Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Beginner

Configure Linux file permissions and access control with umask and chmod best practices

Learn how to configure secure Linux file permissions using chmod, set default permissions with umask, and implement proper access control to prevent security vulnerabilities while fixing permission denied errors.

25 min 6 distros 483 views
performance Beginner

Optimize Linux filesystem performance with mount options and I/O schedulers

Learn to optimize Linux filesystem performance by configuring I/O schedulers, tuning ext4 mount options, and monitoring disk performance with iostat and iotop for high-throughput workloads.

25 min 6 distros 455 views
security Beginner

Configure SSH key authentication and disable password login for secure server access

Set up SSH public key authentication on Linux servers and disable password-based logins to prevent brute force attacks and improve security. This tutorial covers key generation, server configuration, and troubleshooting common authentication issues.

20 min 6 distros 450 views
networking Advanced

Configure OSPF dynamic routing with FRRouting for enterprise network failover

Set up Open Shortest Path First (OSPF) protocol using FRRouting for dynamic network routing, multi-area configurations, and automatic failover in enterprise environments.

45 min 6 distros 431 views
hosting Intermediate

Install and configure Jetty application server with SSL certificates and performance tuning

Deploy Eclipse Jetty application server with SSL/TLS encryption, systemd service management, and production-ready performance optimizations. Configure reverse proxy integration and security hardening for Java web applications.

45 min 6 distros 518 views
hosting Intermediate

Install and configure Cherokee web server with FastCGI and virtual hosts

Set up Cherokee web server with web-based administration, FastCGI support for PHP applications, SSL-enabled virtual hosts, and performance optimizations for lightweight web hosting environments.

45 min 6 distros 536 views
networking Intermediate

Configure network traffic shaping with tc and HTB for bandwidth management and QoS

Set up hierarchical token bucket (HTB) traffic shaping with tc to control bandwidth allocation, prioritize network traffic, and implement quality of service policies for optimal network performance.

45 min 6 distros 539 views
security Intermediate

Configure OSSEC HIDS for intrusion detection with email alerts and real-time monitoring

Set up OSSEC Host-based Intrusion Detection System with server-agent architecture, custom detection rules, email notifications, and real-time monitoring for comprehensive security monitoring across multiple systems.

45 min 6 distros 439 views
databases Intermediate

Install and configure CockroachDB cluster with high availability and distributed SQL

Set up a production-ready CockroachDB cluster with SSL certificates, load balancing, and automated backups for distributed SQL workloads. This tutorial covers multi-node deployment, security hardening, and performance optimization for enterprise environments.

45 min 6 distros 699 views
networking Intermediate

Configure network load balancing with keepalived and VRRP for high availability failover

Set up keepalived with VRRP to create highly available network services with automatic failover. Configure virtual IP addresses that move between servers when one fails, ensuring zero-downtime load balancing.

25 min 6 distros 582 views
performance Intermediate

Optimize NGINX performance with microcaching and worker tuning for high-traffic websites

Configure NGINX for high-traffic websites with microcaching for dynamic content, optimized worker processes, buffer tuning, and compression. Learn to monitor cache performance and troubleshoot memory usage.

25 min 6 distros 502 views
security Intermediate

Configure Linux firewall rules with fail2ban for SSH brute force protection and intrusion prevention

Set up fail2ban to automatically block SSH brute force attacks and protect your Linux server from unauthorized access attempts. Configure custom jails, firewall integration, and email notifications for comprehensive intrusion prevention.

25 min 6 distros 500 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer