Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

monitoring Intermediate

Set up Nagios Core 4.5 distributed monitoring with NRPE for remote host checks

Configure Nagios Core server with NRPE agents for distributed monitoring across multiple servers. Set up remote host checks, service monitoring, and centralized alerting for comprehensive infrastructure oversight.

45 min 4 distros 92 views
security Advanced

Configure SSH certificate authentication with CA signing for secure server access

Set up SSH certificate-based authentication using a Certificate Authority to eliminate individual key management. Create signed user certificates that provide secure, scalable access control for multiple servers and users.

45 min 4 distros 89 views
security Intermediate

Configure SSH two-factor authentication with Google Authenticator TOTP

Add an extra layer of security to SSH logins by requiring both a password and a time-based one-time password (TOTP) generated by Google Authenticator or compatible apps.

25 min 4 distros 94 views
databases Advanced

Configure Cassandra SSL encryption and authentication with security hardening

Set up comprehensive SSL/TLS encryption for Apache Cassandra with client-to-node and node-to-node security, certificate management, and production-grade authentication hardening.

45 min 4 distros 78 views
databases Intermediate

Set up Cassandra backup automation with nodetool

Automate Apache Cassandra backups using nodetool snapshots, systemd timers, and retention policies. Configure monitoring and alerting for production-grade backup management with automated cleanup and verification.

45 min 4 distros 79 views
networking Intermediate

Configure keepalived with HAProxy backend health monitoring for high availability load balancing

Set up keepalived with HAProxy to create a high availability load balancer cluster with automatic failover, backend health monitoring, and VRRP protocol for seamless traffic distribution across multiple servers.

45 min 4 distros 68 views
security Intermediate

Configure SSH key authentication and security hardening

Replace password authentication with SSH keys and implement comprehensive security hardening including fail2ban, audit logging, and access controls to protect your Linux servers from unauthorized access and brute force attacks.

25 min 4 distros 79 views
security Intermediate

Configure PostgreSQL 17 SSL encryption and advanced security hardening

Set up SSL/TLS encryption, client certificate authentication, and comprehensive security policies for PostgreSQL 17. Includes audit logging, access controls, and firewall configuration for production environments.

45 min 4 distros 156 views
security Intermediate

Set up ELK Stack for centralized ModSecurity log analysis and monitoring

Configure Elasticsearch 8, Logstash 8, and Kibana 8 to collect, parse, and visualize ModSecurity web application firewall logs from multiple servers for centralized security monitoring and threat detection.

45 min 4 distros 73 views
security Advanced

Set up centralized security monitoring with ClamAV 1.4 and Elasticsearch 8

Build a comprehensive security monitoring infrastructure with ClamAV antivirus scanning, Elasticsearch log storage, and automated threat detection. This setup provides real-time malware scanning with centralized log aggregation for enterprise security compliance.

45 min 4 distros 95 views
devops Advanced

Setup Gunicorn blue-green deployment with NGINX for zero downtime Python applications

Configure zero-downtime deployments for Python web applications using Gunicorn blue-green deployment strategy with NGINX reverse proxy, automated health checks, and rollback mechanisms for production reliability.

45 min 4 distros 90 views
linux Intermediate

Configure backup compression and deduplication with BorgBackup and rsync for optimal storage efficiency

Set up automated backup systems with BorgBackup's advanced compression and deduplication alongside rsync strategies for maximum storage efficiency and reliable data protection.

25 min 4 distros 82 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer