Basic proxy service
Authentication service
Combining with memcached
Interpreting log files
Operating system limits