Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Install and configure CockroachDB cluster with high availability and distributed SQL
databasesConfigure network interface monitoring with ICMP ping and connectivity testing
networkingInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesInstall and configure ArgoCD for GitOps continuous deployment with RBAC and SSL
devopsInstall and configure Loki for centralized log aggregation with Grafana integration
monitoringRecently published
Monitor MongoDB 8.0 performance with Prometheus and Grafana for real-time metrics and alerting
monitoringConfigure Prometheus Alertmanager with email notifications for production monitoring
monitoringOptimize ClickHouse performance for large datasets with advanced tuning and memory management
databasesConfigure HAProxy SSL termination with Let's Encrypt and security headers
networkingConfigure Apache HTTP Server clustering with mod_cluster and JBoss EAP for enterprise load balancing
hostingSet up Grafana Enterprise SSO authentication with LDAP, SAML, and OAuth2 integration
Configure Grafana Enterprise with comprehensive single sign-on authentication supporting LDAP, SAML, and OAuth2 providers. Set up role-based access control with automated team mapping and user provisioning for enterprise environments.
Set up ELK stack alerting with Watcher and email notifications for monitoring and incident response
Configure Elasticsearch Watcher to monitor log data and automatically send email alerts when critical system events occur. Create sophisticated alert conditions, manage email notification templates, and set up automated incident response workflows.
Configure shell aliases and functions for development productivity
Set up custom shell aliases and functions to streamline your development workflow, reduce typing, and boost terminal productivity with reusable commands and automation shortcuts.
Integrate Jaeger with Kubernetes service mesh for comprehensive distributed tracing
Set up production-grade distributed tracing in Kubernetes using Jaeger with Istio service mesh integration. Configure OpenTelemetry instrumentation, Elasticsearch storage backend, and comprehensive observability for microservices.
Implement Linux resource quotas with systemd and automated enforcement
Configure systemd resource control and cgroups v2 to implement CPU, memory, and I/O quotas with automated enforcement. Set up monitoring and alerts for resource violations across production workloads.
Implement container security monitoring with Falco runtime detection
Set up Falco for real-time container security monitoring with runtime threat detection, Kubernetes integration, and automated alerting through Grafana dashboards.
Configure Tomcat 11 database connection pooling with JNDI and HikariCP for high availability
Set up production-grade database connection pooling in Tomcat 11 using JNDI resources and HikariCP for optimal performance and high availability. Learn to configure server.xml, context.xml, and monitor connection pools effectively.
Configure Keycloak OAuth2 integration with OpenResty for enterprise SSO
Set up enterprise single sign-on by integrating Keycloak OAuth2 authentication with OpenResty using lua-resty-openidc. Configure secure authentication flows, JWT token validation, and session management for production web applications.
Configure intrusion detection with OSSEC and Wazuh for real-time security monitoring
Set up comprehensive host-based intrusion detection with OSSEC HIDS and Wazuh manager for real-time security monitoring, file integrity checking, and automated threat response across your infrastructure.
Configure MongoDB 8.0 replica set with automatic failover for high availability
Set up a MongoDB 8.0 replica set with multiple nodes and automatic failover to ensure high availability and data redundancy. This configuration provides seamless database operations even when primary nodes fail.
Implement Linux memory cgroups for container workload isolation
Configure cgroups v2 memory subsystem to isolate container workloads with precise memory limits, monitoring, and automated enforcement for production environments.
Configure Kubernetes External DNS for automatic DNS record management with cloud providers
Set up External DNS controller to automatically create and manage DNS records for your Kubernetes services and ingresses. This tutorial covers installation, cloud provider integration, and security configuration for production-ready DNS automation.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer