Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

databases Advanced

Implement ScyllaDB disaster recovery with cross-region replication

Set up ScyllaDB multi-region cluster with automated backup strategies, cross-datacenter replication, and failover automation for enterprise-grade disaster recovery and business continuity.

180 min 4 distros 151 views
hosting Advanced

Configure OpenResty with PostgreSQL connection pooling for database integration

Set up OpenResty with lua-resty-postgres for high-performance database connection pooling. This tutorial covers installation, connection management, health checks, and security hardening for production web applications.

45 min 4 distros 121 views
monitoring Intermediate

Implement SNMP trap monitoring and alerting system for proactive network management

Set up comprehensive SNMP trap monitoring with snmptrapd, automated alerting via email and webhooks, and integration with monitoring platforms like Nagios and Zabbix for proactive network management and real-time issue detection.

45 min 4 distros 169 views
monitoring Intermediate

Monitor OpenVPN connections with Grafana dashboard and Prometheus metrics

Set up comprehensive monitoring for your OpenVPN server using Prometheus to collect connection metrics and Grafana to visualize client connections, bandwidth usage, and server performance through custom dashboards.

45 min 4 distros 86 views
hosting Intermediate

Configure Lighttpd 1.4 with multiple virtual hosts and subdomains

Set up Lighttpd web server with multiple virtual hosts, subdomain routing, SSL certificates, and performance optimization for hosting multiple websites on a single server with security hardening.

45 min 4 distros 102 views
security Advanced

Configure Airflow DAG security and isolation with RBAC policies

Set up comprehensive security for Apache Airflow with role-based access control, DAG-level permissions, and resource isolation. Configure user authentication, implement fine-grained security policies, and establish monitoring for production-grade workflow orchestration.

45 min 4 distros 169 views
security Intermediate

Set up OSSEC agent deployment and centralized management with automated configuration

Deploy and manage OSSEC Host-based Intrusion Detection System (HIDS) across multiple servers with centralized monitoring, automated agent configuration, and real-time security event processing for enterprise-scale infrastructure protection.

45 min 4 distros 182 views
devops Intermediate

Configure Kubernetes pod disruption budgets for high availability with policy enforcement

Learn to configure PodDisruptionBudget resources in Kubernetes to maintain application availability during voluntary disruptions. This tutorial covers creating disruption budgets, implementing policies for different workload types, and monitoring disruption events with kubectl.

45 min 4 distros 187 views
monitoring Advanced

Integrate OpenTelemetry with ELK stack for unified observability and distributed tracing

Set up a comprehensive observability stack by integrating OpenTelemetry Collector with Elasticsearch, Logstash, and Kibana for distributed tracing, metrics collection, and unified monitoring across microservices and applications.

45 min 4 distros 123 views
networking Intermediate

Install and configure Squid 6 proxy server with bandwidth controls and content filtering

Set up Squid 6 proxy server with advanced traffic shaping, content filtering, and user authentication. Configure bandwidth limits, access control lists, and comprehensive logging for enterprise proxy deployments.

45 min 4 distros 101 views
monitoring Intermediate

Set up multi-location monitoring with distributed Uptime Kuma instances

Deploy multiple Uptime Kuma instances across different geographic locations to monitor your services from various vantage points. This setup provides comprehensive monitoring coverage, reduces false positives, and enables regional performance analysis with centralized alerting.

45 min 4 distros 133 views
security Intermediate

Setup Nginx with ModSecurity 3 web application firewall for advanced threat protection

Configure Nginx with ModSecurity 3 and OWASP Core Rule Set to protect web applications against SQL injection, XSS, and other common attacks. This tutorial covers complete WAF setup with security rules, performance optimization, and threat testing.

45 min 4 distros 171 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer