*Cube-Host– full cloud services!!

Nextcloud – simple work with files

Private cloud storage you fully control

Nextcloud is an open-source platform that lets you create your own cloud file storage and collaboration space: upload files, share folders, sync across devices, and work with documents and calendars—without giving your data to third-party “free” drives. If you rent a VPS, you can deploy Nextcloud on Linux in a predictable, secure way and keep full control over performance, backups, and access policies.

In this guide we focus on practical decisions: what hosting type is best, how to size a server, which deployment method to pick (classic install vs Docker), and a security checklist you can apply right away on a production VPS.


What Nextcloud is and how it works

Nextcloud uses a client–server model:

  • Server: a web application (PHP) plus a database (MariaDB/MySQL/PostgreSQL) and storage (local disk, additional volumes, or object storage in advanced setups). This is where your files and metadata live.
  • Clients: desktop and mobile apps that sync files, plus a web interface in your browser. You can also connect via WebDAV for third-party integrations.

Because the server part needs background jobs, caching, database tuning, and stable disk I/O, Nextcloud is usually happiest on a Linux VPS where you can control the stack. A well-configured VPS also gives you clean separation from “neighbors” and predictable resources.

Why businesses choose Nextcloud instead of public cloud drives

Google Drive, Dropbox, and OneDrive are convenient, but a self-hosted Nextcloud gives you advantages that matter for teams and privacy-conscious users:

  • Data ownership: your files stay on your infrastructure (your VPS), with your access rules and your backups.
  • Security controls: enforce 2FA, restrict sharing, set password policies, and decide where logs and audit trails are stored.
  • Predictable costs: you pay for VPS resources (CPU/RAM/storage/traffic) rather than per-user licensing tiers for storage.
  • Flexible integrations: connect LDAP/AD (if needed), add Collabora/OnlyOffice, integrate with a mail server, automate with WebDAV and APIs.

If you need “simple file sync” for one person, any cloud drive works. If you need control, security policies, and a platform your team can extend—Nextcloud on a VPS is usually the better long-term choice.

VPS vs shared hosting for Nextcloud

Yes, you can sometimes install Nextcloud on shared hosting, but it often becomes painful once you grow (more users, larger files, previews, mobile sync, integrations). A VPS hosting plan gives you the control needed for stable performance and better security isolation.

CriteriaShared hostingVPS (recommended)
Resource isolationShared CPU/RAM, “noisy neighbors” possibleDedicated VM resources with predictable limits
Server controlLimited (no root, restrictions on services)Root/admin access; tune PHP, DB, cache, uploads
Background jobs / cronOften restricted or unreliableFull control; recommended for Nextcloud reliability
Security hardeningLimited firewall/WAF/Fail2ban controlsSSH keys, firewall, Fail2ban, strict TLS, segmentation
ScalingHard to scale beyond “small personal cloud”Easy to upgrade CPU/RAM/storage and optimize stack

If you want a smooth experience (fast previews, stable sync, secure sharing), a Linux VPS is typically the most practical baseline. Cube-Host VPS plans are also convenient when you need quick scaling without moving your whole project to a dedicated server.

Minimum requirements and a realistic sizing guide

Nextcloud can run on modest hardware, but user experience depends heavily on disk I/O and RAM (especially if you enable previews, full-text search, or office integrations). Use this as a starting point:

Team size / usageCPURAMStorageNotes
1–3 users, basic sync1 vCPU2 GBSSD/NVMe, 30–100 GB+Keep apps minimal; enable HTTPS + backups
5–15 users, active sharing2 vCPU4–8 GBNVMe preferred, 200 GB+Add Redis for file locking; tune PHP memory
20–50 users, previews + collaboration4 vCPU8–16 GBFast NVMe, 500 GB+Consider separating DB; plan monitoring
50+ users, heavy workflows6–8+ vCPU16–32+ GBNVMe + expansion strategyArchitecture planning: DB, cache, backups, object storage

Tip: storage speed matters more than “peak CPU” for many Nextcloud scenarios (small files, previews, sync churn). If you can choose, prioritize SSD/NVMe and adequate RAM.

Deployment options: choose the right installation method

There are several valid ways to deploy Nextcloud on a VPS. The “best” one depends on how much you want to manage yourself.

  • Classic LAMP/LEMP install (Apache/Nginx + PHP-FPM + DB): maximum control; excellent performance; requires sysadmin discipline.
  • Docker / Nextcloud AIO: fast, repeatable deployment; good for teams that want structured updates and isolation; still requires understanding of backups and volumes.
  • One-click installers (where available): fastest start; still review security and backup settings immediately after launch.

If your goal is stable production hosting with predictable upgrades, a Linux VPS with either a classic install or AIO is usually the sweet spot.

Practical setup outline for a Linux VPS

Below is a reliable “checklist-style” outline (not a distro-specific cookbook). It’s designed to help you avoid the most common misconfigurations on a Linux VPS:

  1. Pick a domain/subdomain (example: cloud.example.com) and point DNS A/AAAA records to your VPS.
  2. Secure SSH: disable password login if possible, use SSH keys, restrict root login, and change default SSH settings if your policy requires it.
  3. Install web stack: Nginx or Apache + PHP-FPM with required modules.
  4. Install and secure database: MariaDB/MySQL/PostgreSQL; create a dedicated DB and user for Nextcloud.
  5. Enable HTTPS: get a TLS certificate (Let’s Encrypt) and redirect HTTP → HTTPS.
  6. Configure caching: Redis for file locking and memory cache to prevent sync issues and reduce DB load.
  7. Configure cron: background jobs should run via system cron, not “AJAX” mode, for best reliability.
  8. Set upload and memory limits: tune PHP settings and web server limits to match your use case (large files, video, archives).
  9. Backups: configure automatic backups (database + config + data) and test a restore.
  10. Hardening: firewall, Fail2ban, 2FA, and secure sharing policies.

Example commands (orientation only)

Commands differ by distribution and web server choice, but these examples show the shape of the process on Debian/Ubuntu-like systems:

# Update OS
sudo apt update && sudo apt -y upgrade

# Install a web stack (example: Nginx + PHP-FPM)
sudo apt -y install nginx php-fpm php-cli php-gd php-curl php-zip php-xml php-mbstring php-intl php-bcmath php-gmp php-imagick

# Install DB and Redis (example: MariaDB + Redis)
sudo apt -y install mariadb-server redis-server

# Enable firewall (adjust ports to your policy)
sudo ufw allow OpenSSH
sudo ufw allow "Nginx Full"
sudo ufw enable

Important: treat guides as a starting point. For production hosting, always review the official Nextcloud admin documentation and keep your OS and Nextcloud apps updated.

Security checklist for a production Nextcloud

If you want Nextcloud to be a real “secure private drive”, use this checklist on day one. Many security incidents happen not because of “Nextcloud vulnerabilities”, but because of weak VPS hygiene.

  • HTTPS everywhere: force TLS, disable old protocols/ciphers if your policy requires it.
  • Strong authentication: enable 2FA for admins; consider enforcing it for all users; use app passwords for mobile clients.
  • Least privilege: don’t run services as root; isolate Nextcloud users and file permissions.
  • Harden SSH: SSH keys, disable password auth, restrict by IP if possible.
  • Firewall: expose only needed ports (typically 80/443, and 22 only for admin access).
  • Fail2ban / rate limits: block brute-force attempts at the VPS level.
  • Updates: patch the OS and Nextcloud regularly; remove unused apps/plugins.
  • Backups + restore tests: schedule backups and verify recovery (database + config + data).
  • Logging: enable and review logs; keep an eye on unusual login patterns and sharing activity.

If you want a clean baseline for hardening and performance, start from a VPS Linux plan and keep the server dedicated to Nextcloud instead of mixing many unrelated apps on one small VPS.

Performance and reliability improvements that actually matter

  • Redis for file locking: prevents common sync conflicts and reduces DB load.
  • OPcache: improves PHP performance for frequent requests.
  • System cron: background tasks run predictably and reduce UI “waiting”.
  • Preview strategy: previews are convenient but can be heavy; tune preview generation based on your CPU/RAM.
  • Storage planning: reserve space for versions and trash; set retention policies to avoid surprise “disk full”.
  • Monitoring: check disk usage, database size, RAM pressure, and slow queries.

Common mistakes and quick fixes

ProblemTypical causeWhat to do
Slow web UI and syncWeak disk I/O, no caching, overloaded PHPUse NVMe/SSD, enable Redis, tune PHP-FPM workers and memory
Upload limits too smallWeb server / PHP max upload settingsIncrease PHP upload/post limits and Nginx/Apache request limits
Background tasks not runningCron not configured (AJAX mode)Switch to system cron and verify schedule
“Disk full” suddenlyFile versions + trash + logs consumed storageAdjust retention, expand storage, monitor usage weekly
Suspicious loginsWeak passwords / no 2FA / exposed adminEnable 2FA, enforce policies, Fail2ban, review sharing settings

Next steps: choose hosting and deploy with confidence

If your goal is “simple work with files” that doesn’t depend on third-party cloud policies, the most straightforward path is: Linux VPS → hardened stack → backups → Nextcloud apps you actually need. Start small, measure performance, then upgrade resources when your team grows.

Prev
Menu