Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Intermediate

Implement OpenLiteSpeed WAF and DDoS protection with ModSecurity 3 and rate limiting

Set up comprehensive web application security for OpenLiteSpeed with ModSecurity 3 web application firewall, OWASP Core Rule Set for threat protection, and advanced rate limiting to defend against DDoS attacks and malicious traffic.

45 min 4 distros 19 views
devops Intermediate

Set up OpenLiteSpeed with Docker containers for development

Deploy OpenLiteSpeed web server in Docker containers with PHP-FPM, SSL certificates, and persistent volumes for scalable development environments.

45 min 4 distros 8 views
databases Intermediate

Configure MySQL connection pooling with ProxySQL 2.6 for high availability and performance optimization

Set up ProxySQL 2.6 to manage MySQL connection pooling, load balancing, and automatic failover. This tutorial covers backend server configuration, health checks, query routing rules, and monitoring for production MySQL environments.

45 min 4 distros 54 views
hosting Intermediate

Implement Lighttpd 1.4 load balancing with multiple backend servers for high availability

Configure Lighttpd 1.4 with mod_proxy for load balancing across multiple backend web servers. Set up health checks, SSL termination, and failover mechanisms for production environments.

45 min 4 distros 15 views
hosting Intermediate

Configure Caddy 2 with Docker containers and automatic SSL certificates

Set up Caddy 2 as a reverse proxy using Docker with automatic Let's Encrypt SSL certificates. Deploy containerized web applications behind Caddy with zero-downtime SSL management and built-in load balancing.

45 min 4 distros 18 views
security Intermediate

Implement Caddy 2 rate limiting and DDoS protection with advanced security rules

Configure Caddy 2 web server with comprehensive rate limiting, request throttling, and DDoS protection using built-in security modules and advanced filtering rules.

45 min 4 distros 22 views
monitoring Intermediate

Implement log-based monitoring and alerting with Grafana and Loki

Set up comprehensive log aggregation with Loki, centralized visualization with Grafana dashboards, and automated alerting rules for proactive incident response across your infrastructure.

45 min 4 distros 25 views
hosting Intermediate

Configure Apache reverse proxy and load balancing for high availability

Set up Apache as a reverse proxy with load balancing across multiple backend servers. Configure health checks, SSL termination, and failover for production high availability deployments.

45 min 4 distros 14 views
monitoring Intermediate

Configure ELK stack for centralized logging with Elasticsearch 8, Logstash 8, and Kibana 8

Set up a production-grade ELK stack with Elasticsearch 8, Logstash 8, and Kibana 8 for centralized log management. Configure authentication, SSL encryption, and log processing pipelines across multiple data sources.

45 min 4 distros 27 views
databases Advanced

Setup automated backup verification and recovery testing with PostgreSQL, MySQL and filesystem backups

Build a comprehensive backup verification framework that automatically tests database restores, validates filesystem backups, and performs recovery testing using systemd timers and custom scripts.

45 min 4 distros 26 views
security Intermediate

Implement Linux security hardening with CIS benchmarks and automated compliance scanning

Harden your Linux systems using CIS benchmarks with automated compliance scanning and continuous monitoring. Learn to implement security controls for filesystem permissions, user authentication, network policies, and maintain ongoing compliance with industry standards.

45 min 4 distros 14 views
security Intermediate

Configure NGINX rate limiting and DDoS protection with advanced security rules

Set up NGINX rate limiting modules, implement connection limits, and configure geographic blocking to protect your web applications from DDoS attacks and abuse.

25 min 4 distros 10 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer