Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Install and configure CockroachDB cluster with high availability and distributed SQL
databasesInstall and configure ArgoCD for GitOps continuous deployment with RBAC and SSL
devopsInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesInstall and configure WireGuard VPN server with client management
networkingInstall and configure Loki for centralized log aggregation with Grafana integration
monitoringRecently published
Set up Jaeger multi-datacenter replication for disaster recovery and high availability
monitoringConfigure SELinux policies for web applications and databases with custom rules and security hardening
securityConfigure Redis 7 Lua scripting and modules for advanced data processing
databasesConfigure MongoDB 8.0 backup automation with systemd timers and compression
databasesSet up Open vSwitch 3.3 for advanced virtual machine networking with VLAN and bridge configuration
networkingMonitor container performance with Prometheus and cAdvisor for comprehensive metrics collection
Set up comprehensive container monitoring with cAdvisor, Prometheus, and Grafana to collect detailed metrics on CPU, memory, network, and disk usage. This tutorial covers installation, configuration, and alerting for production-ready container performance monitoring.
Configure Linux audit logging for security compliance and monitoring
Set up comprehensive audit logging with auditd daemon to track file system changes, process execution, and network connections for security compliance and forensic analysis.
Setup OpenResty monitoring with Prometheus and Grafana dashboards for performance analytics
Configure comprehensive monitoring for OpenResty web server using nginx-lua-prometheus module to collect metrics, Prometheus for storage, and Grafana for visualization with custom dashboards and alerting rules.
Setup Elasticsearch 8 authentication with LDAP and Active Directory integration
Configure Elasticsearch 8 with X-Pack security to authenticate users against LDAP and Active Directory servers. This tutorial covers LDAP realm configuration, role-based access control, and troubleshooting authentication issues.
Setup centralized log aggregation with Elasticsearch 8, Logstash 8, and Kibana 8 (ELK Stack)
Deploy a production-ready ELK stack for centralized log aggregation with Elasticsearch 8, Logstash 8, and Kibana 8. Configure secure log shipping from multiple sources with authentication and SSL encryption.
Configure Linux audit system with auditd for security compliance and file monitoring
Set up the Linux audit system with auditd to monitor file access, user activities, and system calls for security compliance. Learn to create audit rules, analyze logs, and track privilege escalations.
Configure Apache Cassandra cluster with multi-node setup and performance optimization
Set up a production-ready Apache Cassandra cluster with multiple nodes, configure replication strategies, and optimize JVM settings and performance parameters for high-throughput distributed NoSQL workloads.
Configure Linux log rotation with logrotate and compression for system maintenance
Master log rotation with logrotate to manage disk space efficiently. Configure custom rotation policies, compression settings, and automated cleanup for applications and system logs.
Configure Linux kernel parameters for container workloads with sysctl optimization
Configure Linux kernel parameters for optimal container performance with sysctl tuning. This guide covers memory management, network stack optimization, file descriptor limits, and security parameters for Docker and Podman workloads.
Configure ClamAV antivirus scanning with automated threat detection and email alerts
Set up ClamAV daemon for real-time malware detection with automated scanning schedules, email notifications for threats, and optimized performance settings for production servers.
Configure Linux system resource limits with systemd and ulimit for application performance
Learn to configure Linux system resource limits using systemd, ulimit, and /etc/security/limits.conf to prevent application failures from resource exhaustion. Master per-user, per-service, and system-wide limits for optimal performance.
Configure Linux disk usage monitoring and automated cleanup with systemd timers
Set up automated disk monitoring, log cleanup, and email alerts using systemd timers to prevent disk space issues. Configure log rotation, temporary file cleanup, and threshold-based alerting for production systems.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer