Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Install and configure Deno for web development with systemd and reverse proxy
hostingInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingInstall and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications
hostingInstall and configure Ollama for local AI models on Linux servers
devopsConfigure Linux system time synchronization with chrony and NTP hardening
linuxRecently published
Configure Kubernetes network policies for enhanced cluster security
securitySet up Kubernetes persistent volume snapshots and backup automation
devopsImplement Kafka Streams exactly-once processing semantics with Java applications
devopsImplement ClickHouse backup automation with compression and S3 integration
databasesInstall and configure Filebeat 8.15 for efficient log shipping to ELK stack
monitoringConfigure SELinux mandatory access controls for enhanced security
Set up SELinux on Ubuntu and Debian systems, configure security modes and policies, create custom application rules, and implement comprehensive monitoring for enhanced Linux security hardening.
Set up development database environments with environment variables
Learn to configure PostgreSQL, MySQL, and MariaDB development databases using environment variables for secure connection management and simplified configuration across different environments.
Configure systemd user services for application startup
Learn how to configure systemd user services to automatically start applications without root privileges. This guide covers creating service units, managing lifecycle, and troubleshooting user services for reliable application startup.
Implement Linux file system encryption with LUKS and cryptsetup
Encrypt Linux file systems and partitions using LUKS (Linux Unified Key Setup) with cryptsetup tools. Configure encrypted storage, manage encryption keys, and implement backup procedures for production environments.
Configure ScyllaDB SSL encryption and authentication with certificate management and security hardening
Secure your ScyllaDB cluster with comprehensive SSL/TLS encryption for client connections and inter-node communication. This tutorial covers certificate generation, authentication setup, and production security hardening.
Configure SSH certificate authentication with CA signing for secure server access
Set up SSH certificate-based authentication using a Certificate Authority to eliminate individual key management. Create signed user certificates that provide secure, scalable access control for multiple servers and users.
Configure SSH two-factor authentication with Google Authenticator TOTP
Add an extra layer of security to SSH logins by requiring both a password and a time-based one-time password (TOTP) generated by Google Authenticator or compatible apps.
Monitor OSPF network topology with Prometheus and Grafana dashboards
Set up comprehensive OSPF network monitoring using FRRouting, Prometheus SNMP exporter, and Grafana dashboards to track network topology changes, LSA states, and routing convergence in real-time.
Configure Cherokee web server with MySQL database optimization and performance tuning
Set up Cherokee web server with optimized MySQL database connections, FastCGI configuration, and performance tuning for high-traffic web applications on Linux systems.
Configure Cassandra SSL encryption and authentication with security hardening
Set up comprehensive SSL/TLS encryption for Apache Cassandra with client-to-node and node-to-node security, certificate management, and production-grade authentication hardening.
Optimize Cassandra data modeling and query performance with advanced tuning and monitoring
Master advanced Cassandra optimization with data modeling best practices, partition strategies, JVM tuning, and comprehensive monitoring. Learn to design efficient schemas, optimize queries, and implement Prometheus integration for production-grade performance.
Configure systemd service resource limits and security isolation
Configure cgroups v2 resource limits and security isolation for systemd services to prevent resource exhaustion and improve system security. This tutorial covers memory, CPU, and I/O limits with monitoring and troubleshooting.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer