Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxSet up Node.js application security with Helmet and rate limiting
securityInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingInstall and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications
hostingInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesRecently published
Integrate ModSecurity 3 with SOAR platforms for automated incident response and threat detection
securityMonitor Node.js applications with Prometheus and Grafana for comprehensive performance metrics
monitoringSet up PostgreSQL 17 streaming replication with PgBouncer connection pooling and load balancing
databasesSet up ELK Stack for centralized ModSecurity log analysis and monitoring
securityImplement network security policies with iptables and firewalld for enterprise infrastructure protection
securitySet up OSSEC agent deployment and centralized management with automated configuration
Deploy and manage OSSEC Host-based Intrusion Detection System (HIDS) across multiple servers with centralized monitoring, automated agent configuration, and real-time security event processing for enterprise-scale infrastructure protection.
Install and configure Squid 6 proxy server with bandwidth controls and content filtering
Set up Squid 6 proxy server with advanced traffic shaping, content filtering, and user authentication. Configure bandwidth limits, access control lists, and comprehensive logging for enterprise proxy deployments.
Setup Nginx with ModSecurity 3 web application firewall for advanced threat protection
Configure Nginx with ModSecurity 3 and OWASP Core Rule Set to protect web applications against SQL injection, XSS, and other common attacks. This tutorial covers complete WAF setup with security rules, performance optimization, and threat testing.
Configure SonarQube LDAP authentication with Active Directory and user group management
Set up SonarQube to authenticate users against Active Directory using LDAP. Configure automatic user provisioning, group synchronization, and role-based access control for enterprise environments with centralized authentication.
Implement HAProxy WAF integration with ModSecurity 3 for advanced threat protection
Configure HAProxy with ModSecurity 3 using SPOE protocol to create a high-performance web application firewall that protects against OWASP Top 10 threats while maintaining load balancing capabilities.
Set up iptables high availability clustering with keepalived for automatic failover
Configure a highly available firewall cluster using iptables and keepalived with VRRP for automatic failover. Set up rule synchronization between nodes and implement monitoring for production-grade firewall redundancy.
Configure Linux system logging with rsyslog and journald for centralized log management
Set up comprehensive Linux logging infrastructure using rsyslog for traditional syslog handling and journald for systemd service logs. Configure remote logging, log rotation, filtering rules, and troubleshoot common logging performance issues.
Configure automatic security updates with unattended-upgrades and email notifications
Set up automated security patching on Linux servers with unattended-upgrades and dnf-automatic. Configure email notifications, update policies, and monitoring to keep your systems secure while maintaining control over critical services.
Install and configure Fail2ban with advanced rules and email alerts
Set up Fail2ban intrusion prevention system with custom SSH, web server, and application protection rules. Configure email notifications and advanced filtering to automatically block malicious IP addresses based on log patterns.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer