Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Install and configure CockroachDB cluster with high availability and distributed SQL
databasesInstall and configure ArgoCD for GitOps continuous deployment with RBAC and SSL
devopsInstall and configure Loki for centralized log aggregation with Grafana integration
monitoringInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesInstall and configure WireGuard VPN server with client management
networkingRecently published
Advanced Nomad job templates and deployment strategies with rolling updates and canary deployments
devopsConfigure Linux system performance monitoring with sar and sysstat for real-time metrics collection
monitoringSet up ClickHouse monitoring with Prometheus and Grafana dashboards
monitoringConfigure advanced Consul ACL policies for production security hardening
securityConfigure Kibana 8 advanced security with field-level restrictions and role-based access control
securityMonitor system resources with Netdata real-time performance dashboard
Set up Netdata for comprehensive real-time monitoring of CPU, memory, disk, and network resources with a web-based dashboard, email alerts, and customizable thresholds.
Configure Linux file permissions and access control with umask and chmod best practices
Learn how to configure secure Linux file permissions using chmod, set default permissions with umask, and implement proper access control to prevent security vulnerabilities while fixing permission denied errors.
Configure network bridge interfaces for VM networking and container communication
Set up Linux network bridges to enable communication between virtual machines, containers, and physical networks. Configure bridge interfaces using netplan, bridge utilities, and implement security policies for production environments.
Configure Tailscale mesh VPN with subnet routing and ACL policies for secure network access
Set up a zero-trust mesh VPN network with Tailscale that includes subnet routing for local network access, granular ACL policies for security, and exit nodes for secure internet access.
Configure Linux system backup automation with rsync and systemd timers
Set up automated Linux system backups using rsync with SSH authentication, systemd timers for scheduling, retention policies, email notifications, and monitoring. Perfect for production environments requiring reliable backup automation.
Optimize HAProxy performance with connection pooling and advanced load balancing algorithms
Configure HAProxy with connection pooling, advanced load balancing algorithms, and performance tuning for high-throughput workloads. Learn to implement least-conn, URI hashing, and buffer optimization.
Configure Zabbix SNMP monitoring for network devices with automated discovery and templates
Set up comprehensive SNMP monitoring for network devices using Zabbix with automated discovery rules, custom templates, and intelligent alerting. Learn to monitor switches, routers, and other network equipment with performance triggers and detailed reporting.
Configure Consul Connect service mesh with Envoy proxy for secure microservices communication
Set up Consul Connect service mesh with Envoy sidecar proxies to enable secure, encrypted service-to-service communication with mutual TLS authentication, traffic policies, and observability for your microservices architecture.
Configure ZooKeeper for ClickHouse replication with multi-node cluster setup
Set up a production-ready ZooKeeper ensemble to enable ClickHouse replication across multiple nodes. This tutorial covers ZooKeeper cluster configuration, ClickHouse integration, security hardening, and failover testing.
Install and configure Nomad for container orchestration with Consul integration
Set up HashiCorp Nomad cluster with Consul service discovery for production container orchestration. Learn job scheduling, ACL security, TLS encryption, and monitoring deployment.
Install and configure Consul for service discovery with clustering and security
Set up HashiCorp Consul for distributed service discovery with a secure three-node cluster, ACL authentication, and encrypted communication for production microservices environments.
Install and configure Vault for secrets management with high availability
Set up HashiCorp Vault with Consul backend for production-grade secrets management. Configure clustering, authentication, policies, and security hardening for enterprise environments.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer