Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

hosting Intermediate

Configure PHP-FPM with NGINX reverse proxy and SSL certificates

Set up PHP-FPM with NGINX as a reverse proxy and secure it with Let's Encrypt SSL certificates. This configuration provides high performance for PHP applications with proper process isolation and automatic HTTPS.

25 min 4 distros 24 views
databases Advanced

Configure MySQL binary log backup and point-in-time recovery

Set up automated MySQL binary log backup with rotation and implement point-in-time recovery procedures for complete database disaster recovery and operational continuity.

45 min 4 distros 75 views
monitoring Intermediate

Set up Netdata slave nodes for centralized monitoring with parent-child architecture

Configure Netdata parent-child architecture to stream metrics from multiple servers to a centralized dashboard. Set up authentication, SSL encryption, and troubleshoot streaming issues for scalable monitoring infrastructure.

45 min 4 distros 78 views
security Intermediate

Configure SELinux mandatory access controls for enhanced security

Set up SELinux on Ubuntu and Debian systems, configure security modes and policies, create custom application rules, and implement comprehensive monitoring for enhanced Linux security hardening.

45 min 4 distros 53 views
databases Advanced

Configure ScyllaDB SSL encryption and authentication with certificate management and security hardening

Secure your ScyllaDB cluster with comprehensive SSL/TLS encryption for client connections and inter-node communication. This tutorial covers certificate generation, authentication setup, and production security hardening.

45 min 4 distros 91 views
monitoring Intermediate

Monitor ScyllaDB cluster with Prometheus and Grafana for comprehensive performance tracking

Set up complete ScyllaDB cluster monitoring using Prometheus for metrics collection and Grafana for visualization. Configure alerting rules for proactive performance monitoring and issue detection.

45 min 4 distros 99 views
hosting Advanced

Configure Jetty clustering and session replication for high availability

Set up Eclipse Jetty 12 in a clustered configuration with session replication across multiple nodes. This tutorial covers installation, clustering setup with JDBC session persistence, load balancer integration, and production monitoring for high-availability web applications.

45 min 4 distros 60 views
security Advanced

Integrate OSSEC with Splunk for centralized security monitoring and log analysis

Set up OSSEC HIDS with Splunk Universal Forwarder to centralize security events, create monitoring dashboards, and enable real-time threat correlation across your infrastructure.

45 min 4 distros 66 views
security Advanced

Configure intrusion detection with OSSEC and fail2ban integration

Set up comprehensive intrusion detection by integrating OSSEC HIDS with fail2ban for automated threat response. This advanced configuration provides real-time monitoring, log analysis, and automated IP blocking for enhanced server security.

45 min 4 distros 83 views
security Intermediate

Configure OSSEC active response for automated threat blocking

Set up OSSEC active response to automatically block threats by configuring firewall rules, custom response scripts, and tuning response actions for real-time intrusion prevention.

25 min 4 distros 83 views
security Intermediate

Set up Fail2ban with Cloudflare API integration for automatic IP blocking and enhanced security

Configure Fail2ban to automatically add malicious IPs to Cloudflare's firewall rules for enhanced protection. This tutorial covers installation, custom filters, API integration, and monitoring for comprehensive security automation across your infrastructure.

45 min 4 distros 103 views
linux Intermediate

Setup log aggregation with rsyslog and logrotate for centralized system monitoring

Configure rsyslog for centralized log collection across servers, implement advanced logrotate policies for automated retention, and set up remote log shipping with filtering for comprehensive system monitoring and audit compliance.

45 min 4 distros 91 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer