Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingInstall and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications
hostingSet up Node.js application security with Helmet and rate limiting
securityConfigure Linux kernel parameters for container workloads with sysctl optimization
linuxRecently published
Configure SSH two-factor authentication with Google Authenticator TOTP
securityMonitor Cherokee web server performance with Grafana and Prometheus metrics collection
monitoringMonitor OSPF network topology with Prometheus and Grafana dashboards
networkingMonitor ScyllaDB cluster with Prometheus and Grafana for comprehensive performance tracking
monitoringMonitor Jetty performance with JMX and Grafana dashboards
monitoringImplement Apache log analysis with GoAccess and ELK stack for real-time monitoring
Set up comprehensive Apache log monitoring with GoAccess for real-time analysis and ELK stack for centralized log processing, creating powerful Kibana dashboards for web server insights and automated alerting.
Configure Apache reverse proxy and load balancing for high availability
Set up Apache as a reverse proxy with load balancing across multiple backend servers. Configure health checks, SSL termination, and failover for production high availability deployments.
Configure ELK stack for centralized logging with Elasticsearch 8, Logstash 8, and Kibana 8
Set up a production-grade ELK stack with Elasticsearch 8, Logstash 8, and Kibana 8 for centralized log management. Configure authentication, SSL encryption, and log processing pipelines across multiple data sources.
Configure Elasticsearch 8 cross-cluster replication for disaster recovery
Set up cross-cluster replication between Elasticsearch 8 clusters to ensure data resilience and business continuity. This advanced configuration creates automatic data synchronization across geographically distributed clusters for disaster recovery scenarios.
Implement Airflow DAG security scanning with Bandit and safety checks
Set up automated security scanning for Apache Airflow DAGs using Bandit for Python code analysis and Safety for vulnerability detection. Configure pre-commit hooks and CI/CD integration for continuous security monitoring.
Configure Kubernetes OpenTelemetry auto-instrumentation for microservices observability
Set up OpenTelemetry Operator in Kubernetes to automatically instrument microservices with distributed tracing. Enable seamless observability across your application stack without modifying application code.
Set up ELK stack alerting with Watcher and email notifications for monitoring and incident response
Configure Elasticsearch Watcher to monitor log data and automatically send email alerts when critical system events occur. Create sophisticated alert conditions, manage email notification templates, and set up automated incident response workflows.
Implement container security monitoring with Falco runtime detection
Set up Falco for real-time container security monitoring with runtime threat detection, Kubernetes integration, and automated alerting through Grafana dashboards.
Configure NGINX rate limiting and advanced security rules for DDoS protection
Configure NGINX with comprehensive rate limiting, connection throttling, and advanced security headers to protect your web applications from DDoS attacks and malicious traffic. Learn to implement zone-based rate limiting, geographic blocking, and real-time monitoring for production environments.
Set up OpenTelemetry custom instrumentation and metrics collection with Prometheus integration
Configure OpenTelemetry Collector with custom metrics exporters and processors, set up application instrumentation with SDKs, and integrate with Prometheus and Grafana for comprehensive distributed system monitoring and observability.
Configure Airflow DAG security and isolation with RBAC policies
Set up comprehensive security for Apache Airflow with role-based access control, DAG-level permissions, and resource isolation. Configure user authentication, implement fine-grained security policies, and establish monitoring for production-grade workflow orchestration.
Set up OSSEC agent deployment and centralized management with automated configuration
Deploy and manage OSSEC Host-based Intrusion Detection System (HIDS) across multiple servers with centralized monitoring, automated agent configuration, and real-time security event processing for enterprise-scale infrastructure protection.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer