Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

hosting Intermediate

Configure OpenResty load balancing with upstream health checks and automatic failover

Set up OpenResty with intelligent load balancing across multiple backend servers, health monitoring, and automatic failover to maintain high availability for web applications.

25 min 4 distros 11 views
networking Intermediate

Configure HAProxy load balancing with multiple backend servers

Set up HAProxy to distribute traffic across multiple backend servers with health checks, SSL termination, and automatic failover for high availability load balancing.

45 min 4 distros 71 views
security Advanced

Configure intrusion detection with OSSEC and fail2ban integration

Set up comprehensive intrusion detection by integrating OSSEC HIDS with fail2ban for automated threat response. This advanced configuration provides real-time monitoring, log analysis, and automated IP blocking for enhanced server security.

45 min 4 distros 83 views
security Intermediate

Configure OSSEC active response for automated threat blocking

Set up OSSEC active response to automatically block threats by configuring firewall rules, custom response scripts, and tuning response actions for real-time intrusion prevention.

25 min 4 distros 84 views
security Intermediate

Set up Fail2ban with Cloudflare API integration for automatic IP blocking and enhanced security

Configure Fail2ban to automatically add malicious IPs to Cloudflare's firewall rules for enhanced protection. This tutorial covers installation, custom filters, API integration, and monitoring for comprehensive security automation across your infrastructure.

45 min 4 distros 103 views
security Advanced

Configure ModSecurity machine learning anomaly detection for automated threat protection

Set up ModSecurity 3 with machine learning anomaly detection to automatically identify and block unknown attack patterns. This advanced configuration adds intelligent threat protection beyond traditional signature-based rules.

45 min 4 distros 68 views
security Advanced

Integrate ModSecurity 3 with SOAR platforms for automated incident response and threat detection

Set up ModSecurity 3 with structured logging, webhook notifications, and API integrations to automatically feed security events into SOAR platforms for real-time threat detection and incident response workflows.

45 min 4 distros 73 views
security Intermediate

Set up ELK Stack for centralized ModSecurity log analysis and monitoring

Configure Elasticsearch 8, Logstash 8, and Kibana 8 to collect, parse, and visualize ModSecurity web application firewall logs from multiple servers for centralized security monitoring and threat detection.

45 min 4 distros 73 views
performance Intermediate

Configure H2O HTTP/2 web server caching and compression optimization for high performance

Optimize H2O web server performance with advanced caching strategies, HTTP/2 compression, and production-grade tuning for high-traffic applications.

45 min 4 distros 80 views
networking Advanced

Configure H2O HTTP/2 server load balancing with health checks and SSL termination

Set up H2O as a high-performance load balancer with HTTP/2 support, automated health monitoring, and SSL termination for production web applications.

45 min 4 distros 87 views
hosting Intermediate

Configure Apache HTTP/2 and SSL termination with Let's Encrypt certificates

Set up Apache HTTP Server with HTTP/2 protocol support and automatic SSL certificate management using Certbot. This tutorial covers virtual host configuration, SSL termination, and performance optimization for production websites.

25 min 4 distros 73 views
security Intermediate

Implement OpenLiteSpeed WAF and DDoS protection with ModSecurity 3 and rate limiting

Set up comprehensive web application security for OpenLiteSpeed with ModSecurity 3 web application firewall, OWASP Core Rule Set for threat protection, and advanced rate limiting to defend against DDoS attacks and malicious traffic.

45 min 4 distros 143 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer