Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Advanced

Configure encrypted network storage with LUKS and NFS for secure file sharing

Set up enterprise-grade encrypted network storage by combining LUKS disk encryption with NFS file sharing. This advanced configuration provides secure, centralized file access across multiple systems while maintaining data protection at rest.

45 min 4 distros 72 views
security Advanced

Configure SSH certificate authentication with CA signing for secure server access

Set up SSH certificate-based authentication using a Certificate Authority to eliminate individual key management. Create signed user certificates that provide secure, scalable access control for multiple servers and users.

45 min 4 distros 89 views
hosting Advanced

Configure Jetty clustering and session replication for high availability

Set up Eclipse Jetty 12 in a clustered configuration with session replication across multiple nodes. This tutorial covers installation, clustering setup with JDBC session persistence, load balancer integration, and production monitoring for high-availability web applications.

45 min 4 distros 70 views
security Advanced

Integrate OSSEC with Splunk for centralized security monitoring and log analysis

Set up OSSEC HIDS with Splunk Universal Forwarder to centralize security events, create monitoring dashboards, and enable real-time threat correlation across your infrastructure.

45 min 4 distros 68 views
security Advanced

Configure intrusion detection with OSSEC and fail2ban integration

Set up comprehensive intrusion detection by integrating OSSEC HIDS with fail2ban for automated threat response. This advanced configuration provides real-time monitoring, log analysis, and automated IP blocking for enhanced server security.

45 min 4 distros 83 views
security Advanced

Configure ModSecurity machine learning anomaly detection for automated threat protection

Set up ModSecurity 3 with machine learning anomaly detection to automatically identify and block unknown attack patterns. This advanced configuration adds intelligent threat protection beyond traditional signature-based rules.

45 min 4 distros 68 views
security Advanced

Integrate ModSecurity 3 with SOAR platforms for automated incident response and threat detection

Set up ModSecurity 3 with structured logging, webhook notifications, and API integrations to automatically feed security events into SOAR platforms for real-time threat detection and incident response workflows.

45 min 4 distros 73 views
databases Advanced

Set up PostgreSQL 17 streaming replication with PgBouncer connection pooling and load balancing

Configure PostgreSQL 17 streaming replication with automatic failover, PgBouncer connection pooling for performance optimization, and HAProxy load balancing for high availability database architecture.

45 min 4 distros 189 views
security Intermediate

Set up ELK Stack for centralized ModSecurity log analysis and monitoring

Configure Elasticsearch 8, Logstash 8, and Kibana 8 to collect, parse, and visualize ModSecurity web application firewall logs from multiple servers for centralized security monitoring and threat detection.

45 min 4 distros 73 views
monitoring Intermediate

Integrate Apache Tomcat 11 with Prometheus and Grafana monitoring for comprehensive performance tracking

Set up comprehensive monitoring for Apache Tomcat 11 using JMX Prometheus Java agent, configure Prometheus to scrape metrics, create detailed Grafana dashboards, and implement alerting rules for performance tracking and health monitoring.

45 min 4 distros 71 views
databases Advanced

Setup MySQL replication with GTID and automatic failover

Configure MySQL 8.0 master-slave replication using GTID for reliable data synchronization, then implement MySQL High Availability (MHA) for automatic failover detection and promotion.

45 min 4 distros 102 views
monitoring Intermediate

Implement log-based monitoring and alerting with Grafana and Loki

Set up comprehensive log aggregation with Loki, centralized visualization with Grafana dashboards, and automated alerting rules for proactive incident response across your infrastructure.

45 min 4 distros 103 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer