Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Intermediate

Configure SSH two-factor authentication with Google Authenticator TOTP

Add an extra layer of security to SSH logins by requiring both a password and a time-based one-time password (TOTP) generated by Google Authenticator or compatible apps.

25 min 4 distros 104 views
networking Intermediate

Install and configure ntopng for comprehensive network monitoring with traffic analysis and real-time dashboards

Set up ntopng to monitor network traffic in real-time with detailed analytics, bandwidth monitoring, and customizable dashboards. Learn to configure interface monitoring, traffic analysis rules, and alerting for complete network visibility.

45 min 4 distros 122 views
security Advanced

Integrate OSSEC with Splunk for centralized security monitoring and log analysis

Set up OSSEC HIDS with Splunk Universal Forwarder to centralize security events, create monitoring dashboards, and enable real-time threat correlation across your infrastructure.

45 min 4 distros 68 views
hosting Intermediate

Configure NGINX SSL termination with Redis session storage

Set up NGINX as an SSL termination proxy with Redis backend for session storage, enabling scalable load balancing and persistent user sessions across multiple application servers.

45 min 4 distros 79 views
security Advanced

Configure intrusion detection with OSSEC and fail2ban integration

Set up comprehensive intrusion detection by integrating OSSEC HIDS with fail2ban for automated threat response. This advanced configuration provides real-time monitoring, log analysis, and automated IP blocking for enhanced server security.

45 min 4 distros 83 views
security Intermediate

Configure OSSEC active response for automated threat blocking

Set up OSSEC active response to automatically block threats by configuring firewall rules, custom response scripts, and tuning response actions for real-time intrusion prevention.

25 min 4 distros 84 views
databases Advanced

Configure CockroachDB 24.3 multi-region deployment with high availability clustering

Deploy CockroachDB across multiple regions with automated failover, data locality controls, and production-grade security. Includes replication zones, load balancing, and disaster recovery strategies.

45 min 4 distros 187 views
security Intermediate

Set up Fail2ban with Cloudflare API integration for automatic IP blocking and enhanced security

Configure Fail2ban to automatically add malicious IPs to Cloudflare's firewall rules for enhanced protection. This tutorial covers installation, custom filters, API integration, and monitoring for comprehensive security automation across your infrastructure.

45 min 4 distros 103 views
linux Intermediate

Setup log aggregation with rsyslog and logrotate for centralized system monitoring

Configure rsyslog for centralized log collection across servers, implement advanced logrotate policies for automated retention, and set up remote log shipping with filtering for comprehensive system monitoring and audit compliance.

45 min 4 distros 91 views
security Intermediate

Configure SSH key authentication and security hardening

Replace password authentication with SSH keys and implement comprehensive security hardening including fail2ban, audit logging, and access controls to protect your Linux servers from unauthorized access and brute force attacks.

25 min 4 distros 79 views
security Intermediate

Configure PostgreSQL 17 SSL encryption and advanced security hardening

Set up SSL/TLS encryption, client certificate authentication, and comprehensive security policies for PostgreSQL 17. Includes audit logging, access controls, and firewall configuration for production environments.

45 min 4 distros 156 views
security Intermediate

Implement network security policies with iptables and firewalld for enterprise infrastructure protection

Configure enterprise-grade network security with iptables and firewalld, implementing zone-based policies, advanced rules, and comprehensive logging for production infrastructure protection.

45 min 4 distros 75 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer