Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

monitoring Intermediate

Monitor Apache Cassandra cluster with Prometheus and Grafana dashboards

Set up comprehensive monitoring for Apache Cassandra clusters using JMX exporter, Prometheus metrics collection, and Grafana dashboards with alerting rules for cluster health.

45 min 4 distros 9 views
monitoring Intermediate

Configure logrotate with Elasticsearch and Kibana integration for automated log management

Set up automated log rotation with Elasticsearch index lifecycle management and Kibana dashboard integration for scalable log management. Configure retention policies and monitoring alerts for production environments.

45 min 4 distros 7 views
linux Intermediate

Setup log aggregation with rsyslog and logrotate for centralized system monitoring

Configure rsyslog for centralized log collection across servers, implement advanced logrotate policies for automated retention, and set up remote log shipping with filtering for comprehensive system monitoring and audit compliance.

45 min 4 distros 11 views
security Intermediate

Set up ELK Stack for centralized ModSecurity log analysis and monitoring

Configure Elasticsearch 8, Logstash 8, and Kibana 8 to collect, parse, and visualize ModSecurity web application firewall logs from multiple servers for centralized security monitoring and threat detection.

45 min 4 distros 6 views
security Advanced

Set up centralized security monitoring with ClamAV 1.4 and Elasticsearch 8

Build a comprehensive security monitoring infrastructure with ClamAV antivirus scanning, Elasticsearch log storage, and automated threat detection. This setup provides real-time malware scanning with centralized log aggregation for enterprise security compliance.

45 min 4 distros 10 views
devops Advanced

Setup Gunicorn blue-green deployment with NGINX for zero downtime Python applications

Configure zero-downtime deployments for Python web applications using Gunicorn blue-green deployment strategy with NGINX reverse proxy, automated health checks, and rollback mechanisms for production reliability.

45 min 4 distros 13 views
monitoring Intermediate

Implement Apache log analysis with GoAccess and ELK stack for real-time monitoring

Set up comprehensive Apache log monitoring with GoAccess for real-time analysis and ELK stack for centralized log processing, creating powerful Kibana dashboards for web server insights and automated alerting.

45 min 4 distros 13 views
security Intermediate

Implement OpenLiteSpeed WAF and DDoS protection with ModSecurity 3 and rate limiting

Set up comprehensive web application security for OpenLiteSpeed with ModSecurity 3 web application firewall, OWASP Core Rule Set for threat protection, and advanced rate limiting to defend against DDoS attacks and malicious traffic.

45 min 4 distros 19 views
monitoring Intermediate

Configure ELK stack for centralized logging with Elasticsearch 8, Logstash 8, and Kibana 8

Set up a production-grade ELK stack with Elasticsearch 8, Logstash 8, and Kibana 8 for centralized log management. Configure authentication, SSL encryption, and log processing pipelines across multiple data sources.

45 min 4 distros 14 views
linux Intermediate

Configure centralized logging with rsyslog and logrotate for system monitoring and log management

Set up a centralized logging system using rsyslog server to collect logs from multiple clients, implement TLS encryption for secure transmission, and configure logrotate for automated log rotation and management.

45 min 4 distros 19 views
monitoring Intermediate

Configure Fluentd with Kubernetes DaemonSet and log routing for centralized collection

Deploy Fluentd as a DaemonSet on Kubernetes for centralized log collection with multi-format parsing, routing to multiple outputs, and RBAC security. Includes configuration for Elasticsearch, S3, and custom log sources.

45 min 4 distros 24 views
security Advanced

Secure Docker containers with Traefik reverse proxy and Authelia authentication

Set up a production-grade security stack using Traefik v3 reverse proxy with SSL automation and Authelia for multi-factor authentication. This tutorial covers Docker hardening, LDAP integration, and container security monitoring.

45 min 4 distros 73 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer