Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Install and configure Deno for web development with systemd and reverse proxy
hostingInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingInstall and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications
hostingInstall and configure Ollama for local AI models on Linux servers
devopsConfigure Linux system time synchronization with chrony and NTP hardening
linuxRecently published
Set up audit log analysis dashboard with Grafana and Prometheus for security monitoring
securityConfigure Redis 7 cluster sharding with SSL/TLS authentication and security hardening
databasesImplement backup rotation policies with automated cleanup using systemd timers and shell scripts
linuxOptimize OpenResty performance with advanced caching strategies and Lua optimization
performanceConfigure Linux audit system with SIEM integration for Splunk security monitoring
securityConfigure network-attached storage backup with NFS and encryption
Set up an encrypted NFS backup server with automated backup scripts and performance monitoring. Configure LUKS encryption, NFS exports, and centralized backup management for secure enterprise storage.
Configure advanced htop monitoring with custom scripts and alerting
Build a production-grade monitoring system using custom-compiled htop with automated process analysis scripts and multi-channel alerting for proactive infrastructure management.
Configure Node.js application monitoring with PM2 and Grafana
Set up comprehensive Node.js application monitoring using PM2 process manager with Prometheus metrics collection and Grafana dashboards for production-grade observability and alerting.
Configure Nagios Core 4.5 SSL certificates and security hardening with authentication controls
Secure your Nagios monitoring with SSL certificates, advanced authentication, and comprehensive access controls. This guide covers Let's Encrypt integration, web interface hardening, and security monitoring setup.
Set up Nagios Core 4.5 distributed monitoring with NRPE for remote host checks
Configure Nagios Core server with NRPE agents for distributed monitoring across multiple servers. Set up remote host checks, service monitoring, and centralized alerting for comprehensive infrastructure oversight.
Optimize systemd journal logging performance and storage
Learn how to optimize systemd journald for production environments by configuring storage limits, compression, performance settings, and implementing log forwarding with monitoring.
Configure HAProxy load balancing with multiple backend servers
Set up HAProxy to distribute traffic across multiple backend servers with health checks, SSL termination, and automatic failover for high availability load balancing.
Configure systemd user services for application startup
Learn how to configure systemd user services to automatically start applications without root privileges. This guide covers creating service units, managing lifecycle, and troubleshooting user services for reliable application startup.
Configure ScyllaDB SSL encryption and authentication with certificate management and security hardening
Secure your ScyllaDB cluster with comprehensive SSL/TLS encryption for client connections and inter-node communication. This tutorial covers certificate generation, authentication setup, and production security hardening.
Set up RAID arrays with mdadm for performance and redundancy
Configure Linux software RAID arrays with mdadm to improve disk performance and protect against drive failures. Learn to create RAID 0, 1, 5, 6, and 10 configurations with automatic monitoring and management.
Configure SSH certificate authentication with CA signing for secure server access
Set up SSH certificate-based authentication using a Certificate Authority to eliminate individual key management. Create signed user certificates that provide secure, scalable access control for multiple servers and users.
Configure SSH two-factor authentication with Google Authenticator TOTP
Add an extra layer of security to SSH logins by requiring both a password and a time-based one-time password (TOTP) generated by Google Authenticator or compatible apps.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer