Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

hosting Beginner

Install and configure Waitress WSGI server with SSL certificates for Python web applications

Deploy production-ready Python web applications using Waitress WSGI server with SSL certificates, systemd service management, and reverse proxy configuration for Flask and Django applications.

25 min 6 distros 194 views
linux Beginner

Configure Linux file and directory ownership with chown and security best practices

Learn to properly configure file and directory ownership using chown, understand user and group permissions, and implement secure ownership patterns for web servers and applications.

25 min 6 distros 211 views
hosting Beginner

Install and configure Hypercorn ASGI server with systemd and reverse proxy for Python web applications

Deploy Python ASGI applications with Hypercorn server, systemd service management, and Nginx reverse proxy for production environments. Complete setup with SSL termination and performance optimization.

25 min 6 distros 202 views
hosting Beginner

Install and configure uWSGI application server with Nginx reverse proxy for Python web applications

Set up a production-ready Python web application stack with uWSGI as the WSGI server and Nginx as a reverse proxy. Includes SSL certificate setup, systemd service configuration, and troubleshooting guide for Django and Flask deployments.

25 min 6 distros 163 views
hosting Beginner

Install and configure Go web applications with systemd and reverse proxy

Deploy Go web applications in production with systemd service management, NGINX reverse proxy with SSL termination, and comprehensive logging for monitoring and maintenance.

25 min 6 distros 191 views
devops Advanced

Integrate Jaeger with Kubernetes service mesh for comprehensive distributed tracing

Set up production-grade distributed tracing in Kubernetes using Jaeger with Istio service mesh integration. Configure OpenTelemetry instrumentation, Elasticsearch storage backend, and comprehensive observability for microservices.

45 min 4 distros 107 views
security Intermediate

Configure intrusion detection with OSSEC and Wazuh for real-time security monitoring

Set up comprehensive host-based intrusion detection with OSSEC HIDS and Wazuh manager for real-time security monitoring, file integrity checking, and automated threat response across your infrastructure.

45 min 4 distros 125 views
devops Intermediate

Configure Kubernetes External DNS for automatic DNS record management with cloud providers

Set up External DNS controller to automatically create and manage DNS records for your Kubernetes services and ingresses. This tutorial covers installation, cloud provider integration, and security configuration for production-ready DNS automation.

25 min 4 distros 154 views
networking Intermediate

Configure Tailscale with Kubernetes cluster networking integration

Set up Tailscale mesh VPN with Kubernetes cluster integration for secure pod-to-pod communication, subnet routing, and service discovery across distributed nodes.

25 min 4 distros 97 views
databases Intermediate

Implement MongoDB 8.0 change streams for real-time data processing and application synchronization

Set up MongoDB 8.0 change streams to monitor database changes in real-time. Configure replica sets, implement Python and Node.js clients, and add filtering and resumability for production applications.

45 min 4 distros 174 views
devops Intermediate

Implement Kubernetes cluster autoscaler for automatic node scaling

Configure Kubernetes cluster autoscaler to automatically add and remove worker nodes based on pod resource demands. This tutorial covers cloud provider integration, scaling policies, and monitoring for production-grade horizontal scaling.

45 min 4 distros 185 views
security Advanced

Configure OpenVPN LDAP authentication for enterprise users with Active Directory integration

Set up OpenVPN server with LDAP authentication against Active Directory, enabling centralized user management and group-based access control for enterprise VPN deployments.

45 min 4 distros 176 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer