Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Intermediate

Configure Linux firewall rules with fail2ban for SSH brute force protection and intrusion prevention

Set up fail2ban to automatically block SSH brute force attacks and protect your Linux server from unauthorized access attempts. Configure custom jails, firewall integration, and email notifications for comprehensive intrusion prevention.

25 min 6 distros 223 views
linux Intermediate

Configure Linux log rotation with logrotate and compression for system maintenance

Master log rotation with logrotate to manage disk space efficiently. Configure custom rotation policies, compression settings, and automated cleanup for applications and system logs.

25 min 6 distros 400 views
performance Intermediate

Optimize Node.js application performance with PM2 clustering and memory management

Learn how to optimize Node.js application performance using PM2 process manager with clustering, memory limits, and monitoring. This tutorial covers production deployment with systemd integration and advanced performance tuning.

25 min 6 distros 235 views
hosting Intermediate

Install and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications

Deploy production-ready FastAPI applications using Uvicorn ASGI server with systemd process management and Nginx reverse proxy. Configure SSL termination, load balancing, and comprehensive monitoring for high-performance Python web applications.

25 min 6 distros 372 views
networking Advanced

Configure network interface bonding with LACP and failover for enterprise networking

Set up LACP bonding for high-availability network interfaces with automatic failover. Configure both Linux bonding drivers and switch-side LACP for enterprise network redundancy and increased bandwidth.

45 min 6 distros 227 views
linux Intermediate

Configure Linux kernel parameters for container workloads with sysctl optimization

Configure Linux kernel parameters for optimal container performance with sysctl tuning. This guide covers memory management, network stack optimization, file descriptor limits, and security parameters for Docker and Podman workloads.

25 min 6 distros 366 views
networking Intermediate

Configure network bridge interfaces for VM networking and container communication

Set up Linux network bridges to enable communication between virtual machines, containers, and physical networks. Configure bridge interfaces using netplan, bridge utilities, and implement security policies for production environments.

45 min 6 distros 217 views
hosting Intermediate

Install and configure H2O HTTP/2 web server with FastCGI and SSL certificates

Deploy H2O, a high-performance HTTP/2 web server with native FastCGI support and SSL/TLS termination. Configure virtual hosts, PHP-FPM integration, and performance optimization for production environments.

25 min 6 distros 352 views
security Intermediate

Configure ClamAV antivirus scanning with automated threat detection and email alerts

Set up ClamAV daemon for real-time malware detection with automated scanning schedules, email notifications for threats, and optimized performance settings for production servers.

25 min 6 distros 318 views
security Intermediate

Configure AppArmor security profiles for web servers and databases with custom policy enforcement

Set up mandatory access control for Nginx, Apache, MySQL, and PostgreSQL using AppArmor security profiles. Learn to create custom policies, debug profile violations, and implement advanced enforcement for production web servers and databases.

45 min 6 distros 229 views
hosting Intermediate

Install and configure Gunicorn application server with systemd and reverse proxy for Python web applications

Deploy Python web applications in production using Gunicorn WSGI server with systemd service management and Nginx reverse proxy. Includes performance tuning, security hardening, and monitoring setup.

25 min 6 distros 239 views
networking Intermediate

Configure Tailscale mesh VPN with subnet routing and ACL policies for secure network access

Set up a zero-trust mesh VPN network with Tailscale that includes subnet routing for local network access, granular ACL policies for security, and exit nodes for secure internet access.

25 min 6 distros 217 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer