Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingInstall and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications
hostingSet up Node.js application security with Helmet and rate limiting
securityConfigure Linux kernel parameters for container workloads with sysctl optimization
linuxRecently published
Configure SSH two-factor authentication with Google Authenticator TOTP
securityMonitor Cherokee web server performance with Grafana and Prometheus metrics collection
monitoringMonitor OSPF network topology with Prometheus and Grafana dashboards
networkingMonitor ScyllaDB cluster with Prometheus and Grafana for comprehensive performance tracking
monitoringMonitor Jetty performance with JMX and Grafana dashboards
monitoringMonitor Cherokee web server performance with custom Grafana dashboards and Prometheus alerts
Set up comprehensive monitoring for Cherokee web server with Prometheus metrics collection, custom Grafana dashboards for performance visualization, and automated alerting for critical performance thresholds.
Setup centralized log aggregation with Elasticsearch 8, Logstash 8, and Kibana 8 (ELK Stack)
Deploy a production-ready ELK stack for centralized log aggregation with Elasticsearch 8, Logstash 8, and Kibana 8. Configure secure log shipping from multiple sources with authentication and SSL encryption.
Configure ModSecurity 3 web application firewall with OWASP Core Rule Set for advanced threat protection
Set up ModSecurity 3 with OWASP Core Rule Set 4.0 to protect web applications from SQL injection, XSS, and other attacks. Configure integration with Nginx and Apache, implement custom rules, and optimize performance for production environments.
Optimize Apache HTTP server performance with caching, compression and worker tuning
Boost Apache performance through worker MPM optimization, compression modules, and intelligent caching strategies. Achieve 3-5x performance improvements for high-traffic production workloads.
Configure Linux system logging with rsyslog and journald for centralized log management
Set up comprehensive Linux logging infrastructure using rsyslog for traditional syslog handling and journald for systemd service logs. Configure remote logging, log rotation, filtering rules, and troubleshoot common logging performance issues.
Install and configure OpenTelemetry Collector for distributed tracing and observability
Set up OpenTelemetry Collector to gather distributed traces and metrics from your applications. Configure receivers, processors, and exporters for comprehensive observability with Jaeger and Prometheus integration.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer