Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxInstall and configure CockroachDB cluster with high availability and distributed SQL
databasesInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesConfigure network interface monitoring with ICMP ping and connectivity testing
networkingInstall and configure ArgoCD for GitOps continuous deployment with RBAC and SSL
devopsRecently published
Monitor nginx performance with Prometheus and Grafana using nginx-prometheus-exporter
monitoringIntegrate WireGuard VPN server with LDAP authentication for enterprise user management
securitySetup Tekton Pipelines 0.62 for Kubernetes CI/CD with security scanning integration
devopsConfigure Loki and Promtail for centralized Docker log aggregation and analysis
monitoringIntegrate SonarQube with Jenkins pipeline for automated code quality checks
devopsIntegrate Nagios Core 4.5 with Grafana dashboards for advanced monitoring visualization
Connect Nagios Core 4.5 with Grafana through NDOUtils and MySQL to create powerful monitoring dashboards. This integration provides advanced visualization capabilities, real-time alerting, and comprehensive monitoring insights for your infrastructure.
Implement Apache web application firewall with ModSecurity 3 and OWASP Core Rule Set
Deploy ModSecurity 3 as an Apache module with OWASP Core Rule Set to protect web applications from common attacks. Configure real-time logging, custom rules, and automated threat detection for production environments.
Set up Kibana alerting and monitoring with Elasticsearch Watcher for automated threat detection
Configure Kibana alerting rules and Elasticsearch Watcher to automatically detect security threats and send notifications via email or Slack. Set up monitoring dashboards with automated responses for production security monitoring.
Configure Jaeger data retention policies and automated archiving with Elasticsearch backend
Learn to configure Jaeger data retention policies with Elasticsearch backend for automated trace archiving. This tutorial covers index lifecycle management, storage optimization, and performance monitoring to prevent disk space issues while maintaining observability requirements.
Set up Redis monitoring with Prometheus and Grafana dashboards
Configure comprehensive Redis monitoring using Prometheus Redis Exporter and Grafana dashboards. Monitor Redis performance metrics, memory usage, connections, and replication status with automated alerts for production environments.
Configure Node.js application logging with Winston and log rotation for production
Set up Winston logger with structured JSON logging, multiple transports, and automated log rotation using winston-daily-rotate-file for production Node.js applications. Configure comprehensive error handling and log management best practices.
Set up Jaeger high availability clustering with load balancing and failover
Deploy a production-grade Jaeger distributed tracing cluster with Elasticsearch backend, load-balanced collectors, and automatic failover for enterprise-scale microservices monitoring.
Configure Apache rate limiting and DDoS protection with mod_security and mod_evasive
Set up comprehensive Apache protection against DDoS attacks and malicious traffic using mod_evasive for rate limiting, mod_security with OWASP rules for web application firewall capabilities, and fail2ban integration for automated IP blocking.
Implement Elasticsearch 8 index lifecycle management and retention policies
Configure automated index lifecycle management (ILM) policies in Elasticsearch 8 to optimize storage, performance, and data retention. Learn to set up hot-warm-cold architectures with automatic rollover and deletion based on age and size criteria.
Configure ClamAV cluster scanning for high availability and enterprise threat detection
Build a production-grade ClamAV cluster with HAProxy load balancing, shared virus definitions, and comprehensive monitoring for enterprise-scale threat detection and high availability.
Monitor Linux system resources with performance alerts and automated responses
Set up comprehensive Linux system monitoring with Prometheus, Node Exporter, and Alertmanager to track CPU, memory, and disk usage with automated alerts and response scripts for proactive system management.
Configure Kibana LDAP authentication and RBAC with Active Directory integration
Set up secure Kibana authentication using Active Directory LDAP with role-based access control to manage user permissions and streamline enterprise login workflows. This tutorial covers Elasticsearch security configuration, LDAP realm setup, and user role mappings.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer