Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Install and configure Deno for web development with systemd and reverse proxy
hostingInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingInstall and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications
hostingInstall and configure Ollama for local AI models on Linux servers
devopsConfigure Linux system time synchronization with chrony and NTP hardening
linuxRecently published
Set up audit log analysis dashboard with Grafana and Prometheus for security monitoring
securityConfigure Redis 7 cluster sharding with SSL/TLS authentication and security hardening
databasesImplement backup rotation policies with automated cleanup using systemd timers and shell scripts
linuxOptimize OpenResty performance with advanced caching strategies and Lua optimization
performanceConfigure Linux audit system with SIEM integration for Splunk security monitoring
securityImplement PHP application monitoring with New Relic and logging
Set up comprehensive PHP application monitoring using New Relic APM with custom metrics and error tracking. Configure structured logging with centralized collection and automated monitoring alerts.
Set up intrusion detection with OSSEC HIDS and nftables integration for automated threat response
Configure OSSEC Host-based Intrusion Detection System with nftables firewall integration for real-time threat detection and automated response. Monitor system activity, detect intrusions, and automatically block malicious IPs using active response mechanisms.
Implement custom Prometheus exporters for application metrics collection and monitoring
Build production-grade custom Prometheus exporters in Python and Go to collect application-specific metrics. Learn exporter architecture, metric types, systemd deployment, and Prometheus integration for comprehensive application monitoring.
Implement Apache web application firewall with ModSecurity 3 and OWASP Core Rule Set
Deploy ModSecurity 3 as an Apache module with OWASP Core Rule Set to protect web applications from common attacks. Configure real-time logging, custom rules, and automated threat detection for production environments.
Set up Thanos Receiver for remote write scalability with Prometheus integration
Configure Thanos Receiver to handle high-volume remote write traffic from multiple Prometheus instances. This tutorial covers installation, multi-tenancy setup, and performance optimization for large-scale metrics ingestion.
Implement HAProxy rate limiting and DDoS protection with advanced security rules
Configure HAProxy with comprehensive rate limiting, connection throttling, and DDoS protection using stick tables, ACLs, and advanced security rules to protect your applications from malicious traffic and ensure service availability.
Implement Jaeger security with TLS encryption and authentication for distributed tracing
Secure your Jaeger distributed tracing infrastructure with TLS encryption, JWT-based authentication, and RBAC policies. This tutorial covers certificate generation, collector/query service encryption, and UI authentication through reverse proxy integration.
Set up Redis monitoring with Prometheus and Grafana dashboards
Configure comprehensive Redis monitoring using Prometheus Redis Exporter and Grafana dashboards. Monitor Redis performance metrics, memory usage, connections, and replication status with automated alerts for production environments.
Configure Node.js application logging with Winston and log rotation for production
Set up Winston logger with structured JSON logging, multiple transports, and automated log rotation using winston-daily-rotate-file for production Node.js applications. Configure comprehensive error handling and log management best practices.
Setup remote backup storage with S3-compatible encryption and automated retention policies
Configure secure, encrypted backup storage using S3-compatible providers with automated retention policies, client-side GPG encryption, and monitoring scripts for reliable data protection.
Configure advanced iptables rules for bridge network security and container isolation
Implement comprehensive bridge network security using advanced iptables rules to isolate containers, control traffic flow, and prevent lateral movement in virtualized environments.
Configure OSPF with FRRouting 10 for dynamic routing protocols and network failover
Set up OSPF dynamic routing with FRRouting 10 for automatic network failover and route redistribution. Configure area authentication, routing policies, and monitoring for enterprise network resilience.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer