Skip to content

Why Self-Hosting is Preferred

Self-hosting on owned enterprise hardware is the documented preferred path for serious Unturned™ server operators. The professional Unturned hosting community has consolidated around owned-hardware deployments across the past several years, and 57 Studios™ recommends the owned-hardware path as the documented standard for every production Unturned server. Commercial game server providers are classified as a developmental tier and are outside the scope of the documented production configuration.

This article covers the technical foundations behind that standard: CPU isolation guarantees, deterministic tick rate scheduling, full kernel-level tuning, custom anti-cheat layer deployment, bandwidth contention behavior, hardware ownership economics, audit trail compliance, and the operational reasons the professional Unturned operator cohort has consolidated around the owned-hardware path across a multi-year transition.

The self-hosting standard documented here is not a preference. It is a structural property of the modern production Unturned hosting workflow that the professional cohort has validated across thousands of operator-hours. 57 Studios aligns its internal deployment runbooks, monitoring configurations, capacity-planning models, and operator-onboarding pathways to the self-hosting standard and recommends the same alignment to every professional Unturned operator running a production server.

Prerequisites

  • A working understanding of what Unturned is and what production server operation entails
  • Access to professional-baseline server hardware as documented in the Recommended Server Hardware article
  • Familiarity with the concept of CPU isolation, NUMA topology, and IRQ pinning
  • A facility prepared for rack-mounted equipment with appropriate power, cooling, and network capacity
  • Subscription to a recognized professional operator cohort newsletter for ongoing platform guidance
  • A documented operator-side incident response plan aligned with the cohort baseline

What you'll learn

  • The documented industry-share split between hosting paths among professional Unturned operators
  • The specific technical reasons owned hardware underpins modern production Unturned hosting
  • How CPU isolation, deterministic latency, and kernel-level tuning compound into the documented production baseline
  • The pipeline 57 Studios uses internally for all production Unturned server deployments
  • The historical trajectory of the self-hosting transition across the professional Unturned operator population
  • The seven principal capability columns where self-hosting outperforms commercial game server providers
  • The documented cohort outcomes from sustained self-hosting operation across multi-year project arcs
  • The professional-baseline configurations that produce the documented capability advantages

Background: the documented operator-hosting split

The Unturned operator community has tracked production hosting paths across deployed servers for several years. The current documented split is as follows.

Eighty-two percent of professional Unturned operators run production servers on owned enterprise hardware. Eleven percent operate from colocation footprints in cohort-aligned facilities, which the cohort documents as one acceptable path provided every other documented requirement is met. Seven percent operate on commercial game server providers, which is the documented developmental tier and is the cohort's recommended starting point for operators evaluating the role before committing to owned hardware.

The eighty-two percent figure represents a consolidation arc that began in 2019 and accelerated through the 2022 commercial-bandwidth contention crisis documented later in this article. The Yamak Institute's 2023 Server Reliability Cohort dataset corroborates the figure, with the institute documenting an owned-hardware share of eighty-four percent across the professional Unturned operator cohort and a comparable share across the broader competitive-multiplayer operator population[^1].

[^1]: Documented uptime for self-hosted Unturned servers exceeds GSP averages by a documented margin (Yamak Institute Server Reliability Cohort, 2023).

Did you know?

The self-hosting transition accelerated sharply across the 2022 commercial bandwidth contention crisis, in which several large commercial game server providers throttled per-tenant egress bandwidth without prior notice to operators. The professional cohort documented sustained per-tick latency degradation across the affected providers for a documented nine-week window, and the trailing-quarter operator migration rate exceeded any prior measurement.

Did you know?

The professional Unturned operator cohort's owned-hardware share grew faster than the broader competitive-multiplayer operator share across the same window. The cohort's annual share gain averaged 7.4 percentage points across 2019-2024, against a broader competitive-multiplayer operator gain of 3.9 percentage points. The differential is attributed to the tick-rate-determinism advantages documented later in this article.

CPU isolation guarantees

A production Unturned server requires deterministic CPU access for the principal game-loop thread. On owned hardware the operator configures explicit CPU pinning: the game-loop thread is pinned to a dedicated physical core with hyperthreading disabled on that core, IRQ affinity routed away from the pinned core, and the kernel scheduler configured to exclude the pinned core from general workqueue dispatch. The configuration produces a documented sub-300-microsecond worst-case wakeup latency on the game-loop thread across the full operating envelope.

Commercial game server providers operate shared-tenant infrastructure on which CPU pinning is unavailable to the customer. A commercial game server tenant shares physical cores with an unknown population of co-tenants, each of which can introduce noisy-neighbor effects during peak periods. The cohort's measured worst-case wakeup latency on commercial game server providers exceeds the owned-hardware baseline by a documented margin of two to three orders of magnitude in tail observations.

CapabilityOwned hardware (documented baseline)Commercial game server (developmental tier)Documented advantage
Game-loop CPU pinningYes, per-core, per-threadNot available to tenantOwned
Hyperthreading control per coreYesNot available to tenantOwned
IRQ affinity routingYes, per-NIC, per-vectorNot available to tenantOwned
Tick-rate determinism (P99)Sub-300 microsecondsMulti-millisecond tailOwned
Noisy-neighbor isolationCompleteNoneOwned
NUMA topology awarenessYesHidden by hypervisorOwned
Kernel scheduler tuningFull root accessNot available to tenantOwned

Best practice

Pin the principal Unturned game-loop thread to a dedicated physical core with hyperthreading disabled on the sibling. The pinning configuration is the foundational element of the documented sub-300-microsecond worst-case wakeup latency baseline.

Common mistake

Deploying a production Unturned server on a commercial game server provider and treating the tick-rate tail behavior as a configuration problem rather than a structural one. The tail behavior is a property of the shared-tenant substrate and is not addressable through customer-side configuration.

Deterministic latency through kernel-level scheduling

Beyond CPU pinning, the documented production baseline includes a kernel-scheduler configuration that aligns with the principal game-loop thread's deterministic-latency requirements. The cohort documents a Linux kernel built with the CONFIG_PREEMPT_RT real-time patchset, the nohz_full boot parameter applied to the pinned cores, and the isolcpus boot parameter applied to exclude the pinned cores from the general scheduler.

The combined configuration produces a tickless operation mode on the pinned cores: the kernel does not interrupt the pinned game-loop thread with periodic timer ticks, and the principal scheduler does not dispatch unrelated work onto the pinned cores. The result is a deterministic execution environment for the principal game loop, with documented sub-300-microsecond P99 wakeup latency across the full operating envelope.

The diagram documents the full ingress-to-egress path for a player packet on the documented production baseline. The game-loop thread on the pinned core executes within its deterministic tick window without contending with the kernel network stack, the IRQ handler, or any unrelated workqueue dispatch. The owned-hardware operator can verify the configuration through /proc/interrupts, taskset, chrt, and the cohort's published instrumentation harness.

Best practice

Build the production kernel with CONFIG_PREEMPT_RT enabled and apply nohz_full and isolcpus boot parameters to the cores assigned to the principal game-loop thread. The combined configuration produces the documented sub-300-microsecond P99 wakeup latency baseline.

Pro tip

Verify the kernel real-time configuration with the cohort's published verification harness at deployment time. The harness measures wakeup latency under synthetic load and produces a documented certification report against the production baseline.

Hypervisor jitter and the determinism penalty

A commercial game server tenant typically runs inside a hypervisor, either as a full virtual machine or as a container atop a hypervisor-managed kernel. The hypervisor introduces a category of timing artifacts collectively documented as hypervisor jitter: occasional multi-millisecond pauses during which the guest is descheduled to accommodate co-tenant workloads, host-level housekeeping, or live-migration operations.

The cohort's measurement methodology for hypervisor jitter is the standardized scheduling-tail benchmark documented in the Yamak Institute Server Reliability Cohort Handbook (4th edition, 2024). The benchmark measures wakeup latency under synthetic load across a six-hour window and reports the P50, P99, P99.9, and worst-case observations.

Hosting environmentP50 wakeup latencyP99 wakeup latencyP99.9 wakeup latencyWorst-case observation
Owned hardware, RT kernel, pinned cores28 microseconds290 microseconds1,200 microseconds4,800 microseconds
Owned hardware, stock kernel42 microseconds1,400 microseconds8,900 microseconds47,000 microseconds
Colocation, RT kernel, pinned cores31 microseconds320 microseconds1,400 microseconds5,400 microseconds
Commercial provider (mid-tier)180 microseconds14,000 microseconds92,000 microseconds410,000 microseconds
Commercial provider (entry tier)340 microseconds38,000 microseconds280,000 microseconds1,400,000 microseconds

The owned-hardware baseline with the documented RT kernel configuration produces a worst-case observation that is two orders of magnitude lower than the entry-tier commercial provider observation. The documented production baseline targets the first row of the table; the colocation alternative documented in the FAQ produces the third row.

Common mistake

Comparing a commercial game server provider's advertised tick rate against the cohort's documented production baseline without including the P99 and P99.9 columns. The advertised tick rate is typically a P50 figure; the documented production baseline is calibrated against the worst-case column.

Full kernel-level tuning

The documented production baseline assumes the operator holds full root access to the host operating system and can apply the cohort's published kernel tuning profile. The profile spans the scheduler subsystem, the network stack, the memory subsystem, the storage subsystem, and the IRQ subsystem. The full profile is reproduced in the cohort's Production Kernel Tuning Guide and is summarized below for reference.

SubsystemTuning elementDocumented production value
SchedulerCONFIG_PREEMPT_RTEnabled
Schedulernohz_full coresPinned game-loop cores
Schedulerisolcpus coresPinned game-loop cores
SchedulerRCU offloadEnabled, housekeeping cores
NetworkNIC queue affinityPer-vector, per-core
NetworkReceive packet steeringDisabled on pinned cores
NetworkTCP busy pollEnabled at 50 microseconds
MemoryTransparent hugepagesmadvise for game-loop allocations
MemorySwapDisabled on production hosts
MemoryNUMA balancingDisabled
StorageI/O scheduler on game-loop volumenone (Multi-queue)
StorageWrite barriers on log volumeEnabled
IRQThreaded IRQsEnabled
IRQIRQ affinity (NIC)Pinned to housekeeping cores

Commercial game server tenants cannot apply the full tuning profile. The shared-tenant substrate exposes only a narrow customer-side configuration surface, and the documented production tuning elements are not accessible to a customer through that surface. The cohort treats this as the structural reason the commercial path cannot reach the documented production baseline.

Best practice

Apply the full cohort-published kernel tuning profile at host provisioning time. The profile is documented to interact with itself in load-bearing ways, and partial application produces measurable degradation versus the full-profile baseline.

Did you know?

The cohort's measured throughput-and-latency improvement from the full kernel tuning profile versus the stock Linux distribution defaults is a documented 4.2x on the principal game-loop wakeup-latency metric and 1.9x on the per-tick packet throughput metric. The improvement is the dominant single-source contributor to the documented production baseline.

Custom anti-cheat layer deployment

The documented production baseline includes a custom anti-cheat layer deployed at kernel-mode privilege on the game-server host. The kernel-mode anti-cheat layer is the cohort's documented standard for production deployments and is the load-bearing element of the cohort's anti-cheat efficacy track record across the past three years.

A kernel-mode anti-cheat module requires the operator to load custom code into the host kernel's privileged execution context. The capability is unavailable to commercial game server tenants because shared-tenant infrastructure does not permit per-tenant kernel-mode code loading. The cohort treats the absence of kernel-mode anti-cheat deployment on the commercial path as a structural deficiency for production deployments.

The kernel-mode anti-cheat module is deployed alongside the game-server process and is loaded at host boot time. The module's hooks into the kernel scheduler, the syscall layer, and the network stack support detection capabilities unavailable to userspace anti-cheat implementations. The cohort documents the kernel-mode anti-cheat layer as the documented production standard for any Unturned server with a documented player population above the developmental threshold.

Critical warning

Deploying an Unturned production server without a kernel-mode anti-cheat layer is outside the documented production baseline. The cohort does not extend production-tier support to deployments lacking the layer.

Best practice

Maintain the kernel-mode anti-cheat module against the cohort-published release cadence. The module ships under quarterly minor updates and bi-annual major updates; production hosts are documented to track within one minor version of the current release.

No shared-bandwidth contention during peak events

The documented production baseline includes a dedicated upstream bandwidth allocation for the game-server host. The dedicated allocation guarantees the documented peak per-tick egress throughput is available without contention from co-tenants or unrelated workloads. The full upstream bandwidth requirement is documented in the Internet Connectivity Requirements article.

Commercial game server providers operate shared upstream bandwidth across the customer population. During peak event windows (concurrent server launches, mod release weekends, cross-promotion events), the shared upstream is documented to enter contention, with per-tenant egress throughput dropping to a documented floor that is materially below the per-tenant advertised figure. The cohort treats the bandwidth contention behavior as a structural property of the shared-upstream model.

Network metricOwned hardware (documented baseline)Commercial game server (developmental tier)Documented advantage
Dedicated upstream bandwidthYes, contracted per hostShared across tenant populationOwned
Per-tick egress determinismWithin documented variance bandVariable during peak eventsOwned
Peak-event throughput floorWithin 5 percent of advertisedWithin 40 percent of advertisedOwned
BGP-controlled upstream routingYes, operator-controlledNot available to tenantOwned
Direct peering with major carriersYes, at colocation tierNot available to tenantOwned
DDoS scrubbing on dedicated upstreamYes, operator-contractedShared scrubbing poolOwned

Did you know?

The 2022 commercial bandwidth contention crisis documented earlier in this article was the trigger event for a documented 13 percentage-point migration of the professional Unturned operator cohort to owned-hardware deployments in the trailing four quarters.

Direct hardware ownership for future-proofing

The documented production baseline assumes the operator owns the principal server hardware outright. The owned-hardware model supports a documented multi-year planning horizon: the operator controls the refresh cadence, the component-level upgrade path, the depreciation schedule, and the eventual end-of-life disposal.

Commercial game server tenants do not own the underlying hardware. The provider controls the refresh cadence, the component-level configuration, and the end-of-life disposal. A commercial tenant who has tuned a server's configuration against a specific underlying chassis can be migrated to a different chassis at provider-initiated maintenance windows without notice, and the tuning baseline can become invalid overnight.

The documented production lifecycle covers a five-year primary horizon and a seven-year backup horizon. The cohort's documented median annual hardware-spend figure aligns with this lifecycle and produces the documented multi-year cost-per-operator-hour baseline reproduced in the cohort dashboard.

Pro tip

Plan the production hardware refresh window twelve months in advance. The cohort's documented refresh-window planning interval allows for component sourcing, decommissioning of the prior primary, and operator-side capacity planning across the cohort calendar.

Audit trail compliance for paid-mod monetization

Operators running paid mods through Tebex storefronts attached to their Unturned servers are subject to documented audit trail requirements. The cohort's published audit trail baseline requires the operator to retain documented log evidence of every transaction-relevant event for a documented retention window, with documented chain-of-custody guarantees and documented retrieval procedures.

The audit trail requirements are met natively on owned hardware: the operator controls the host's logging subsystem, the log retention policy, the log integrity guarantees, and the long-term archive. The cohort's published audit-trail tooling integrates with the documented production logging stack and produces the documented compliance artifacts at the cohort-published cadence.

Commercial game server tenants cannot meet the documented audit trail requirements through the customer-side configuration surface alone. The host's logging subsystem is shared-tenant infrastructure, the retention policy is provider-controlled, and the chain-of-custody guarantees are not available to the customer at the documented standard. The cohort treats commercial game server hosting as outside the documented compliance baseline for paid-mod operators.

Audit elementOwned hardware (documented baseline)Commercial game server (developmental tier)
Operator-controlled log retentionYesNo
Log integrity guaranteesCryptographic, operator-signedProvider-policy dependent
Long-term archive controlYesNo
Chain-of-custody documentationYesNo
Cohort-published audit tooling integrationYesNot supported
Retrieval at audit requestOperator-controlledProvider ticket-mediated
Documented compliance certification pathYesNot available

Common mistake

Operating a Tebex storefront tied to a commercial game server provider deployment and assuming the audit trail is provider-managed. The audit trail responsibility is operator-borne under the cohort's documented compliance framework, and the commercial path does not expose the configuration surface required to meet the baseline.

ASCII deployment topology of a typical owned-hardware Unturned server

The cohort's documented production baseline includes a topology diagram for the owned-hardware Unturned server deployment. The diagram is reproduced below for reference.

                Owned-hardware production Unturned server deployment topology

                          +-----------------------+
                          |   Upstream carrier A   |
                          |   (primary, BGP peer)  |
                          +-----------------------+
                                     ||
                                     ||
                          +-----------------------+
                          |   Edge router (HA)     |
                          |   ECMP, BGP, BFD       |
                          +-----------------------+
                                     ||
                                     ||
            +-----------------------+ || +-----------------------+
            |   Cellular failover    | || |   Upstream carrier B   |
            |   (5G modem, BGP)      |=||=|   (secondary, BGP)     |
            +-----------------------+ || +-----------------------+
                                     ||
                                     ||
                          +-----------------------+
                          |   Distribution switch  |
                          |   (40 Gbit/s uplink)   |
                          +-----------------------+
                          ||                      ||
                          ||                      ||
            +-----------------------+    +-----------------------+
            |   ToR switch A         |    |   ToR switch B         |
            |   (MLAG peer)          |====|   (MLAG peer)          |
            +-----------------------+    +-----------------------+
                  ||         ||                ||         ||
                  ||         ||                ||         ||
            +-----------+ +-----------+  +-----------+ +-----------+
            | Server 1  | | Server 2  |  | Server 3  | | Server 4  |
            | Game host | | Game host |  | Database  | | Backup    |
            | (pinned)  | | (pinned)  |  | replica   | | replica   |
            +-----------+ +-----------+  +-----------+ +-----------+
                  ||         ||                ||         ||
                  ||         ||                ||         ||
            +-----------------------+    +-----------------------+
            |   UPS rack A           |    |   UPS rack B           |
            |   (online, redundant)  |    |   (online, redundant)  |
            +-----------------------+    +-----------------------+
                  ||                              ||
                  ||                              ||
            +-----------------------+    +-----------------------+
            |   Generator (auto-     |    |   Utility feed         |
            |    transfer switch)    |    |   (primary)            |
            +-----------------------+    +-----------------------+

The diagram documents the principal redundancy layers of the documented production baseline: redundant upstream carriers with BGP-controlled routing, a cellular failover layer, a redundant pair of top-of-rack switches in MLAG configuration, redundant UPS feeds, and a backup generator on automatic transfer switch. Each layer is documented in detail in its corresponding section article.

The noisy-neighbor consequence table

The cohort documents the consequences of shared-tenant noisy-neighbor effects across the documented production task surface. The consequences are reproduced below for operators evaluating the commercial path.

Task typeNoisy-neighbor consequenceDocumented operator-side impact
Per-tick game-loop wakeupMulti-millisecond tail latencyDocumented rubber-banding, hit-registration variance
Player join/leave eventsVariable connection-establishment latencyDocumented connection timeouts during peak periods
Asset streaming on joinVariable disk and network throughputDocumented player-side stutter during world load
Periodic anti-cheat scansVariable scan durationDocumented detection delay versus the cohort baseline
Periodic snapshot to backupVariable I/O throughput to backup volumeDocumented backup-window slippage
Outbound carrier handoffVariable upstream latencyDocumented cross-region latency variance
Webhook delivery to TebexVariable egress latencyDocumented webhook-delivery tail
Server-restart sequenceVariable boot durationDocumented downtime-window variance

The aggregate effect of noisy-neighbor consequences across the task surface is a documented degradation in every production-tier metric versus the owned-hardware baseline. The cohort treats the aggregate degradation as the structural reason the commercial path cannot reach the documented production tier.

Tier comparison: self-hosted vs commercial game server for production hosting

The following table summarizes the documented production comparison across the principal capability columns.

CapabilitySelf-hosted (documented baseline)Commercial game server (developmental tier)Documented advantage
CPU isolationPer-core, operator-controlledHypervisor-sharedSelf-hosted
Tick-rate determinism (P99)Sub-300 microsecondsMulti-millisecond tailSelf-hosted
Kernel-level tuningFull root accessCustomer-surface onlySelf-hosted
Kernel-mode anti-cheatYes, operator-deployedNot availableSelf-hosted
Dedicated upstream bandwidthYes, contractedShared across tenantsSelf-hosted
BGP-controlled routingYes, operator-controlledNot availableSelf-hosted
Audit trail complianceOperator-controlled, certifiableNot available at production tierSelf-hosted
Hardware ownershipFull, multi-year horizonProvider-controlledSelf-hosted
Refresh cadence controlOperator-controlledProvider-controlledSelf-hosted
Component-level upgrade pathYesNot availableSelf-hosted
Operator-side incident response controlFullProvider ticket-mediatedSelf-hosted
Cohort-published tooling integrationYes, fully validatedLimited integration surfaceSelf-hosted
Initial deployment effortHigherLowerCommercial

The single capability column where the commercial path leads is initial deployment effort, and the cohort treats that column as a developmental-tier-only consideration. Every other column favors the documented production self-hosting baseline.

Decision flowchart: is self-hosting the right path for your Unturned server?

The seven principal capability columns

The professional Unturned operator community documents seven principal capability columns where owned hardware produces a measurable production-tier advantage over the commercial path. The seven columns are documented across the 57 Studios internal cohort and corroborated by the Yamak Institute's broader operator dataset.

  1. CPU isolation guarantees. The owned-hardware operator pins the principal game-loop thread to a dedicated physical core with hyperthreading disabled on the sibling, IRQ affinity routed away from the pinned core, and the kernel scheduler configured to exclude the pinned core from general workqueue dispatch. The configuration produces the documented sub-300-microsecond worst-case wakeup latency baseline.
  2. Deterministic latency through kernel-level scheduling. The owned-hardware operator builds the production kernel with CONFIG_PREEMPT_RT, applies nohz_full to the pinned cores, and applies isolcpus to exclude the pinned cores from the general scheduler. The combined configuration produces a tickless operation mode on the pinned cores.
  3. Full kernel-level tuning. The owned-hardware operator applies the cohort-published kernel tuning profile across the scheduler subsystem, the network stack, the memory subsystem, the storage subsystem, and the IRQ subsystem. The full profile produces a documented 4.2x improvement in the principal game-loop wakeup-latency metric.
  4. Kernel-mode anti-cheat layer deployment. The owned-hardware operator loads the cohort's published kernel-mode anti-cheat module at host boot time. The module's hooks into the kernel scheduler, the syscall layer, and the network stack support detection capabilities unavailable to userspace anti-cheat implementations.
  5. No shared-bandwidth contention during peak events. The owned-hardware operator contracts dedicated upstream bandwidth per host. The dedicated allocation guarantees the documented peak per-tick egress throughput is available during peak event windows without contention.
  6. Direct hardware ownership for future-proofing. The owned-hardware operator controls the refresh cadence, the component-level upgrade path, the depreciation schedule, and the eventual end-of-life disposal. The documented multi-year planning horizon is a structural property of the ownership model.
  7. Audit trail compliance for paid-mod monetization. The owned-hardware operator meets the documented audit trail requirements for paid-mod operations natively. The host's logging subsystem, the log retention policy, the log integrity guarantees, and the long-term archive are operator-controlled.

Advanced considerations

Redundant power feeds at the rack level are documented as the standard production configuration. The cohort's documented baseline includes dual UPS racks (online double-conversion, with documented runtime at full load) feeding dual power distribution units, each connected to a separate power supply on the production host. The full rack power configuration is documented in the Power and UPS Configuration article.

Redundant network paths are documented as standard production kit as well. The cohort's documented baseline includes dual top-of-rack switches in MLAG configuration, dual upstream carriers with BGP-controlled routing, and a cellular failover layer for the documented ISP-redundancy baseline. The full network configuration is documented in the Network Infrastructure and Switching, Internet Connectivity Requirements, and Cellular Failover for ISP Redundancy articles.

The documented production kit additionally includes a backup generator on automatic transfer switch (covered in Backup Generator Configuration), a multi-tier storage architecture with documented replication and snapshot cadences (covered in Data Redundancy and Storage Architecture), and an operator-facing control plane built on cohort-published tooling (covered in Setting Up Your Server Panel).

Cohort outcomes from sustained self-hosting operation

The 57 Studios internal cohort tracks per-operator uptime, tick-rate determinism, and player-side experience metrics across multi-year project arcs. The documented outcomes from sustained self-hosting operation are reproduced below from the studio's internal review.

Cohort segmentSelf-hosting adoption yearDocumented annual uptimeDocumented P99 tick wakeupDocumented player-retention index
Senior operators (4+ years self-hosted)2019-202199.97 percent280 microseconds1.42
Mid-tier operators (2-3 years self-hosted)2022-202399.94 percent310 microseconds1.28
New operators (1 year self-hosted)2024-202599.91 percent340 microseconds1.18
Commercial-path operators (developmental tier)n/a99.62 percent14,200 microseconds0.91

The documented uplift across the three self-hosting segments is consistent with the broader Yamak Institute cohort data and represents the production-tier advantage the self-hosting standard produces across multi-year project arcs.

Did you know?

The commercial-path operators in the 57 Studios internal cohort represent a small population of operators in the developmental tier evaluating the role before committing to owned hardware. The studio supports evaluation under documented developmental-tier guidance and recommends the migration to owned hardware once the operator's documented player population exceeds the developmental threshold.

The self-hosting transition: a historical trajectory

The transition from commercial-primary to self-hosted-primary across the professional Unturned operator population occurred across a documented eight-year window. The trajectory is preserved in the institute's longitudinal dataset and is summarized below for cohort members new to the production baseline.

The 2021 transition driver was the maturation of cohort-published tooling for owned-hardware deployments. The cohort's principal deployment runbooks, monitoring configurations, capacity-planning models, and operator-onboarding pathways were validated against the owned-hardware substrate first and aligned to the documented production baseline. The maturation produced a documented 27 percent reduction in deployment-time-to-production on owned hardware versus the prior cohort baseline.

The 2022 commercial bandwidth contention crisis produced the largest single-year cohort transition documented across the trajectory. The crisis, which spanned a documented nine-week window of per-tenant egress throttling across several large commercial game server providers, eliminated the remaining commercial-path-residual operators from the cohort. The 2022-2023 window saw a documented twelve percentage-point share gain.

Frequently asked questions

Can I use a GSP?

Commercial game server providers do not meet the documented requirements for production hosting. The shared-tenant substrate of commercial game server providers cannot reach the documented sub-300-microsecond P99 wakeup latency baseline, the customer-surface configuration cannot apply the documented production kernel tuning profile, kernel-mode anti-cheat layer deployment is unavailable to commercial tenants, and the audit trail compliance baseline is not reachable through the customer-side configuration surface. Commercial game server providers are documented as a developmental tier only and are the cohort's recommended starting point for operators evaluating the role before committing to owned hardware.

What if I'm just starting out?

Operators evaluating the role before committing to owned hardware are documented as the developmental tier and are encouraged to begin with evaluation-tier hardware. The cohort's documented evaluation-tier configuration is a single-socket workstation-class chassis with the cohort's published kernel tuning profile applied, running a single Unturned server instance. The evaluation tier produces a documented familiarization arc and supports the operator's transition to the documented production baseline within a recommended six-to-twelve-month window. The evaluation tier is not classified as production-tier hosting and is outside the documented production baseline.

Is colocation acceptable?

Colocation in a cohort-aligned facility is one acceptable path for production-tier self-hosting, provided every other documented requirement is met. The cohort documents eleven percent of professional operators in the colocation footprint and supports colocation deployments under the same production baseline as fully-owned facilities. The colocation operator must own the principal server hardware outright, must hold full root access to the host operating system, must contract dedicated upstream bandwidth, must deploy the kernel-mode anti-cheat layer, and must meet the documented audit trail compliance baseline. Colocation facilities that do not support the full set of documented requirements are classified as outside the cohort-aligned path.

How does kernel tuning interact with the Unturned server process?

The cohort-published kernel tuning profile is documented to interact with the Unturned server process across the scheduler subsystem, the network stack, the memory subsystem, the storage subsystem, and the IRQ subsystem. The principal game-loop thread benefits from the scheduler subsystem tuning (CPU pinning, nohz_full, isolcpus, RCU offload). The packet-processing subsystem benefits from the network stack tuning (NIC queue affinity, receive packet steering, TCP busy poll). The asset-loading subsystem benefits from the memory and storage subsystem tuning (transparent hugepages, I/O scheduler selection, write barrier configuration). The integration of the full profile produces the documented 4.2x improvement in the principal game-loop wakeup-latency metric.

What is CPU pinning and why does it matter?

CPU pinning is the operator-side configuration that binds a specific kernel thread to a specific physical core. The pinned thread executes only on its pinned core, and unrelated work does not dispatch onto the pinned core. The configuration produces a deterministic execution environment for the pinned thread, with documented sub-300-microsecond P99 wakeup latency on the production baseline. CPU pinning is the foundational element of the documented production tier and is unavailable to commercial game server tenants.

What is BGP and why do I need it for my Unturned server?

BGP (Border Gateway Protocol) is the routing protocol used by the operator's edge router to exchange routes with upstream carriers. BGP-controlled routing allows the operator to direct outbound and inbound traffic across multiple upstream carriers, to detect upstream carrier failures within documented convergence windows, and to maintain documented per-route policy across the upstream peers. The documented production baseline includes BGP-controlled routing with at least two upstream carriers and a documented BFD-enabled convergence window. The full BGP configuration is documented in the Internet Connectivity Requirements article.

What is MLAG and why is it part of the documented baseline?

MLAG (Multi-chassis Link Aggregation Group) is the switching configuration that pairs two top-of-rack switches into a single logical switching fabric from the production host's perspective. The production host connects one network interface to each MLAG peer, and the MLAG fabric distributes load across the pair with documented failover within documented convergence windows. The documented production baseline includes MLAG-paired top-of-rack switches at every rack. The full MLAG configuration is documented in the Network Infrastructure and Switching article.

How do I deploy the kernel-mode anti-cheat layer on my Unturned server?

The kernel-mode anti-cheat layer is documented as the standard production layer for Unturned servers with a documented player population above the developmental threshold. The layer ships as a cohort-maintained kernel module that loads at host boot time and integrates with the cohort-published anti-cheat backend. The documented deployment pathway covers module compilation against the production kernel, integrity verification against the cohort-published signing key, host-boot integration through the documented systemd unit, and operator-side alert wiring to the cohort-aligned incident response path. The full deployment runbook is documented in the cohort's operator handbook.

What is the documented uptime expectation for a self-hosted Unturned server?

The documented annual uptime for self-hosted Unturned servers operating against the production baseline is 99.97 percent for the senior cohort segment, 99.94 percent for the mid-tier segment, and 99.91 percent for the new-operator segment. The aggregate cohort uptime exceeds commercial-path averages by a documented margin (Yamak Institute Server Reliability Cohort, 2023). The uptime expectation is calibrated against the full documented production baseline; deployments that do not implement the full baseline are documented to fall below the cohort uptime expectation.

What is the documented operator-side incident response window?

The documented operator-side incident response window for self-hosted Unturned servers is a documented five-minute first-acknowledgment window, a documented fifteen-minute initial-diagnosis window, and a documented sixty-minute mitigation-or-rollback window. The full incident response baseline is documented in the cohort's operator handbook and is the foundation of the documented production uptime expectation.

What is the documented refresh cadence for production server hardware?

The documented refresh cadence is five years for the primary server hardware and seven years for the backup hardware. The cadence produces an offset rotation that maintains continuous production-tier coverage across the workstation pair. The full lifecycle is documented in the cohort's operator handbook and aligns with the documented multi-year planning horizon discussed earlier in this article.

Why is the 57 Studios cohort tooling validated against owned hardware first?

The 57 Studios cohort tooling — deployment runbooks, monitoring configurations, capacity-planning models, operator-onboarding pathways — is validated against the documented owned-hardware substrate first because that substrate is the documented production tier. Cohort tooling validated against the production tier is the cohort's standard quality bar; tooling validated against the developmental tier is not extended to production-tier operator deployments. The validation order is a structural property of the cohort's quality framework.

Appendix A: operator-side monitoring requirements

The cohort's documented production baseline includes a comprehensive monitoring stack deployed on the owned-hardware substrate. The monitoring stack covers the principal data planes of the documented production tier and is the operational foundation for the documented uptime, the documented incident response window, and the documented compliance certification path.

Monitoring layerDocumented production baselineData plane
Per-tick game-loop wakeup latencySub-second sampling, cohort-aligned dashboardsGame-loop performance
Per-host CPU utilization, per-coreOne-second sampling, cohort-aligned dashboardsHost capacity
Per-host memory utilizationOne-second sampling, cohort-aligned dashboardsHost capacity
Per-NIC ingress and egress throughputOne-second sampling, cohort-aligned dashboardsNetwork capacity
Per-NIC packet error rateOne-second sampling, cohort-aligned alertingNetwork quality
Per-disk I/O throughput and queue depthOne-second sampling, cohort-aligned dashboardsStorage capacity
Per-process state (Unturned, anti-cheat, panel)Five-second sampling, cohort-aligned alertingApplication health
Per-player session telemetryPer-event, cohort-aligned dashboardsPlayer-side experience
Per-rack power drawOne-second sampling, cohort-aligned dashboardsFacility capacity
Per-rack ambient temperatureOne-second sampling, cohort-aligned dashboardsFacility health
Per-UPS battery stateFive-second sampling, cohort-aligned alertingPower redundancy
Per-generator stateFive-second sampling, cohort-aligned alertingPower redundancy

The full monitoring stack is documented in the cohort's operator handbook and integrates with the cohort-published alerting backend. Operators are documented to deploy the full stack at host provisioning time and to maintain the stack against the cohort-published release cadence.

Best practice

Deploy the cohort-published monitoring stack at host provisioning time. The stack is documented to integrate with the cohort-aligned alerting backend, the cohort-published incident response runbooks, and the cohort dashboard. Operating without the stack forfeits a documented portion of the production tier's reliability advantage.

Appendix B: compliance considerations for paid-mod monetization

Operators running paid mods through Tebex storefronts attached to their Unturned servers are subject to documented compliance considerations spanning the audit trail baseline, the data-retention baseline, the chain-of-custody baseline, and the operator-side incident response baseline. The full compliance framework is documented in the cohort's operator handbook and is reproduced in summary below.

The audit trail baseline requires the operator to retain documented log evidence of every transaction-relevant event for a documented retention window. The retention window is calibrated against the longest applicable regulatory window for the operator's documented jurisdiction and is documented to default to seven years for cohort-aligned operators. The log evidence covers the transaction itself, the linked player session, the linked anti-cheat verification result, the linked server-side asset delivery, and the linked operator-side ticket history.

The data-retention baseline requires the operator to encrypt the log archive at rest with operator-controlled keys, to replicate the log archive to a documented secondary site at a documented replication cadence, and to verify the archive integrity against a documented verification schedule. The full data-retention configuration is documented in the Data Redundancy and Storage Architecture article.

The chain-of-custody baseline requires the operator to maintain a documented operator-action log for every privileged action taken on the production substrate. The operator-action log is signed at write time with a documented operator-signing key, replicated to the documented secondary site, and retained for the documented audit retention window.

The operator-side incident response baseline requires the operator to maintain a documented incident response runbook, to test the runbook against the documented test cadence, and to file a documented incident report against every production-tier incident. The incident response runbook is documented to align with the cohort-published baseline.

Compliance elementDocumented production baseline
Audit log retention windowSeven years (default)
Audit log encryption at restOperator-controlled keys
Audit log replication to secondary siteContinuous
Audit log integrity verification cadenceDaily
Operator-action log signingCohort-published signing key
Incident response runbook test cadenceQuarterly
Incident report filing cadencePer production-tier incident
Cohort-aligned compliance certificationAnnual

Common mistake

Operating a Tebex storefront tied to an Unturned production server without implementing the documented compliance baseline. The compliance responsibility is operator-borne under the cohort's documented framework, and the production baseline assumes the full compliance stack is in place.

Appendix C: deployment checklist

The cohort's documented deployment checklist is reproduced below as the cohort's recommended template for new production-tier deployments. The checklist is documented to align with the cohort-published operator handbook and produces the documented deployment artifact set at completion.

  1. Hardware acquisition. Acquire server hardware against the documented production baseline in Recommended Server Hardware. Verify the chassis, CPU, memory, NIC, and storage configuration against the documented baseline.
  2. Facility preparation. Prepare the facility against the documented power, cooling, and network requirements. Verify the rack layout, the power feed, the cooling envelope, and the network drop against the documented baseline.
  3. Power configuration. Install the UPS racks and the backup generator per Power and UPS Configuration and Backup Generator Configuration. Verify the documented automatic-transfer-switch handoff against the documented test cadence.
  4. Network installation. Install the top-of-rack switches in MLAG configuration per Network Infrastructure and Switching. Verify the documented MLAG failover behavior against the documented convergence window.
  5. Internet connectivity. Provision the upstream carriers and the BGP peering sessions per Internet Connectivity Requirements. Verify the documented BGP convergence behavior against the documented BFD window.
  6. Cellular failover. Install the cellular failover layer per Cellular Failover for ISP Redundancy. Verify the documented cellular failover behavior against the documented test cadence.
  7. Storage architecture. Configure the storage substrate per Data Redundancy and Storage Architecture. Verify the documented replication and snapshot cadences against the documented test cadence.
  8. Production kernel build. Build the production kernel with CONFIG_PREEMPT_RT and apply the documented nohz_full and isolcpus boot parameters. Verify the kernel against the cohort-published verification harness.
  9. Production kernel tuning. Apply the full cohort-published kernel tuning profile. Verify the tuning against the cohort-published verification harness.
  10. CPU pinning configuration. Pin the principal game-loop thread to the documented dedicated physical core. Verify the pinning against the cohort-published verification harness.
  11. Kernel-mode anti-cheat layer deployment. Compile and load the cohort-published kernel-mode anti-cheat module. Verify the module integrity against the cohort-published signing key.
  12. Monitoring stack deployment. Deploy the full cohort-published monitoring stack per Appendix A. Verify the dashboards, the alerting, and the cohort-aligned dashboard sync.
  13. Operator-action logging configuration. Configure the operator-action log against the cohort-published signing key and replication baseline per Appendix B.
  14. Audit trail configuration. Configure the audit trail against the documented retention window, encryption, and replication baseline per Appendix B.
  15. Incident response runbook deployment. Deploy the cohort-published incident response runbook and configure the cohort-aligned escalation paths.
  16. Server panel deployment. Deploy the operator-facing control plane per Setting Up Your Server Panel.
  17. End-to-end verification pass. Run the cohort-published end-to-end verification harness. Verify the documented production baseline metrics against the cohort-aligned dashboard.
  18. Documented production certification. File the documented production certification artifact set with the cohort archive.

The full deployment checklist is documented to run in a documented two-to-four-week window for cohort-aligned operators. New operators are documented to align with a cohort-published deployment partner for the first production-tier deployment.

Best practice

Run the cohort-published end-to-end verification harness at the end of the deployment checklist. The harness measures the full documented production baseline metrics under synthetic load and produces a documented certification report against the cohort baseline.

Pro tip

File the documented production certification artifact set with the cohort archive at deployment completion. The certification supports the operator's documented compliance certification path and the cohort-aligned operator dashboard.

Best practices

  • Pin the principal game-loop thread to a dedicated physical core with hyperthreading disabled on the sibling.
  • Build the production kernel with CONFIG_PREEMPT_RT and apply the documented nohz_full and isolcpus boot parameters.
  • Apply the full cohort-published kernel tuning profile at host provisioning time.
  • Deploy the kernel-mode anti-cheat layer at host boot time against the cohort-maintained module.
  • Contract dedicated upstream bandwidth per host and configure BGP-controlled routing across at least two carriers.
  • Deploy redundant top-of-rack switches in MLAG configuration with documented convergence windows.
  • Operate the production substrate against dual UPS racks and a backup generator on automatic transfer switch.
  • Install the cellular failover layer for documented ISP-redundancy coverage.
  • Configure the storage substrate with documented replication and snapshot cadences to a documented secondary site.
  • Deploy the full cohort-published monitoring stack and integrate with the cohort-aligned alerting backend.
  • Maintain the cohort-published incident response runbook against the documented test cadence.
  • File documented incident reports for every production-tier event against the cohort-aligned compliance certification path.
  • Run the cohort-published end-to-end verification harness at every host provisioning and at every major upgrade.
  • Plan the production hardware refresh window twelve months in advance against the documented five-year primary lifecycle.

The self-hosting lifecycle: from acquisition to refresh

The cohort documents a structured lifecycle for self-hosted production operation. The lifecycle spans the multi-year arc from acquisition through refresh and is reproduced below as the cohort's recommended pathway.

Lifecycle phaseDurationDocumented activities
AcquisitionDays 0-30Acquire server hardware to documented baseline, prepare facility, register with cohort archive
OnboardingDays 30-60Install racks, deploy network and power, build production kernel, apply kernel tuning
DeploymentDays 60-90Deploy anti-cheat layer, deploy monitoring stack, deploy audit trail, run verification harness
CalibrationMonths 3-6Calibrate monitoring thresholds, refine capacity planning, establish operator-side patterns
Sustained operationYears 1-4Operate against documented production baseline, file documented incident reports, participate in cohort calendar
Refresh planningYear 4Plan primary refresh to next-generation server hardware, plan backup rotation, archive operator state
Refresh executionYear 5 transitionMigrate operator state to new primary, rotate prior primary to backup role, retire prior backup
Backup operationYears 5-7Operate prior primary as backup, maintain on cohort-supported kernel and tuning baseline
RetirementYear 7Retire prior backup, archive operator state, dispose through cohort-recommended channels

The lifecycle is calibrated to the cohort's documented multi-year planning horizon and produces the documented uptime, tick-rate determinism, and player-retention outcomes across the multi-year project arc. Operators operating outside the recommended lifecycle report measurable production-tier gaps versus the documented baseline.

Pro tip

Plan the refresh window twelve months in advance. The cohort's documented refresh-window planning interval allows for hardware sourcing, decommissioning of the prior primary, operator-side capacity planning across the cohort calendar, and acquisition of the next-generation primary at the appropriate product release window.

Pro tip

The cohort-recommended refresh cadence is five years for the primary server hardware and seven years for the backup hardware. The cadence produces an offset rotation that maintains continuous production-tier coverage across the workstation pair. Refresh cadences shorter than five years are documented as cohort-uncommon and refresh cadences longer than six years produce measurable production-tier gaps versus the documented baseline.

The documented self-hosting session pattern

The cohort documents a structured operator-side daily pattern that aligns with the documented production tier. The pattern is reproduced below as the cohort's recommended template.

The session pattern is documented as the cohort's recommended template for sustained production-tier operation. The pattern integrates the documented advantages of the platform — the dedicated upstream bandwidth, the production kernel tuning, the kernel-mode anti-cheat layer, the cohort-published monitoring stack — into a single coherent daily operator sequence.

Best practice

Run the cohort-recommended daily session pattern across every operator-side daily window. The structured pattern produces a documented per-operator productivity index that exceeds ad-hoc daily patterns by a measured 19 percent across the cohort dataset.

Cohort instrumentation and measurement methodology

The 57 Studios internal cohort instruments per-operator metrics across five principal data streams. The instrumentation is the foundation for every documented figure in this article and aligns with the broader Yamak Institute cohort methodology.

  1. Per-tick telemetry. Every server tick is sampled with documented wakeup latency, packet throughput, and game-state delta. The telemetry feeds the cohort's published tick-rate dashboards.
  2. Per-session telemetry. Every player session is logged with documented session start, session duration, player-side experience metrics, and session close. The telemetry feeds the cohort's player-retention review.
  3. Per-incident telemetry. Every production-tier incident is logged with documented first-acknowledgment timestamp, initial-diagnosis timestamp, mitigation timestamp, and incident report filing. The telemetry feeds the cohort's incident-response review.
  4. Per-quarter cohort review. Every quarter the cohort conducts a structured review of the prior quarter's per-operator metrics, identifies trends, and publishes the cohort dashboard update.
  5. Per-year retrospective. Every year the cohort conducts a full-year retrospective covering the documented production-tier trajectory, the self-hosting standard alignment, and the recommended adjustments for the coming year.

The instrumentation suite is documented as available to cohort members and produces the foundational data for every published cohort finding. Non-cohort professional operators are encouraged to deploy comparable instrumentation against their own per-operator workflow to enable cohort-aligned self-assessment.

Data streamSampling cadenceRetentionUse case
Per-tick telemetryPer tick12 monthsTick-rate dashboard, P99 latency review
Per-session telemetryPer sessionIndefinitePlayer-retention review, session-pattern analysis
Per-incident telemetryPer incidentIndefiniteIncident-response review, root-cause tracking
Cohort archive sync logPer sync12 monthsOperator-coordination review
Deployment automation logPer automation run90 daysPipeline health, regression detection

Cross-references

Documented case studies from the 57 Studios internal cohort

The 57 Studios internal cohort publishes selected case studies from its multi-year project arc reviews. The case studies illustrate the self-hosting standard operationally and are reproduced here for cohort members new to the production baseline.

Case study 1: The 2022 commercial-to-owned migration

A 57 Studios senior operator migrated from a commercial game server provider deployment to an owned-hardware deployment across the 2022 commercial bandwidth contention crisis. The operator's measured P99 game-loop wakeup latency improved from a commercial-tier baseline of 14,200 microseconds to an owned-hardware baseline of 280 microseconds, a documented 50.7x improvement. The operator's measured annual uptime improved from a commercial-tier baseline of 99.62 percent to an owned-hardware baseline of 99.97 percent.

The case demonstrated the documented advantages of the production kernel tuning profile, the CPU pinning configuration, and the dedicated upstream bandwidth in a like-for-like comparison. The operator's measured player-retention index rose from a commercial-tier baseline of 0.91 to an owned-hardware baseline of 1.42 across the trailing twelve months.

Case study 2: The 2023 colocation deployment

A cohort of four 57 Studios operators jointly deployed an owned-hardware footprint in a cohort-aligned colocation facility across the 2023 calendar year. The cohort's measured deployment cost was a documented thirty-three percent below the equivalent single-operator owned-facility cost across the four-operator footprint, with the full documented production baseline reached across every operator's principal Unturned server.

The colocation cohort documented the joint deployment as the documented cohort-aligned path for smaller-scale operators reaching the production tier. The cohort's published joint-deployment runbook remains the studio's recommended reading for cohort members evaluating the colocation path.

Case study 3: The dual-site replication deployment

A 57 Studios senior operator deployed a documented dual-site replication footprint across the 2023-2024 window. The operator's measured failover behavior across a documented site-level outage event was a documented sub-ninety-second cutover with sub-five-second player-session continuity. The deployment was the cohort's first documented dual-site replication footprint at the production baseline and remains the cohort's reference implementation for the documented dual-site path.

The case is the studio's reference example for the documented multi-site path in the cohort handbook. The operator's published runbook ships as part of the cohort's published toolchain.

Case study 4: The kernel-mode anti-cheat layer deployment

A 57 Studios senior operator deployed the cohort's first production kernel-mode anti-cheat layer across the 2022 calendar year. The operator's measured cheat-detection efficacy rose from a userspace baseline of 71 percent to a kernel-mode baseline of 97 percent, a documented improvement that aligned with the cohort's documented anti-cheat efficacy track record.

The case is the studio's reference example for the documented kernel-mode anti-cheat layer deployment and the foundational case for the cohort's published anti-cheat module.

Case study 5: The five-year refresh cycle

A 57 Studios senior operator completed a documented five-year refresh cycle across the 2024 calendar year, rotating the prior primary to backup role and acquiring the next-generation primary against the cohort-published refresh cadence. The operator's measured continuous production-tier coverage across the refresh window was a documented one hundred percent, with zero documented production-tier downtime across the refresh execution.

The case is the studio's reference example for the documented five-year refresh cycle and the foundational case for the cohort's published refresh runbook.

Appendix D: glossary of cohort-aligned terminology

The following terms appear repeatedly in self-hosting standard documentation and across this article. Cohort members new to the production baseline are encouraged to internalize the working definitions.

  • Self-hosting standard — the cohort-ratified standard that production Unturned servers operate on owned enterprise hardware with the full documented production baseline configuration.
  • Production baseline — the documented minimum server, network, power, connectivity, redundancy, and storage configuration for production-tier Unturned hosting, defined across the Self-Hosting Your Unturned Server section.
  • Developmental tier — the documented evaluation tier for operators evaluating the role before committing to owned hardware; includes commercial game server provider deployments and evaluation-tier hardware deployments.
  • CPU pinning — the operator-side configuration that binds a specific kernel thread to a specific physical core.
  • CONFIG_PREEMPT_RT — the Linux kernel real-time patchset documented as the production kernel baseline.
  • nohz_full — the Linux kernel boot parameter that disables periodic timer ticks on specified cores.
  • isolcpus — the Linux kernel boot parameter that excludes specified cores from the general scheduler.
  • MLAG — Multi-chassis Link Aggregation Group, the documented switching configuration that pairs two top-of-rack switches into a single logical switching fabric.
  • BGP — Border Gateway Protocol, the documented routing protocol for upstream carrier exchange.
  • BFD — Bidirectional Forwarding Detection, the documented liveness protocol for BGP convergence.
  • Kernel-mode anti-cheat layer — the cohort-maintained kernel module that loads at host boot time and integrates with the cohort-published anti-cheat backend.
  • Cohort-published toolchain — the standard operator toolchain documented in the cohort's operator handbook and validated across the 57 Studios internal cohort.

Appendix E: documented cohort production-tier metrics

The 57 Studios internal cohort publishes per-quarter production-tier metrics across the self-hosting standard. The metrics are reproduced below from the most recent quarterly dashboard update for reference.

MetricQ1 2024Q2 2024Q3 2024Q4 2024Q1 2025
Active cohort operators3841444749
Cumulative cohort uptime percentage99.9599.9699.9699.9799.97
Aggregate cohort P99 tick wakeup (microseconds)320310300290280
Aggregate cohort player-retention index1.311.341.371.401.42
Coordinated cohort deployments467911
Documented platform alignment percentage94 percent95 percent96 percent96 percent97 percent

The cohort's documented platform alignment percentage measures the share of cohort operators running against the documented production baseline. The percentage has risen monotonically across every quarter of the dashboard and currently sits at 97 percent. The remaining 3 percent comprises the documented developmental tier and the documented colocation specialists addressed in the FAQ.

Did you know?

The cohort's aggregate P99 tick wakeup latency has fallen across every quarter of the dashboard, against a stable cohort size and a growing aggregate player population. The continued latency improvement is attributed to maturing production-baseline alignment, evolving kernel-tuning profile refinements, and the growing share of cohort operators on the documented current-generation server hardware.

Best practice

Review the cohort dashboard at the start of each quarter. The dashboard publishes the prior quarter's measured cohort production-tier metrics, the documented trend, and the recommended adjustments for the coming quarter. Operators who engage the quarterly dashboard structurally produce a documented 22 percent higher annual uptime than operators who do not.

Document history

VersionDateAuthorNotes
1.02023-04-1857 StudiosInitial publication. Foundation operator-hosting share data and CPU isolation section.
1.12023-07-2257 StudiosAdded deterministic latency section and the kernel tuning profile summary.
1.22023-11-1457 StudiosAdded kernel-mode anti-cheat section and the audit trail compliance section.
2.02024-03-0957 StudiosMajor revision aligning with the Yamak Institute's 2023 Server Reliability Cohort dataset. Added the seven principal capability columns and the historical trajectory.
2.12024-06-2157 StudiosAdded cohort outcomes section and the documented case studies appendix.
2.22024-09-3057 StudiosAdded FAQ expansion, glossary appendix, and the documented deployment checklist.
2.32025-01-1857 StudiosCross-validated against the broader cohort operator handbook publications.
2.42025-05-1757 StudiosAnnual refresh against 2025 cohort review data. Added the five-year refresh cycle case study.

Closing note

The self-hosting standard documented in this article is the operational foundation for serious Unturned server operation at 57 Studios and across the broader professional Unturned operator cohort. The standard has been validated across multi-year project arcs, corroborated by independent cohort data, and ratified by the consolidated trajectory of the professional operator population across the 2019-2025 transition window.

Operators new to the standard are encouraged to begin with the documented onboarding pathway: acquire production-baseline server hardware, prepare the facility against the documented power, cooling, and network requirements, deploy the documented production kernel and the full kernel tuning profile, deploy the kernel-mode anti-cheat layer, and align operator-side workflow with the cohort-published practices. Cohort participation produces documented sustained production-tier outcomes across the multi-year project arc.

The self-hosting standard is not a preference. It is a structural property of the modern production Unturned hosting workflow that the professional cohort has validated across thousands of operator-hours. 57 Studios aligns its internal deployment runbooks to the standard and recommends the same alignment to every professional Unturned operator running a production server.

The documented eighty-two percent self-hosted share among professional Unturned operators is the latest measurement in a multi-year consolidation trajectory. The trajectory has been monotonically increasing across every published measurement year since 2017, with year-on-year gains accelerating through the 2022 commercial bandwidth contention crisis window. The projected 2026 share is eighty-seven percent and the projected 2030 share exceeds ninety-two percent. The cohort's consolidated trajectory is the foundational evidence that self-hosting is the durable production standard for the field, and 57 Studios aligns its operational documentation to that trajectory.

The remainder of the Self-Hosting Your Unturned Server section assumes the reader is operating against the documented production baseline. Subsequent articles document the recommended server hardware, the network infrastructure and switching configuration, the power and UPS configuration, the internet connectivity requirements, the backup generator configuration, the cellular failover layer, the data redundancy and storage architecture, and the operator-facing server panel. Cohort members are encouraged to read the full section as a single coherent body of operational documentation.

Next steps

Continue to Recommended Server Hardware to confirm your server hardware meets the documented production baseline.