Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxInstall and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications
hostingInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingSet up Node.js application security with Helmet and rate limiting
securityInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesRecently published
Monitor ScyllaDB cluster with Prometheus and Grafana for comprehensive performance tracking
monitoringMonitor Jetty performance with JMX and Grafana dashboards
monitoringConfigure FRRouting route maps and prefix lists for advanced routing policies
networkingConfigure Jetty clustering and session replication for high availability
hostingConfigure Cherokee web server with MySQL database optimization and performance tuning
hostingConfigure HAProxy with Consul for dynamic service discovery and automatic backend updates
Set up HAProxy with Consul integration for automatic service discovery, health checking, and dynamic backend updates. This tutorial covers consul-template configuration for zero-downtime scaling and failover in microservices architectures.
Configure Ansible AWX 24.6 for enterprise automation with RBAC and inventory management
Deploy Ansible AWX 24.6 with Docker Compose, PostgreSQL backend, and enterprise-grade RBAC. Set up dynamic inventory management with multiple sources and implement automated job workflows with notifications for production environments.
Configure Envoy proxy rate limiting and circuit breakers for microservices resilience
Learn to implement production-grade Envoy proxy with global and local rate limiting, circuit breakers, and health checks to build resilient microservices architecture that can handle traffic spikes and service failures gracefully.
Implement comprehensive Apache Airflow DAG testing and validation strategies with pytest and best practices
Learn to implement production-grade testing for Apache Airflow DAGs using pytest, including unit tests for DAG structure validation, integration testing with test databases, and automated validation pipelines with CI/CD integration.
Implement Kubernetes admission controllers with OPA Gatekeeper for policy enforcement
Set up OPA Gatekeeper admission controllers to enforce security policies, resource governance, and compliance rules across your Kubernetes cluster with custom constraint templates.
Monitor Istio service mesh with Prometheus and Grafana dashboards
Configure comprehensive monitoring for your Istio service mesh using Prometheus for metrics collection and Grafana for visualization. Set up observability dashboards to track traffic flow, security policies, and service performance with production-ready alerting rules.
Configure Apache Airflow monitoring with Prometheus alerts and Grafana dashboards
Set up comprehensive monitoring for Apache Airflow with Prometheus metrics collection, StatsD integration, and custom Grafana dashboards. Configure automated alerting for DAG failures, task timeouts, and system health issues.
Secure Podman containers with SELinux and AppArmor mandatory access controls
Implement mandatory access controls for Podman containers using SELinux on Red Hat-based systems and AppArmor on Debian-based systems. Learn to configure security policies, monitor violations, and harden container security with production-grade controls.
Implement Cilium Tetragon runtime security for Kubernetes with eBPF monitoring and threat detection
Deploy Cilium Tetragon for advanced runtime security monitoring in Kubernetes clusters using eBPF technology. Configure security policies, threat detection rules, and real-time monitoring with Grafana dashboards for comprehensive container protection.
Integrate Apache Airflow with Kubernetes RBAC and service accounts for secure workflow orchestration
Configure Apache Airflow KubernetesExecutor with proper RBAC permissions, service accounts, and role bindings to securely orchestrate workflows in Kubernetes environments with least-privilege access controls.
Configure Redis Sentinel for high availability and automatic failover
Set up Redis Sentinel to monitor Redis master-replica deployments and automatically handle failover scenarios. This tutorial covers configuring a 3-node Sentinel cluster with quorum-based decision making for production-grade high availability.
Configure Apache Airflow LDAP authentication and RBAC with Active Directory integration
Configure Apache Airflow with LDAP authentication against Active Directory, implement role-based access control (RBAC), and set up secure user group management for enterprise environments.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer