Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Intermediate

Setup remote backup storage with S3-compatible encryption and automated retention policies

Configure secure, encrypted backup storage using S3-compatible providers with automated retention policies, client-side GPG encryption, and monitoring scripts for reliable data protection.

45 min 4 distros 329 views
security Advanced

Configure advanced iptables rules for bridge network security and container isolation

Implement comprehensive bridge network security using advanced iptables rules to isolate containers, control traffic flow, and prevent lateral movement in virtualized environments.

45 min 4 distros 305 views
hosting Intermediate

Configure Cherokee web server reverse proxy and load balancing with SSL

Set up Cherokee web server with reverse proxy capabilities, load balancing across backend servers, and SSL encryption for high-performance production environments.

45 min 4 distros 294 views
networking Intermediate

Configure NTP server with chrony and security hardening for precise time synchronization

Set up a production-grade NTP server using chrony with client access controls, firewall rules, and security hardening. Learn to configure upstream time sources, implement monitoring, and troubleshoot common synchronization issues.

35 min 4 distros 358 views
monitoring Advanced

Set up Jaeger high availability clustering with load balancing and failover

Deploy a production-grade Jaeger distributed tracing cluster with Elasticsearch backend, load-balanced collectors, and automatic failover for enterprise-scale microservices monitoring.

45 min 4 distros 287 views
devops Advanced

Integrate Nexus Repository with Kubernetes and Docker registry authentication

Set up Nexus Repository Manager as a private Docker registry integrated with Kubernetes clusters, configure secure authentication and authorization, and enable automated container image deployment with RBAC controls.

45 min 4 distros 407 views
databases Advanced

Set up Spark 3.5 Delta Lake with MinIO for ACID transactions and big data analytics

Configure Apache Spark 3.5 with Delta Lake and MinIO object storage for ACID transactions, data versioning, and distributed analytics processing. Includes complete setup for production-grade data lake architecture.

45 min 4 distros 284 views
databases Advanced

Configure MariaDB 11.6 master-slave replication with SSL encryption and automatic failover

Set up production-grade MariaDB master-slave replication with SSL/TLS encryption for secure data transmission and MaxScale for automatic failover and load balancing.

45 min 4 distros 208 views
networking Intermediate

Setup Caddy with Consul service discovery for dynamic load balancing

Configure Caddy web server to automatically discover backend services through Consul, enabling dynamic load balancing without manual configuration updates. This setup provides high availability and automatic failover for microservices architectures.

45 min 4 distros 241 views
networking Advanced

Configure OSPF with FRRouting 10 for dynamic routing protocols and network failover

Set up OSPF dynamic routing with FRRouting 10 for automatic network failover and route redistribution. Configure area authentication, routing policies, and monitoring for enterprise network resilience.

45 min 4 distros 204 views
devops Intermediate

Deploy Deno applications with Docker containers and production optimization

Learn how to containerize Deno applications with Docker using multi-stage builds, security hardening, and production-ready configuration. This tutorial covers creating optimized Dockerfiles, implementing proper caching strategies, and deploying with Docker Compose for scalable web applications.

35 min 4 distros 215 views
security Intermediate

Configure Apache rate limiting and DDoS protection with mod_security and mod_evasive

Set up comprehensive Apache protection against DDoS attacks and malicious traffic using mod_evasive for rate limiting, mod_security with OWASP rules for web application firewall capabilities, and fail2ban integration for automated IP blocking.

25 min 4 distros 225 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer