Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Intermediate

Set up OSSEC agent deployment and centralized management with automated configuration

Deploy and manage OSSEC Host-based Intrusion Detection System (HIDS) across multiple servers with centralized monitoring, automated agent configuration, and real-time security event processing for enterprise-scale infrastructure protection.

45 min 4 distros 173 views
security Intermediate

Setup Nginx with ModSecurity 3 web application firewall for advanced threat protection

Configure Nginx with ModSecurity 3 and OWASP Core Rule Set to protect web applications against SQL injection, XSS, and other common attacks. This tutorial covers complete WAF setup with security rules, performance optimization, and threat testing.

45 min 4 distros 167 views
devops Intermediate

Configure SonarQube quality gates and automated project analysis with multi-language support

Set up custom SonarQube quality gates with automated project analysis for multiple programming languages. Configure SonarScanner integration, webhook notifications, and CI/CD pipeline automation for continuous code quality monitoring.

45 min 4 distros 168 views
monitoring Intermediate

Set up network monitoring with Nagios Core 4.5 and SNMP for infrastructure alerting

Configure Nagios Core 4.5 with SNMP monitoring to track network devices, servers, and services with automated alerting. Set up custom monitoring templates, notification systems, and dashboards for comprehensive infrastructure visibility.

45 min 4 distros 140 views
security Intermediate

Set up NGINX web application firewall with ModSecurity 3 and OWASP Core Rule Set

Configure a production-grade web application firewall using NGINX with ModSecurity 3 and OWASP Core Rule Set. Includes logging, monitoring, and fail2ban integration for comprehensive threat protection.

45 min 4 distros 255 views
monitoring Intermediate

Implement PHP application monitoring with New Relic and logging

Set up comprehensive PHP application monitoring using New Relic APM with custom metrics and error tracking. Configure structured logging with centralized collection and automated monitoring alerts.

45 min 4 distros 256 views
networking Intermediate

Configure WireGuard VPN with DNS filtering and ad blocking using Pi-hole and Unbound

Set up a secure WireGuard VPN server with integrated Pi-hole DNS filtering and Unbound recursive resolver for ad blocking and privacy protection. This configuration provides secure remote access while filtering malicious domains and advertisements.

45 min 4 distros 302 views
security Advanced

Set up intrusion detection with OSSEC HIDS and nftables integration for automated threat response

Configure OSSEC Host-based Intrusion Detection System with nftables firewall integration for real-time threat detection and automated response. Monitor system activity, detect intrusions, and automatically block malicious IPs using active response mechanisms.

45 min 4 distros 308 views
networking Intermediate

Implement SNMP device auto-discovery with network scanning and automated inventory management

Set up automated SNMP device discovery using nmap network scanning and Python scripts for dynamic inventory management. Integrate with Zabbix and Grafana for comprehensive network monitoring and visualization.

45 min 4 distros 413 views
security Intermediate

Implement Apache web application firewall with ModSecurity 3 and OWASP Core Rule Set

Deploy ModSecurity 3 as an Apache module with OWASP Core Rule Set to protect web applications from common attacks. Configure real-time logging, custom rules, and automated threat detection for production environments.

45 min 4 distros 371 views
security Intermediate

Implement HAProxy rate limiting and DDoS protection with advanced security rules

Configure HAProxy with comprehensive rate limiting, connection throttling, and DDoS protection using stick tables, ACLs, and advanced security rules to protect your applications from malicious traffic and ensure service availability.

45 min 4 distros 323 views
security Intermediate

Set up Node.js application security with Helmet and rate limiting

Secure your Node.js Express applications against common vulnerabilities with Helmet.js middleware and implement rate limiting to prevent abuse and DDoS attacks.

25 min 4 distros 744 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer