Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxInstall and configure CockroachDB cluster with high availability and distributed SQL
databasesInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesConfigure network interface monitoring with ICMP ping and connectivity testing
networkingInstall and configure ArgoCD for GitOps continuous deployment with RBAC and SSL
devopsRecently published
Set up GitLab container registry mirror and proxy cache for improved performance
devopsConfigure SonarQube quality gates and custom rules for enterprise code analysis
devopsSet up Consul multi-datacenter replication with ACL token replication
devopsSet up Kafka Connect cluster with high availability and load balancing
devopsIntegrate AWX 24.6 with HashiCorp Vault for dynamic secrets management and secure automation workflows
devopsDeploy Deno applications with Docker containers and production optimization
Learn how to containerize Deno applications with Docker using multi-stage builds, security hardening, and production-ready configuration. This tutorial covers creating optimized Dockerfiles, implementing proper caching strategies, and deploying with Docker Compose for scalable web applications.
Implement Elasticsearch 8 index lifecycle management and retention policies
Configure automated index lifecycle management (ILM) policies in Elasticsearch 8 to optimize storage, performance, and data retention. Learn to set up hot-warm-cold architectures with automatic rollover and deletion based on age and size criteria.
Configure ClamAV cluster scanning for high availability and enterprise threat detection
Build a production-grade ClamAV cluster with HAProxy load balancing, shared virus definitions, and comprehensive monitoring for enterprise-scale threat detection and high availability.
Configure Nginx Redis caching with SSL authentication and security hardening
Set up high-performance Nginx caching with Redis backend using SSL/TLS encryption and authentication. This tutorial covers Redis 7 SSL configuration, Nginx cache module setup, and comprehensive security hardening for production environments.
Implement Nginx Redis cluster caching for high availability
Set up a Redis cluster with Nginx caching for high availability and improved performance. This configuration provides distributed caching with automatic failover and enhanced scalability for production web applications.
Configure Kibana LDAP authentication and RBAC with Active Directory integration
Set up secure Kibana authentication using Active Directory LDAP with role-based access control to manage user permissions and streamline enterprise login workflows. This tutorial covers Elasticsearch security configuration, LDAP realm setup, and user role mappings.
Setup Elasticsearch 8 SSL/TLS encryption and advanced security hardening with authentication and access control
Secure your Elasticsearch 8 cluster with comprehensive SSL/TLS encryption, user authentication, role-based access control, and network hardening. This tutorial covers production-grade security configuration to protect your search infrastructure.
Configure NGINX load balancing with health checks and automatic failover
Set up NGINX as a load balancer with upstream servers, active health checks, and automatic failover capabilities. This tutorial covers round-robin, least-connections, and IP-hash load balancing methods with real-time backend monitoring.
Configure Istio traffic management with virtual services and destination rules
Configure advanced Istio traffic management using virtual services for intelligent request routing and destination rules for load balancing and service subsets in production Kubernetes environments.
Setup Elasticsearch 8 authentication with LDAP and Active Directory integration
Configure Elasticsearch 8 with X-Pack security to authenticate users against LDAP and Active Directory servers. This tutorial covers LDAP realm configuration, role-based access control, and troubleshooting authentication issues.
Implement OpenResty JWT authentication with OAuth2 integration for secure web applications
Set up secure JWT-based authentication in OpenResty with OAuth2 provider integration using lua-resty-jwt module. Configure token validation, authentication middleware, and security policies for production web applications.
Configure Redis Sentinel with SSL/TLS encryption and authentication for high availability
Set up a production-grade Redis Sentinel cluster with SSL/TLS encryption, authentication, and automatic failover for high availability. This tutorial covers certificate generation, security configuration, and monitoring setup.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer