Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingSet up Node.js application security with Helmet and rate limiting
securityInstall and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications
hostingInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesRecently published
Configure Cherokee web server with MySQL database optimization and performance tuning
hostingConfigure Cassandra SSL encryption and authentication with security hardening
databasesInstall and configure ntopng for comprehensive network monitoring with traffic analysis and real-time dashboards
networkingOptimize Cassandra data modeling and query performance with advanced tuning and monitoring
databasesMonitor system time drift with Prometheus and Grafana alerts
monitoringImplement container security monitoring with Falco runtime detection
Set up Falco for real-time container security monitoring with runtime threat detection, Kubernetes integration, and automated alerting through Grafana dashboards.
Deploy Deno applications with Docker containers and production optimization
Learn how to containerize Deno applications with Docker using multi-stage builds, security hardening, and production-ready configuration. This tutorial covers creating optimized Dockerfiles, implementing proper caching strategies, and deploying with Docker Compose for scalable web applications.
Monitor container performance with Prometheus and cAdvisor for comprehensive metrics collection
Set up comprehensive container monitoring with cAdvisor, Prometheus, and Grafana to collect detailed metrics on CPU, memory, network, and disk usage. This tutorial covers installation, configuration, and alerting for production-ready container performance monitoring.
Configure Linux kernel parameters for container workloads with sysctl optimization
Configure Linux kernel parameters for optimal container performance with sysctl tuning. This guide covers memory management, network stack optimization, file descriptor limits, and security parameters for Docker and Podman workloads.
Configure AppArmor security profiles for web servers and databases with custom policy enforcement
Set up mandatory access control for Nginx, Apache, MySQL, and PostgreSQL using AppArmor security profiles. Learn to create custom policies, debug profile violations, and implement advanced enforcement for production web servers and databases.
Integrate SonarQube with Kubernetes security scanning workflows for continuous code quality analysis
Set up SonarQube scanner in Kubernetes pods with admission controllers for automated security scanning. Configure CI/CD pipeline integration and security reporting for continuous code quality analysis in containerized environments.
Implement Kubernetes admission controllers with OPA Gatekeeper for policy enforcement
Set up OPA Gatekeeper admission controllers to enforce security policies, resource governance, and compliance rules across your Kubernetes cluster with custom constraint templates.
Secure Podman containers with SELinux and AppArmor mandatory access controls
Implement mandatory access controls for Podman containers using SELinux on Red Hat-based systems and AppArmor on Debian-based systems. Learn to configure security policies, monitor violations, and harden container security with production-grade controls.
Install and configure Podman for rootless containers on Linux
Learn to install Podman and configure rootless containers as a secure Docker alternative. Includes Docker Compose migration, systemd integration, and troubleshooting common permission issues.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer