{"id":13334,"date":"2025-12-20T10:26:39","date_gmt":"2025-12-20T04:56:39","guid":{"rendered":"https:\/\/www.youstable.com\/blog\/?p=13334"},"modified":"2025-12-20T10:26:41","modified_gmt":"2025-12-20T04:56:41","slug":"how-to-setup-clamav-on-linux-server","status":"publish","type":"post","link":"https:\/\/www.youstable.com\/blog\/how-to-setup-clamav-on-linux-server","title":{"rendered":"How to Setup ClamAV on Linux Server &#8211; Complete Guide"},"content":{"rendered":"\n<p><strong>To set up ClamAV on a Linux server<\/strong>, install the packages for your distro, update the virus database with FreshClam, start the clamd daemon, and schedule scans or enable on-access scanning. This guide shows step-by-step installation, configuration, performance tuning, exclusions, automation, and troubleshooting for a secure, lightweight malware defense.<\/p>\n\n\n\n<p>In this beginner-friendly guide, you\u2019ll learn how to <strong>setup ClamAV on Linux server<\/strong> the right way. We\u2019ll cover installation on popular distributions, <a href=\"https:\/\/www.youstable.com\/blog\/how-to-configure-clamav-on-linux\/\"><strong>ClamAV configuration<\/strong><\/a>, updating with FreshClam, on-demand and real-time scanning, exclusions, automation with cron\/systemd, and integrations for web and mail servers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"what-is-clamav-and-why-use-it-on-a-linux-server\"><strong>What is ClamAV and Why Use it on a Linux Server?<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.youstable.com\/blog\/wp-content\/uploads\/2025\/12\/ClamAV-on-a-Linux-Server.jpg\" alt=\"What Is ClamAV and Why Use It on a Linux Server?\" class=\"wp-image-13445\" srcset=\"https:\/\/www.youstable.com\/blog\/wp-content\/uploads\/2025\/12\/ClamAV-on-a-Linux-Server.jpg 1200w, https:\/\/www.youstable.com\/blog\/wp-content\/uploads\/2025\/12\/ClamAV-on-a-Linux-Server-150x79.jpg 150w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n\n\n\n<p>ClamAV is an open-source antivirus engine for detecting malware, viruses, trojans, and malicious scripts. It\u2019s widely used on mail gateways, <a href=\"https:\/\/www.youstable.com\/blog\/install-apache-web-server-in-linux\/\">web servers<\/a>, and file servers to scan attachments, uploads, and user directories. With low overhead and flexible tools (clamscan, clamd, clamonacc), ClamAV adds an essential layer to your Linux server\u2019s defense-in-depth strategy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"prerequisites-and-supported-distributions\"><strong>Prerequisites and Supported Distributions<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Root or sudo access<\/li>\n\n\n\n<li>Outbound internet for FreshClam (DNS + HTTP)<\/li>\n\n\n\n<li>Recommended: 1+ GB RAM for clamd on busy servers<\/li>\n\n\n\n<li>Distributions: Ubuntu\/Debian, RHEL\/CentOS\/AlmaLinux\/Rocky, openSUSE, Arch\/Manjaro<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"install-clamav-on-popular-linux-distros\"><strong>Install ClamAV on Popular Linux Distros<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"ubuntu-debian\"><strong>Ubuntu \/ Debian<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo apt update\nsudo apt <a href=\"https:\/\/www.youstable.com\/blog\/install-clamav-on-linux\/\">install -y clamav<\/a> clamav-daemon\n\n# Update the database (stop service to avoid lock)\nsudo systemctl stop clamav-freshclam\nsudo freshclam\nsudo systemctl enable --now clamav-freshclam\n\n# Start the daemon for faster scans\nsudo systemctl enable --now clamav-daemon<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"rhel-centos-almalinux-rocky\"><strong>RHEL \/ CentOS \/ AlmaLinux \/ Rocky<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo dnf install -y epel-release\nsudo dnf install -y clamav clamav-update clamav-scanner systemd\n\n# Seed the database\nsudo freshclam\n\n# Enable clamd@scan (provided by distribution)\nsudo systemctl enable --now clamd@scan\n\n# Optional: enable FreshClam as a timer or service if available\n# On some releases:\n# sudo systemctl enable --now clamav-freshclam<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"opensuse-sles\"><strong>openSUSE \/ SLES<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo zypper refresh\nsudo zypper install -y clamav clamav-daemon\n\nsudo systemctl enable --now freshclam\nsudo systemctl enable --now clamd<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"arch-manjaro\"><strong>Arch \/ Manjaro<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo pacman -Syu --noconfirm\nsudo pacman -S --noconfirm clamav\n\n# Initialize and enable services\nsudo freshclam\nsudo systemctl enable --now clamav-freshclam\nsudo systemctl enable --now clamav-daemon<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"update-virus-databases-with-freshclam\"><strong>Update Virus Databases with FreshClam<\/strong><\/h2>\n\n\n\n<p>FreshClam retrieves signatures from the ClamAV network. Ensure it runs as a service or timer so your server always scans with the latest database.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Check FreshClam status and logs\nsudo systemctl status clamav-freshclam || systemctl status freshclam\nsudo tail -f \/var\/log\/clamav\/freshclam.log\n\n# Manual update\nsudo freshclam<\/code><\/pre>\n\n\n\n<p>If you see mirror\/DNS errors, confirm your server can resolve <em>database.clamav.net<\/em> and outbound HTTP\/HTTPS is allowed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"run-on-demand-scans-clamscan-and-clamdscan\"><strong>Run On-Demand Scans (clamscan and clamdscan)<\/strong><\/h2>\n\n\n\n<p>Use clamscan for direct scans, or clamdscan for faster scans via the clamd daemon. For first runs on big file trees, clamdscan is significantly quicker.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Quick test\nclamscan --version\nfreshclam --version\n\n# Scan a directory (report only infected)\nsudo clamscan -r -i \/var\/www\n\n# Faster: use clamd (requires clamav-daemon\/clamd@scan running)\nsudo clamdscan --fdpass -i \/var\/www<\/code><\/pre>\n\n\n\n<p>Useful flags:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>-r: recursive<\/li>\n\n\n\n<li>-i: print only infected files<\/li>\n\n\n\n<li>&#8211;remove: delete infected files (use with caution)<\/li>\n\n\n\n<li>&#8211;move=\/quarantine: isolate infected files<\/li>\n\n\n\n<li>&#8211;exclude-dir, &#8211;exclude: skip noisy or irrelevant paths<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"configure-clamd-for-performance-and-security\"><strong>Configure clamd for Performance and Security<\/strong><\/h2>\n\n\n\n<p>Daemon configs vary by distro:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Debian\/Ubuntu: \/etc\/clamav\/clamd.conf<\/li>\n\n\n\n<li>RHEL-family: \/etc\/clamd.d\/scan.conf (service clamd@scan)<\/li>\n\n\n\n<li>Logs: typically \/var\/log\/clamav\/clamav.log<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code># Common tuning options (examples)\n$ sudo editor \/etc\/clamav\/clamd.conf   # or \/etc\/clamd.d\/scan.conf\n\n# Example directives to review:\nLogFile \/var\/log\/clamav\/clamav.log\nLogTime yes\nLogClean yes\nTCPSocket 3310\nTCPAddr 127.0.0.1\n# Or use a local Socket\n# LocalSocket \/run\/clamav\/clamd.ctl\n\n# Resource controls (adjust to server size)\nMaxFileSize 200M\nMaxScanSize 400M\nMaxRecursion 20\nFollowFileSymlinks false<\/code><\/pre>\n\n\n\n<p>After edits, restart services:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo systemctl restart clamav-daemon || sudo systemctl restart clamd@scan\nsudo systemctl restart clamav-freshclam || sudo systemctl restart freshclam<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"enable-on-access-real-time-scanning-with-clamonacc\"><strong>Enable On-Access (Real-Time) Scanning with clamonacc<\/strong><\/h2>\n\n\n\n<p>ClamAV provides on-access scanning with <em>clamonacc<\/em> (fanotify). It inspects file open events and hands them to clamd. This is ideal for uploads and shared directories. Ensure your kernel supports fanotify (modern distros do).<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Example: monitor \/var\/www and \/home\nsudo mkdir -p \/var\/log\/clamav\nsudo clamonacc --fdpass --log=\/var\/log\/clamav\/clamonacc.log \\\n  --move=\/quarantine --include=\/var\/www --include=\/home\n\n# Systemd service (generic example)\n# \/etc\/systemd\/system\/clamonacc.service\n&#91;Unit]\nDescription=ClamAV On-Access Scanner\nAfter=network.target clamd@scan.service\n\n&#91;Service]\nType=simple\nExecStart=\/usr\/bin\/clamonacc --fdpass --log=\/var\/log\/clamav\/clamonacc.log \\\n  --include=\/var\/www --include=\/home\nRestart=on-failure\n\n&#91;Install]\nWantedBy=multi-user.target\n\n# Enable it\nsudo systemctl daemon-reload\nsudo systemctl enable --now clamonacc<\/code><\/pre>\n\n\n\n<p>Start with small include paths to avoid high <a href=\"https:\/\/www.youstable.com\/blog\/fix-high-cpu-usage-on-vps-servers\/\">CPU usage<\/a>. Combine on-access scanning with sensible exclusions for performance.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"exclusions-and-performance-tuning\"><strong>Exclusions and Performance Tuning<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Exclude ephemeral paths: \/proc, \/sys, \/dev, \/run, \/var\/lib\/docker, VM images<\/li>\n\n\n\n<li>Exclude caches and backups: node_modules, .cache, vendor\/.cache, tmp\/<\/li>\n\n\n\n<li>Scan uploads and user dirs: \/var\/www, \/home, shared storage<\/li>\n\n\n\n<li>Use clamdscan over clamscan for repeated scans<\/li>\n\n\n\n<li>Tune MaxScanSize\/MaxFileSize based on your workload<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code># Example exclusion usage\nsudo clamscan -r -i \/ \\\n  --exclude-dir='^\/proc' --exclude-dir='^\/sys' --exclude-dir='^\/dev' \\\n  --exclude-dir='^\/run' --exclude-dir='^\/var\/lib\/docker' \\\n  --exclude='\\.iso$' --exclude='\\.img$'<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"automate-scans-with-cron-or-systemd-timers\"><strong>Automate Scans with Cron or systemd Timers<\/strong><\/h2>\n\n\n\n<p>Schedule nightly scans and signature refresh to keep protection consistent without manual work.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># User crontab (sudo crontab -e)\n# Nightly scan at 2:15 AM, quarantine infections\n15 2 * * * \/usr\/bin\/clamdscan --fdpass -i \/var\/www --move=\/quarantine &gt;&gt; \/var\/log\/clamav\/nightly.log 2&gt;&amp;1\n\n# Weekly full scan (Sunday 03:00)\n0 3 * * 0 \/usr\/bin\/clamdscan --fdpass -i \/ --exclude-dir='^\/(proc|sys|dev|run|var\/lib\/docker)' \\\n  --log=\/var\/log\/clamav\/weekly.log<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"integrations-web-and-mail-servers\"><strong>Integrations: Web and Mail Servers<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Mail gateways (Postfix\/Exim) via Amavis or direct clamd integration to scan attachments.<\/li>\n\n\n\n<li>Web servers (Apache\/Nginx) and PHP apps: scan file uploads by calling clamdscan on upload events.<\/li>\n\n\n\n<li>FTP\/SFTP servers: schedule or on-access scan upload directories.<\/li>\n<\/ul>\n\n\n\n<p>For cPanel or DirectAdmin, enable the ClamAV plugin if available, or run clamd and schedule scans for user homes. Always test on a staging domain before enforcing removal\/quarantine policies.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"troubleshooting-and-logs\"><strong>Troubleshooting and Logs<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>FreshClam logs: \/var\/log\/clamav\/freshclam.log<\/li>\n\n\n\n<li>ClamAV logs: \/var\/log\/clamav\/clamav.log<\/li>\n\n\n\n<li>System journal: journalctl -u clamav-daemon, -u clamd@scan, -u clamav-freshclam<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code># Common fixes\n# 1) Database lock or update conflict\nsudo systemctl stop clamav-freshclam || true\nsudo rm -f \/var\/lib\/clamav\/*.cld.lock \/var\/lib\/clamav\/*.cvd.lock\nsudo freshclam\nsudo systemctl start clamav-freshclam || true\n\n# 2) clamd won't start: check permissions\/sockets\nsudo getent group clamav\nsudo ls -l \/run\/clamav\nsudo grep -E '^(LogFile|LocalSocket|TCPSocket|TCPAddr)' \/etc\/clamav\/clamd.conf 2&gt;\/dev\/null || \\\n  grep -E '^(LogFile|LocalSocket|TCPSocket|TCPAddr)' \/etc\/clamd.d\/scan.conf<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"uninstall-or-disable-clamav\"><strong>Uninstall or Disable ClamAV<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code># Debian\/Ubuntu\nsudo systemctl disable --now clamav-daemon clamav-freshclam\nsudo apt remove --purge -y clamav clamav-daemon clamav-freshclam\n\n# RHEL-family\nsudo systemctl disable --now clamd@scan\nsudo dnf remove -y clamav\\*<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"best-practices-from-real-world-hosting\"><strong>Best Practices from Real-World Hosting<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Scan uploads at the edge: web upload dir, mail queues, shared storage.<\/li>\n\n\n\n<li>Quarantine first, delete later. Review logs to avoid false positives.<\/li>\n\n\n\n<li>Keep databases fresh (FreshClam) and monitor failures via alerts.<\/li>\n\n\n\n<li>Combine with WAF, PHP hardening, and least-privilege file permissions.<\/li>\n\n\n\n<li>Benchmark clamd vs clamscan on your workload to tune resources.<\/li>\n<\/ul>\n\n\n\n<p>If you prefer managed security hardening, the YouStable team can deploy and tune ClamAV, WAF rules, and <a href=\"https:\/\/www.youstable.com\/blog\/zabbix-top-alternatives\/\">server monitoring<\/a> across dedicated, VPS, or cloud servers, so you can focus on your apps.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"faqs-setup-clamav-on-linux-server\"><strong>FAQs: Setup ClamAV on Linux Server<\/strong><\/h2>\n\n\n<div id=\"rank-math-faq\" class=\"rank-math-block\">\n<div class=\"rank-math-list \">\n<div id=\"faq-question-1765795726310\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"is-clamav-necessary-on-linux-servers\"><strong>Is ClamAV necessary on Linux servers?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Yes, especially for servers handling user content (uploads, email, shared files). ClamAV detects malware, webshells, and trojans, reducing infection risk and preventing distribution to other systems.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765795734538\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"how-do-i-update-clamav-signatures-automatically\"><strong>How do I update ClamAV signatures automatically?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Enable FreshClam as a service or timer. On Debian\/Ubuntu: systemctl enable &#8211;now clamav-freshclam. On RHEL\/openSUSE variants, enable the freshclam service or create a <a href=\"https:\/\/www.youstable.com\/blog\/install-cron-jobs-on-linux\/\">cron job<\/a> running freshclam regularly.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765795741354\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"whats-the-difference-between-clamscan-and-clamdscan\"><strong>What\u2019s the difference between clamscan and clamdscan?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>clamscan runs the scanning engine directly and is slower on repeated scans. clamdscan sends files to the long-running clamd daemon, which caches signatures in memory and dramatically speeds up scanning.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765795749070\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"can-clamav-provide-real-time-protection-on-linux\"><strong>Can ClamAV provide real-time protection on Linux?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Yes, via clamonacc (fanotify-based on-access scanning). It monitors paths and scans files on open events through clamd. Start with limited include paths and add exclusions to control CPU and I\/O impact.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765795758341\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"which-directories-should-i-scan-or-exclude\"><strong>Which directories should I scan or exclude?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Scan uploads, mail queues, \/var\/www, and user home directories. Exclude \/proc, \/sys, \/dev, \/run, container layers (\/var\/lib\/docker), and large image backups. Use &#8211;exclude-dir and size limits to balance speed and coverage.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>To set up ClamAV on a Linux server, install the packages for your distro, update the virus database with FreshClam, [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":15481,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[350],"tags":[],"class_list":["post-13334","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebase"],"acf":[],"featured_image_src":"https:\/\/www.youstable.com\/blog\/wp-content\/uploads\/2025\/12\/How-to-Setup-ClamAV-on-Linux-Server.jpg","author_info":{"display_name":"Prahlad Prajapati","author_link":"https:\/\/www.youstable.com\/blog\/author\/prahladblog"},"_links":{"self":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts\/13334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/comments?post=13334"}],"version-history":[{"count":5,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts\/13334\/revisions"}],"predecessor-version":[{"id":15482,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts\/13334\/revisions\/15482"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/media\/15481"}],"wp:attachment":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/media?parent=13334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/categories?post=13334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/tags?post=13334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}