Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

databases Advanced

Set up Redis 7 cluster with multiple master nodes for high availability and horizontal scaling

Configure a production-ready Redis 7 cluster with multiple master nodes and replicas for high availability, automatic failover, and horizontal data distribution. Includes cluster initialization, topology configuration, and comprehensive health monitoring.

45 min 4 distros 114 views
security Advanced

Configure Airflow DAG security and isolation with RBAC policies

Set up comprehensive security for Apache Airflow with role-based access control, DAG-level permissions, and resource isolation. Configure user authentication, implement fine-grained security policies, and establish monitoring for production-grade workflow orchestration.

45 min 4 distros 179 views
security Intermediate

Set up OSSEC agent deployment and centralized management with automated configuration

Deploy and manage OSSEC Host-based Intrusion Detection System (HIDS) across multiple servers with centralized monitoring, automated agent configuration, and real-time security event processing for enterprise-scale infrastructure protection.

45 min 4 distros 182 views
devops Intermediate

Configure Kubernetes pod disruption budgets for high availability with policy enforcement

Learn to configure PodDisruptionBudget resources in Kubernetes to maintain application availability during voluntary disruptions. This tutorial covers creating disruption budgets, implementing policies for different workload types, and monitoring disruption events with kubectl.

45 min 4 distros 199 views
networking Intermediate

Install and configure Squid 6 proxy server with bandwidth controls and content filtering

Set up Squid 6 proxy server with advanced traffic shaping, content filtering, and user authentication. Configure bandwidth limits, access control lists, and comprehensive logging for enterprise proxy deployments.

45 min 4 distros 101 views
monitoring Intermediate

Set up multi-location monitoring with distributed Uptime Kuma instances

Deploy multiple Uptime Kuma instances across different geographic locations to monitor your services from various vantage points. This setup provides comprehensive monitoring coverage, reduces false positives, and enables regional performance analysis with centralized alerting.

45 min 4 distros 136 views
security Intermediate

Setup Nginx with ModSecurity 3 web application firewall for advanced threat protection

Configure Nginx with ModSecurity 3 and OWASP Core Rule Set to protect web applications against SQL injection, XSS, and other common attacks. This tutorial covers complete WAF setup with security rules, performance optimization, and threat testing.

45 min 4 distros 173 views
security Advanced

Implement HAProxy WAF integration with ModSecurity 3 for advanced threat protection

Configure HAProxy with ModSecurity 3 using SPOE protocol to create a high-performance web application firewall that protects against OWASP Top 10 threats while maintaining load balancing capabilities.

45 min 4 distros 179 views
monitoring Advanced

Integrate Zabbix 7 with network automation and orchestration tools using Ansible and Python APIs

Build comprehensive network automation workflows by integrating Zabbix 7 monitoring with Ansible playbooks and custom Python scripts. This tutorial covers API authentication, automated host provisioning, and dynamic monitoring configuration for enterprise infrastructure management.

45 min 4 distros 159 views
networking Advanced

Set up iptables high availability clustering with keepalived for automatic failover

Configure a highly available firewall cluster using iptables and keepalived with VRRP for automatic failover. Set up rule synchronization between nodes and implement monitoring for production-grade firewall redundancy.

45 min 4 distros 175 views
security Intermediate

Set up centralized logging with rsyslog and logrotate for security events

Configure a centralized rsyslog server to collect security events from multiple systems, implement automated log rotation with logrotate, and set up filtering and alerting for critical security incidents across your infrastructure.

45 min 4 distros 159 views
performance Advanced

Optimize Linux RAID configuration for maximum disk performance with mdadm and advanced tuning

Learn how to configure and optimize Linux RAID arrays with mdadm for maximum disk performance. This comprehensive guide covers RAID level selection, advanced mdadm parameters, kernel I/O scheduler optimization, and file system tuning for high-throughput workloads.

45 min 4 distros 333 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer