Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingInstall and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications
hostingSet up Node.js application security with Helmet and rate limiting
securityInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesRecently published
Configure FRRouting route maps and prefix lists for advanced routing policies
networkingConfigure Jetty clustering and session replication for high availability
hostingConfigure Cherokee web server with MySQL database optimization and performance tuning
hostingConfigure Cassandra SSL encryption and authentication with security hardening
databasesInstall and configure ntopng for comprehensive network monitoring with traffic analysis and real-time dashboards
networkingSet up centralized security monitoring with ClamAV 1.4 and Elasticsearch 8
Build a comprehensive security monitoring infrastructure with ClamAV antivirus scanning, Elasticsearch log storage, and automated threat detection. This setup provides real-time malware scanning with centralized log aggregation for enterprise security compliance.
Set up PostgreSQL 17 streaming replication with PgBouncer connection pooling and load balancing
Configure PostgreSQL 17 with streaming replication for high availability, then add PgBouncer connection pooling with intelligent load balancing across primary and replica servers for production-grade database infrastructure.
Implement Tailscale OAuth integration with identity providers for enterprise authentication
Configure Tailscale with enterprise identity providers including SAML and OIDC authentication, implement access control policies, and manage users across distributed teams for secure zero-trust networking.
Implement network monitoring with SNMP and BGP metrics using FRRouting and Prometheus
Set up comprehensive network monitoring with SNMP daemon, FRRouting BGP metrics, and Prometheus collection for real-time infrastructure visibility and alerting.
Configure BIRD BGP routing daemon for advanced routing policies and network automation
Set up BIRD 2.15 BGP daemon with advanced routing policies, route filtering, and automated network management. Configure BGP peering, implement complex routing decisions, and set up route aggregation for production networks.
Integrate Apache Tomcat 11 with Prometheus and Grafana monitoring for comprehensive performance tracking
Set up comprehensive monitoring for Apache Tomcat 11 using JMX Prometheus Java agent, configure Prometheus to scrape metrics, create detailed Grafana dashboards, and implement alerting rules for performance tracking and health monitoring.
Configure Loki and Promtail for centralized Docker log aggregation and analysis
Set up Grafana Loki and Promtail to collect, aggregate, and analyze logs from Docker containers. Configure retention policies, integrate with Grafana for visualization, and enable real-time log monitoring across your infrastructure.
Configure Elasticsearch 8 cross-cluster replication for disaster recovery
Set up cross-cluster replication between Elasticsearch 8 clusters to ensure data resilience and business continuity. This advanced configuration creates automatic data synchronization across geographically distributed clusters for disaster recovery scenarios.
Configure SonarQube quality gates and custom rules for enterprise code analysis
Set up SonarQube quality gates with custom conditions and coding rules to enforce enterprise-grade code quality standards. Configure LDAP authentication and integrate with CI/CD pipelines for automated code analysis workflows.
Set up Consul multi-datacenter replication with ACL token replication
Configure Consul WAN federation across multiple datacenters with secure ACL token replication. Enable automatic token synchronization, gossip encryption, and cross-datacenter service discovery for distributed infrastructure.
Integrate AWX 24.6 with HashiCorp Vault for dynamic secrets management and secure automation workflows
Configure AWX to securely retrieve database credentials and API keys from HashiCorp Vault using dynamic secrets that automatically rotate. Set up credential types, database engines, and secure playbook execution with centralized secrets management.
Configure Zabbix 7 email and SMS alerting with escalation rules and notification automation
Set up comprehensive alerting in Zabbix 7 with email notifications, SMS gateway integration, and automated escalation chains. Configure media types, user groups, and action filters for effective incident response workflows.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer