Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingInstall and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications
hostingSet up Node.js application security with Helmet and rate limiting
securityInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesRecently published
Monitor Jetty performance with JMX and Grafana dashboards
monitoringConfigure FRRouting route maps and prefix lists for advanced routing policies
networkingConfigure Jetty clustering and session replication for high availability
hostingConfigure Cherokee web server with MySQL database optimization and performance tuning
hostingConfigure Cassandra SSL encryption and authentication with security hardening
databasesConfigure Linux disk usage monitoring and automated cleanup with systemd timers
Set up automated disk monitoring, log cleanup, and email alerts using systemd timers to prevent disk space issues. Configure log rotation, temporary file cleanup, and threshold-based alerting for production systems.
Configure Linux memory management and swap optimization for high-performance workloads
Optimize Linux memory subsystem performance through advanced swap configuration, virtual memory tuning, and memory compression techniques. Learn to configure transparent huge pages, zram, and application-specific memory settings for high-performance workloads.
Configure automatic security updates with unattended-upgrades and email notifications
Set up automated security patching on Linux servers with unattended-upgrades and dnf-automatic. Configure email notifications, update policies, and monitoring to keep your systems secure while maintaining control over critical services.
Configure Grafana dashboards for InfluxDB collectd metrics with advanced visualization and alerting
Build comprehensive Grafana dashboards to visualize collectd system metrics stored in InfluxDB with custom panels, advanced queries, and automated alerting rules for production monitoring.
Configure NGINX rate limiting and DDoS protection with advanced security rules
Learn to configure production-grade NGINX rate limiting and DDoS protection with multiple security zones, advanced rules, and real-time monitoring to protect your web applications from malicious traffic and resource exhaustion attacks.
Implement comprehensive Apache Airflow DAG testing and validation strategies with pytest and best practices
Learn to implement production-grade testing for Apache Airflow DAGs using pytest, including unit tests for DAG structure validation, integration testing with test databases, and automated validation pipelines with CI/CD integration.
Install and configure Cilium CNI for Kubernetes with eBPF networking and security policies
Set up Cilium as your Kubernetes CNI plugin with advanced eBPF networking, load balancing, and network security policies. Includes Hubble observability for complete network visibility.
Install and configure GitLab CE with CI/CD runners and backup automation
Set up a complete self-hosted GitLab CE instance with SSL encryption, Docker-based CI/CD runners, automated backup system, and security hardening for production workloads.
Install and configure Ansible with automation best practices and security
Learn to install Ansible on Linux, configure secure SSH authentication, create production-ready playbooks with Vault encryption, and implement roles for scalable infrastructure automation.
Install and configure Fail2ban with advanced rules and email alerts
Set up Fail2ban intrusion prevention system with custom SSH, web server, and application protection rules. Configure email notifications and advanced filtering to automatically block malicious IP addresses based on log patterns.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer