Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Intermediate

Set up LUKS full disk encryption during Linux installation

Configure full disk encryption with LUKS during OS installation to secure your data at rest. Includes post-installation key management, performance optimization, and troubleshooting for production systems.

45 min 4 distros 79 views
monitoring Intermediate

Configure Node.js application monitoring with PM2 and Grafana

Set up comprehensive Node.js application monitoring using PM2 process manager with Prometheus metrics collection and Grafana dashboards for production-grade observability and alerting.

45 min 4 distros 28 views
monitoring Intermediate

Configure Nagios custom plugins development for specialized monitoring requirements

Learn to develop custom Nagios plugins for specialized monitoring requirements including setting up the development environment, writing check scripts in multiple languages, and integrating them into your Nagios Core monitoring infrastructure.

45 min 4 distros 69 views
security Intermediate

Configure Nagios Core 4.5 SSL certificates and security hardening with authentication controls

Secure your Nagios monitoring with SSL certificates, advanced authentication, and comprehensive access controls. This guide covers Let's Encrypt integration, web interface hardening, and security monitoring setup.

45 min 4 distros 54 views
monitoring Intermediate

Set up Nagios Core 4.5 distributed monitoring with NRPE for remote host checks

Configure Nagios Core server with NRPE agents for distributed monitoring across multiple servers. Set up remote host checks, service monitoring, and centralized alerting for comprehensive infrastructure oversight.

45 min 4 distros 68 views
security Intermediate

Configure SELinux mandatory access controls for enhanced security

Set up SELinux on Ubuntu and Debian systems, configure security modes and policies, create custom application rules, and implement comprehensive monitoring for enhanced Linux security hardening.

45 min 4 distros 39 views
security Advanced

Configure SSH certificate authentication with CA signing for secure server access

Set up SSH certificate-based authentication using a Certificate Authority to eliminate individual key management. Create signed user certificates that provide secure, scalable access control for multiple servers and users.

45 min 4 distros 62 views
monitoring Intermediate

Monitor Cherokee web server performance with Grafana and Prometheus metrics collection

Set up comprehensive Cherokee web server monitoring with Prometheus metrics collection and Grafana dashboards. Configure alerting rules, performance thresholds, and real-time visualization for production Cherokee deployments.

45 min 4 distros 49 views
networking Advanced

Monitor OSPF network topology with Prometheus and Grafana dashboards

Set up comprehensive OSPF network monitoring using FRRouting, Prometheus SNMP exporter, and Grafana dashboards to track network topology changes, LSA states, and routing convergence in real-time.

45 min 4 distros 123 views
monitoring Intermediate

Monitor Jetty performance with JMX and Grafana dashboards

Set up comprehensive Jetty monitoring using JMX metrics collection with Prometheus JMX Exporter and visualize performance data through custom Grafana dashboards with automated alerting.

45 min 4 distros 49 views
hosting Advanced

Configure Jetty clustering and session replication for high availability

Set up Eclipse Jetty 12 in a clustered configuration with session replication across multiple nodes. This tutorial covers installation, clustering setup with JDBC session persistence, load balancer integration, and production monitoring for high-availability web applications.

45 min 4 distros 49 views
linux Intermediate

Configure systemd service resource limits and security isolation

Configure cgroups v2 resource limits and security isolation for systemd services to prevent resource exhaustion and improve system security. This tutorial covers memory, CPU, and I/O limits with monitoring and troubleshooting.

35 min 4 distros 98 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer