Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

hosting Beginner

Install and configure Bun JavaScript runtime with systemd and reverse proxy

Deploy Bun JavaScript runtime on Linux with automatic service management through systemd and secure SSL reverse proxy configuration with Nginx for production applications.

25 min 6 distros 109 views
linux Beginner

Configure Linux process monitoring with top, htop, and btop for system performance analysis

Master Linux process monitoring using top, htop, and btop to analyze system performance, identify resource bottlenecks, and troubleshoot performance issues in production environments.

25 min 6 distros 135 views
linux Beginner

Configure Linux system services with systemctl and service management

Learn to manage Linux system services with systemctl commands, enable services on boot, create custom service files, and troubleshoot service failures with journalctl for reliable system administration.

25 min 6 distros 123 views
security Advanced

Set up Grafana Enterprise SSO authentication with LDAP, SAML, and OAuth2 integration

Configure Grafana Enterprise with comprehensive single sign-on authentication supporting LDAP, SAML, and OAuth2 providers. Set up role-based access control with automated team mapping and user provisioning for enterprise environments.

45 min 4 distros 106 views
monitoring Intermediate

Set up ELK stack alerting with Watcher and email notifications for monitoring and incident response

Configure Elasticsearch Watcher to monitor log data and automatically send email alerts when critical system events occur. Create sophisticated alert conditions, manage email notification templates, and set up automated incident response workflows.

45 min 4 distros 77 views
linux Intermediate

Implement Linux resource quotas with systemd and automated enforcement

Configure systemd resource control and cgroups v2 to implement CPU, memory, and I/O quotas with automated enforcement. Set up monitoring and alerts for resource violations across production workloads.

45 min 4 distros 176 views
security Intermediate

Implement container security monitoring with Falco runtime detection

Set up Falco for real-time container security monitoring with runtime threat detection, Kubernetes integration, and automated alerting through Grafana dashboards.

45 min 4 distros 121 views
security Advanced

Configure Keycloak OAuth2 integration with OpenResty for enterprise SSO

Set up enterprise single sign-on by integrating Keycloak OAuth2 authentication with OpenResty using lua-resty-openidc. Configure secure authentication flows, JWT token validation, and session management for production web applications.

45 min 4 distros 97 views
security Intermediate

Configure intrusion detection with OSSEC and Wazuh for real-time security monitoring

Set up comprehensive host-based intrusion detection with OSSEC HIDS and Wazuh manager for real-time security monitoring, file integrity checking, and automated threat response across your infrastructure.

45 min 4 distros 105 views
databases Intermediate

Configure MongoDB 8.0 replica set with automatic failover for high availability

Set up a MongoDB 8.0 replica set with multiple nodes and automatic failover to ensure high availability and data redundancy. This configuration provides seamless database operations even when primary nodes fail.

45 min 4 distros 100 views
linux Intermediate

Implement Linux memory cgroups for container workload isolation

Configure cgroups v2 memory subsystem to isolate container workloads with precise memory limits, monitoring, and automated enforcement for production environments.

45 min 4 distros 97 views
linux Intermediate

Configure Linux user session limits with systemd and pam_limits for resource management

Learn to set up comprehensive user session resource limits using both traditional pam_limits.conf and modern systemd user slices. This tutorial covers memory, CPU, and process limits to prevent resource exhaustion on multi-user systems.

25 min 4 distros 82 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer