Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxSet up Node.js application security with Helmet and rate limiting
securityInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingInstall and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications
hostingInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesRecently published
Configure ModSecurity machine learning anomaly detection for automated threat protection
securityConfigure NGINX HTTP/2 server push and connection multiplexing
performanceConfigure NGINX SSL certificate automation with Certbot and renewal monitoring
hostingMonitor FastAPI applications with Prometheus and Grafana for production observability
monitoringConfigure logrotate with Elasticsearch and Kibana integration for automated log management
monitoringDeploy FastAPI applications with Docker Compose and production optimization
Learn to containerize FastAPI applications with Docker Compose, integrate PostgreSQL and Redis services, configure Nginx reverse proxy with SSL, and implement production monitoring for scalable microservices deployment.
Implement container security with AppArmor and seccomp profiles
Secure your containers with AppArmor mandatory access controls and seccomp system call filtering. Learn to create custom security profiles, implement runtime policies, and monitor container security violations in production environments.
Configure container resource limits with Docker and systemd for production workloads
Learn to set memory, CPU, and I/O limits for Docker containers using both Docker runtime constraints and systemd service limits. Master cgroups v2 integration for bulletproof resource management in production environments.
Integrate H2O with Let's Encrypt for automatic SSL certificates
Set up H2O HTTP/2 web server with automatic SSL certificate management using Let's Encrypt and certbot. Configure SSL termination, automatic renewal, and security hardening for production deployments.
Configure Prometheus alerting rules for cgroup metrics monitoring and container resource alerts
Set up comprehensive Prometheus alerting rules for monitoring cgroup resource usage with automated threshold alerts for CPU, memory, and I/O limits. Configure Alertmanager notifications for container resource exhaustion and system health monitoring.
Configure network bridge with VLAN support for virtualization
Set up Linux network bridges with VLAN tagging to create isolated network segments for virtual machines and containers. This enables advanced networking scenarios with traffic separation and trunk port functionality.
Configure Linux cgroups v2 for container resource management and isolation
Set up cgroups v2 for container resource limits, CPU and memory isolation, and performance monitoring with systemd integration across modern Linux distributions.
Set up OpenLiteSpeed with Docker containers for development
Deploy OpenLiteSpeed web server in Docker containers with PHP-FPM, SSL certificates, and persistent volumes for scalable development environments.
Implement Kubernetes pod disruption budgets for high availability during scaling events
Configure Pod Disruption Budgets to ensure application availability during cluster maintenance and scaling operations. Learn to implement PDB policies, test disruption scenarios, and maintain service continuity in Kubernetes.
Configure Caddy 2 with Docker containers and automatic SSL certificates
Set up Caddy 2 as a reverse proxy using Docker with automatic Let's Encrypt SSL certificates. Deploy containerized web applications behind Caddy with zero-downtime SSL management and built-in load balancing.
Implement log-based monitoring and alerting with Grafana and Loki
Set up comprehensive log aggregation with Loki, centralized visualization with Grafana dashboards, and automated alerting rules for proactive incident response across your infrastructure.
Configure Kubernetes vertical pod autoscaler for resource optimization and cost management
Set up VPA to automatically adjust CPU and memory requests for your Kubernetes workloads. Reduce resource waste and optimize costs by letting VPA analyze actual usage patterns and rightsizing containers.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer