\" href=\"https:\/\/www.virtono.com\/community\/?p=1714\" target=\"_blank\">How<\/a><\/p><\/blockquote>\n\n\n\n<div class=\"wp-block-group alignfull\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_73 counter-hierarchy ez-toc-counter ez-toc-light-blue ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.virtono.com\/community\/knowledgebase\/the-proxy-server-what-why-and-how\/#Privacy\" title=\"Privacy\">Privacy<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.virtono.com\/community\/knowledgebase\/the-proxy-server-what-why-and-how\/#Caching\" title=\"Caching\">Caching<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.virtono.com\/community\/knowledgebase\/the-proxy-server-what-why-and-how\/#Security\" title=\"Security\">Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.virtono.com\/community\/knowledgebase\/the-proxy-server-what-why-and-how\/#Bypass_censorship\" title=\"Bypass censorship\">Bypass censorship<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.virtono.com\/community\/knowledgebase\/the-proxy-server-what-why-and-how\/#Control_and_log_internet_usage\" title=\"Control and log internet usage\">Control and log internet usage<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.virtono.com\/community\/knowledgebase\/the-proxy-server-what-why-and-how\/#What_is_your_reason_for_looking_for_a_proxy_server_solution\" title=\"What is your reason for looking for a proxy server solution?\">What is your reason for looking for a proxy server solution?<\/a><\/li><\/ul><\/nav><\/div>\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Privacy\"><\/span><strong><u>Privacy<\/u><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<\/div><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Normally whenever you make a call to any website the server to which the request is made can see your IP in the clear. This helps the server to locate you can send back the requested data but also it is able to get your geographical location.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The browser you are using sends its user agent information. If you have given access to the website it also stores cookies on the browser. Therefore basically it knows you,i.e, Your IP, geographical data, and browser data.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">A simple proxy server can help you save yourself from this conundrum. A proxy server is capable of hiding your IP address. When configured accordingly they can disrupt the identification of your browser, can block cookies.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Bottom line is they will give you more anonymity online.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Caching\"><\/span><strong><u>Caching<\/u><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Proxy servers are able to compress traffic, cache files, and web pages.&nbsp;This means that access to the same content again is significantly accelerated at the same time lower network load!<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">If there is a website that is visited daily by everyone in your organization and it has static data, voila! Caching on your proxy will save this redundant data calls.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Windows is notorious for keep forcing us to update, if every single employee keeps downloading the same update patches it will create unnecessary network congestion and redundant data download. Caching these updates from the first time they were called will help everyone. The update download will be faster for subsequent use and you will save bandwidth.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Security\"><\/span><strong><u>Security<\/u><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Proxy servers may also have a role in improving security, especially when used in business networks. A proxy could be your first line of defense by acting as a firewall and web filter. They can be used to block off malicious websites or content before it even reaches you.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Proxies can also provide data encryption\/decryption so that even if the network request is sniffed mid-transit your security is not compromised.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Bypass_censorship\"><\/span><strong><u>Bypass censorship<\/u><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">This maybe the most useful thing and the one that may interest a casual user the most. The answer that you are looking for is Yes!, you can bypass the internet censorship using a web proxy. Ever seen a person from a country where that site is banned on that site? Well, chances are that the person is using a proxy server.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Ever encountered a youtube video that is not available to your geographic location, well worry not, a proxy is there to help you out.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Control_and_log_internet_usage\"><\/span><strong><u>Control and log internet usage<\/u><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Now for corporate purposes, we can use a proxy to log the internet usage of the users going through it. It helps the corporation keep track of what is being accessed. Proxy is also able to block sites that are not deemed workplace worthy.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">By implementing a corporate-wide proxy you are able to log the internet usage of every single employee. 1984-esque.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">But this data can also be insightful is used properly the corporate maybe able to figure out interesting or needed patterns by using analytical tools on the data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_is_your_reason_for_looking_for_a_proxy_server_solution\"><\/span><strong><u>What is your reason for looking for a proxy server solution?<\/u><\/strong><strong><u><\/u><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">If you\u2019d read the article till this point you are definitely interested in using a proxy server. Now one thing I would like you to know is that public proxy servers are never reliable are never ever to be trusted. You use them and as you would already know by now, they will know you.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">A proxy server can be a blessing or you can end up screwing up your security. It all depends on how you set it up and how you are able to mold it to your work.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Now it is on you to figure out why you need it and how it can benefit your needs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the current world where billion-dollar enterprises are doing their best to figure out everything about you. Talking about a simple proxy server that you can easily configure and keep them guessing seems justified. If you just want to jump to configuring a proxy server here is the How. Think<\/p>\n","protected":false},"author":4,"featured_media":1711,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[5],"tags":[62,63,61],"class_list":["post-1708","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebase","tag-proxy","tag-proxy-server","tag-squid"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/06\/proxy-4620557_640.jpg?fit=640%2C472&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ISfL-ry","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":1714,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/install-and-configure-proxy-server-on-centos-7-8-server-squid-proxy\/","url_meta":{"origin":1708,"position":0},"title":"Install and configure Proxy Server on Centos 7\/8 Server: Squid Proxy","author":"Shreyash Sharma","date":"June 16, 2020","format":false,"excerpt":"If you would like to read what are proxy servers and how they can benefit you, please refer: Click If you would like to buy a VPS to make your own Proxy Server along with this tutorial check out: Click Squid Proxy Little introduction about the proxy of the article:\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/06\/remote-denial-of-service-vulnerability-patched-in-squid-proxy-cache-server-523492-2.png?fit=1200%2C900&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/06\/remote-denial-of-service-vulnerability-patched-in-squid-proxy-cache-server-523492-2.png?fit=1200%2C900&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/06\/remote-denial-of-service-vulnerability-patched-in-squid-proxy-cache-server-523492-2.png?fit=1200%2C900&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/06\/remote-denial-of-service-vulnerability-patched-in-squid-proxy-cache-server-523492-2.png?fit=1200%2C900&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/06\/remote-denial-of-service-vulnerability-patched-in-squid-proxy-cache-server-523492-2.png?fit=1200%2C900&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":3247,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/install-and-configure-proxy-server-on-ubuntu-using-squid-proxy\/","url_meta":{"origin":1708,"position":1},"title":"Install and Configure Proxy Server on Ubuntu Using Squid Proxy","author":"George B.","date":"April 15, 2023","format":false,"excerpt":"In this tutorial, we will walk you through the process of installing and configuring a proxy server on Ubuntu using Squid Proxy. Are you looking for a way to improve your internet speed and security? Installing a proxy server on your Ubuntu machine using Squid Proxy can help you achieve\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/Install-and-Configure-Proxy-Server-on-Ubuntu-Using-Squid-Proxy.png?fit=600%2C330&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/Install-and-Configure-Proxy-Server-on-Ubuntu-Using-Squid-Proxy.png?fit=600%2C330&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/Install-and-Configure-Proxy-Server-on-Ubuntu-Using-Squid-Proxy.png?fit=600%2C330&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":2922,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-nginx-on-ubuntu-20-04\/","url_meta":{"origin":1708,"position":2},"title":"How To Install Nginx on Ubuntu 20.04","author":"George B.","date":"July 29, 2022","format":false,"excerpt":"What is Nginx? Nginx, abbreviated NGI\u0418X, is a web server that also functions as a reverse proxy, load balancer, mail proxy, and HTTP cache. Igor Sysoev created the software, which was made public in 2004. Nginx is free and open-source software distributed under the terms of the 2-clause BSD license.\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/Nginx-Logo.jpeg?fit=1200%2C578&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/Nginx-Logo.jpeg?fit=1200%2C578&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/Nginx-Logo.jpeg?fit=1200%2C578&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/Nginx-Logo.jpeg?fit=1200%2C578&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/Nginx-Logo.jpeg?fit=1200%2C578&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1296,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/arm-apache-for-denial-of-service-attacks\/","url_meta":{"origin":1708,"position":3},"title":"Arm Apache for denial-of-service attacks","author":"Daniel Draga","date":"January 7, 2018","format":false,"excerpt":"A little thought experiment: You want to write a web server, so program a socket-based server.\u00a0When a browser connects to it and requests a file, it delivers it, the client terminates the connection, and everyone is satisfied.\u00a0But then suddenly there is a bug report from someone whose web server is\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2018\/01\/ddos-attack-ex-100695385-large.jpg?fit=699%2C474&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2018\/01\/ddos-attack-ex-100695385-large.jpg?fit=699%2C474&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2018\/01\/ddos-attack-ex-100695385-large.jpg?fit=699%2C474&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":3357,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-a-local-kubernetes-with-microk8s\/","url_meta":{"origin":1708,"position":4},"title":"How to install a local Kubernetes with MicroK8s","author":"George B.","date":"May 20, 2023","format":false,"excerpt":"Fortunately, MicroK8s offers a lightweight and straightforward solution for running Kubernetes on your local machine, or on a single VPS. In this guide, we'll walk you through the step-by-step process of installing MicroK8s and getting started with local Kubernetes development. Kubernetes has become the de facto standard for container orchestration,\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/05\/How-to-install-a-local-Kubernetes-with-MicroK8s.png?fit=600%2C330&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/05\/How-to-install-a-local-Kubernetes-with-MicroK8s.png?fit=600%2C330&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/05\/How-to-install-a-local-Kubernetes-with-MicroK8s.png?fit=600%2C330&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":3507,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-lemp-stack-linux-nginx-mysql-and-php-on-ubuntu-22-04\/","url_meta":{"origin":1708,"position":5},"title":"How to install LEMP stack (Linux, Nginx, MySQL, and PHP) on Ubuntu 22.04","author":"George B.","date":"June 20, 2023","format":false,"excerpt":"Introduction The LEMP stack is a popular software stack for web development and hosting. It includes four major components: Linux, Nginx, MySQL, and PHP. Each component serves a specific purpose in powering dynamic websites and web applications. Linux is the operating system that serves as the LEMP stack's foundation. In\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-install-LEMP-stack-Linux-Nginx-MySQL-PHP-on-Ubuntu-22-04.png?fit=600%2C330&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-install-LEMP-stack-Linux-Nginx-MySQL-PHP-on-Ubuntu-22-04.png?fit=600%2C330&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-install-LEMP-stack-Linux-Nginx-MySQL-PHP-on-Ubuntu-22-04.png?fit=600%2C330&ssl=1&resize=525%2C300 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/comments?post=1708"}],"version-history":[{"count":5,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1708\/revisions"}],"predecessor-version":[{"id":1745,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1708\/revisions\/1745"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media\/1711"}],"wp:attachment":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media?parent=1708"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/categories?post=1708"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/tags?post=1708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}