Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Intermediate

Configure SELinux mandatory access controls for enhanced security

Set up SELinux on Ubuntu and Debian systems, configure security modes and policies, create custom application rules, and implement comprehensive monitoring for enhanced Linux security hardening.

45 min 4 distros 63 views
databases Beginner

Set up development database environments with environment variables

Learn to configure PostgreSQL, MySQL, and MariaDB development databases using environment variables for secure connection management and simplified configuration across different environments.

25 min 4 distros 65 views
linux Intermediate

Configure systemd user services for application startup

Learn how to configure systemd user services to automatically start applications without root privileges. This guide covers creating service units, managing lifecycle, and troubleshooting user services for reliable application startup.

25 min 4 distros 120 views
security Intermediate

Implement Linux file system encryption with LUKS and cryptsetup

Encrypt Linux file systems and partitions using LUKS (Linux Unified Key Setup) with cryptsetup tools. Configure encrypted storage, manage encryption keys, and implement backup procedures for production environments.

25 min 4 distros 113 views
databases Advanced

Configure ScyllaDB SSL encryption and authentication with certificate management and security hardening

Secure your ScyllaDB cluster with comprehensive SSL/TLS encryption for client connections and inter-node communication. This tutorial covers certificate generation, authentication setup, and production security hardening.

45 min 4 distros 101 views
security Advanced

Configure SSH certificate authentication with CA signing for secure server access

Set up SSH certificate-based authentication using a Certificate Authority to eliminate individual key management. Create signed user certificates that provide secure, scalable access control for multiple servers and users.

45 min 4 distros 89 views
security Intermediate

Configure SSH two-factor authentication with Google Authenticator TOTP

Add an extra layer of security to SSH logins by requiring both a password and a time-based one-time password (TOTP) generated by Google Authenticator or compatible apps.

25 min 4 distros 94 views
networking Advanced

Monitor OSPF network topology with Prometheus and Grafana dashboards

Set up comprehensive OSPF network monitoring using FRRouting, Prometheus SNMP exporter, and Grafana dashboards to track network topology changes, LSA states, and routing convergence in real-time.

45 min 4 distros 151 views
hosting Intermediate

Configure Cherokee web server with MySQL database optimization and performance tuning

Set up Cherokee web server with optimized MySQL database connections, FastCGI configuration, and performance tuning for high-traffic web applications on Linux systems.

45 min 4 distros 64 views
databases Advanced

Configure Cassandra SSL encryption and authentication with security hardening

Set up comprehensive SSL/TLS encryption for Apache Cassandra with client-to-node and node-to-node security, certificate management, and production-grade authentication hardening.

45 min 4 distros 78 views
databases Advanced

Optimize Cassandra data modeling and query performance with advanced tuning and monitoring

Master advanced Cassandra optimization with data modeling best practices, partition strategies, JVM tuning, and comprehensive monitoring. Learn to design efficient schemas, optimize queries, and implement Prometheus integration for production-grade performance.

45 min 4 distros 107 views
linux Intermediate

Configure systemd service resource limits and security isolation

Configure cgroups v2 resource limits and security isolation for systemd services to prevent resource exhaustion and improve system security. This tutorial covers memory, CPU, and I/O limits with monitoring and troubleshooting.

35 min 4 distros 139 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer