Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Intermediate

Implement Linux security hardening with CIS benchmarks and automated compliance scanning

Harden your Linux systems using CIS benchmarks with automated compliance scanning and continuous monitoring. Learn to implement security controls for filesystem permissions, user authentication, network policies, and maintain ongoing compliance with industry standards.

45 min 4 distros 11 views
security Intermediate

Configure NGINX rate limiting and DDoS protection with advanced security rules

Set up NGINX rate limiting modules, implement connection limits, and configure geographic blocking to protect your web applications from DDoS attacks and abuse.

25 min 4 distros 7 views
security Advanced

Configure advanced iptables firewall rules with logging, port knocking, and DDoS protection

Build a production-grade iptables firewall with connection tracking, rate limiting, and port knocking. Includes automated DDoS protection, detailed logging, and security hardening for enterprise environments.

45 min 4 distros 47 views
security Intermediate

Set up SSH bastion host with jump server configuration for secure network access

Configure an SSH bastion host to secure access to private networks, implementing jump server functionality with key-based authentication and access controls for enhanced security.

25 min 4 distros 74 views
monitoring Intermediate

Set up NGINX monitoring with Prometheus and Grafana for web server observability

Monitor your NGINX web server performance and health with Prometheus metrics collection and Grafana dashboards. Set up comprehensive observability including request rates, response times, error tracking, and automated alerting for production web servers.

45 min 4 distros 70 views
security Intermediate

Implement container security monitoring with Falco runtime detection

Set up Falco for real-time container security monitoring with runtime threat detection, Kubernetes integration, and automated alerting through Grafana dashboards.

45 min 4 distros 121 views
security Intermediate

Configure intrusion detection with OSSEC and Wazuh for real-time security monitoring

Set up comprehensive host-based intrusion detection with OSSEC HIDS and Wazuh manager for real-time security monitoring, file integrity checking, and automated threat response across your infrastructure.

45 min 4 distros 104 views
linux Intermediate

Configure Linux user session limits with systemd and pam_limits for resource management

Learn to set up comprehensive user session resource limits using both traditional pam_limits.conf and modern systemd user slices. This tutorial covers memory, CPU, and process limits to prevent resource exhaustion on multi-user systems.

25 min 4 distros 80 views
monitoring Advanced

Install and configure Graylog 5 for centralized log management with MongoDB and Elasticsearch

Set up Graylog 5 with MongoDB 8.0 and Elasticsearch 8 for centralized log collection, analysis, and alerting. Learn to configure secure inputs, data streams, and monitoring for production environments.

45 min 4 distros 105 views
security Intermediate

Configure SSH port forwarding and tunneling for secure connections

Learn to configure SSH port forwarding, remote tunnels, and SOCKS proxy for secure network connections. Set up local, remote, and dynamic port forwarding with automated monitoring and security hardening.

35 min 4 distros 110 views
hosting Intermediate

Configure Lighttpd 1.4 with multiple virtual hosts and subdomains

Set up Lighttpd web server with multiple virtual hosts, subdomain routing, SSL certificates, and performance optimization for hosting multiple websites on a single server with security hardening.

45 min 4 distros 96 views
security Advanced

Configure Airflow DAG security and isolation with RBAC policies

Set up comprehensive security for Apache Airflow with role-based access control, DAG-level permissions, and resource isolation. Configure user authentication, implement fine-grained security policies, and establish monitoring for production-grade workflow orchestration.

45 min 4 distros 156 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer