Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxSet up Node.js application security with Helmet and rate limiting
securityInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesConfigure network interface monitoring with ICMP ping and connectivity testing
networkingRecently published
Setup Tailscale site-to-site VPN with multiple exit nodes for redundancy
networkingConfigure FastAPI database connection pooling with PostgreSQL 17 for high-performance applications
databasesConfigure Redis 7 cluster sharding for horizontal scaling with automated failover and monitoring
databasesConfigure H2O HTTP/2 web server caching and compression optimization for high performance
performanceIntegrate H2O with Let's Encrypt for automatic SSL certificates
hostingConfigure H2O HTTP/2 server load balancing with health checks and SSL termination
Set up H2O as a high-performance load balancer with HTTP/2 support, automated health monitoring, and SSL termination for production web applications.
Configure Linux file and directory ownership with chown and security best practices
Learn to properly configure file and directory ownership using chown, understand user and group permissions, and implement secure ownership patterns for web servers and applications.
Install and configure Caddy 2 web server with automatic HTTPS and PHP-FPM
Set up Caddy 2 web server with automatic HTTPS certificates from Let's Encrypt and PHP-FPM integration for dynamic content. Includes virtual hosts, security headers, and systemd service configuration.
Configure Varnish cache invalidation with automated purging strategies for high-performance web acceleration
Learn to configure advanced Varnish VCL for cache invalidation, implement PURGE and BAN strategies, and set up automated cache tagging for optimal performance. Master selective invalidation techniques and monitoring for production-grade web acceleration.
Configure AppArmor security profiles for web servers and databases with custom policy enforcement
Set up mandatory access control for Nginx, Apache, MySQL, and PostgreSQL using AppArmor security profiles. Learn to create custom policies, debug profile violations, and implement advanced enforcement for production web servers and databases.
Install and configure Caddy web server with automatic HTTPS and reverse proxy
Set up Caddy, a modern web server with automatic HTTPS certificates from Let's Encrypt, zero-config HTTP/2, and built-in reverse proxy capabilities for production applications.
Setup nginx reverse proxy with SSL certificates and security hardening
Configure nginx as a secure reverse proxy with Let's Encrypt SSL certificates, security headers, and DDoS protection. Learn to proxy backend applications, implement rate limiting, and harden your web server configuration.
Configure NGINX rate limiting and DDoS protection with advanced security rules
Learn to configure production-grade NGINX rate limiting and DDoS protection with multiple security zones, advanced rules, and real-time monitoring to protect your web applications from malicious traffic and resource exhaustion attacks.
Configure Redis Sentinel for high availability and automatic failover
Set up Redis Sentinel to monitor Redis master-replica deployments and automatically handle failover scenarios. This tutorial covers configuring a 3-node Sentinel cluster with quorum-based decision making for production-grade high availability.
Install and configure Keycloak for enterprise authentication with clustering
Set up Keycloak as an enterprise identity provider with PostgreSQL backend, SSL encryption, and high availability clustering for OAuth2, OpenID Connect, and SAML authentication across your organization.
Install and configure GitLab CE with CI/CD runners and backup automation
Set up a complete self-hosted GitLab CE instance with SSL encryption, Docker-based CI/CD runners, automated backup system, and security hardening for production workloads.
Install and configure Kubernetes cluster with kubeadm and security hardening
Set up a production-ready Kubernetes cluster using kubeadm with proper security hardening, RBAC configuration, and CNI networking. Includes worker node setup and verification steps.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer