Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

hosting Advanced

Configure Apache HTTP Server clustering with mod_cluster and JBoss EAP for enterprise load balancing

Set up Apache HTTP Server with mod_cluster module to create an intelligent load balancing cluster with JBoss EAP application servers, featuring automatic node discovery, session clustering, and health monitoring.

45 min 6 distros 183 views
linux Beginner

Configure Linux file and directory ownership with chown and security best practices

Learn to properly configure file and directory ownership using chown, understand user and group permissions, and implement secure ownership patterns for web servers and applications.

25 min 6 distros 197 views
linux Beginner

Configure Linux text editors with vim and nano for system administration

Learn to configure vim and nano text editors for efficient Linux system administration. Master keyboard shortcuts, create custom .vimrc configurations, and choose the right editor for different tasks.

25 min 6 distros 125 views
security Advanced

Set up Grafana Enterprise SSO authentication with LDAP, SAML, and OAuth2 integration

Configure Grafana Enterprise with comprehensive single sign-on authentication supporting LDAP, SAML, and OAuth2 providers. Set up role-based access control with automated team mapping and user provisioning for enterprise environments.

45 min 4 distros 135 views
linux Beginner

Configure shell aliases and functions for development productivity

Set up custom shell aliases and functions to streamline your development workflow, reduce typing, and boost terminal productivity with reusable commands and automation shortcuts.

20 min 4 distros 83 views
devops Advanced

Integrate Jaeger with Kubernetes service mesh for comprehensive distributed tracing

Set up production-grade distributed tracing in Kubernetes using Jaeger with Istio service mesh integration. Configure OpenTelemetry instrumentation, Elasticsearch storage backend, and comprehensive observability for microservices.

45 min 4 distros 106 views
linux Intermediate

Configure Linux user session limits with systemd and pam_limits for resource management

Learn to set up comprehensive user session resource limits using both traditional pam_limits.conf and modern systemd user slices. This tutorial covers memory, CPU, and process limits to prevent resource exhaustion on multi-user systems.

25 min 4 distros 94 views
networking Intermediate

Configure Tailscale with Kubernetes cluster networking integration

Set up Tailscale mesh VPN with Kubernetes cluster integration for secure pod-to-pod communication, subnet routing, and service discovery across distributed nodes.

25 min 4 distros 97 views
security Advanced

Configure OpenVPN LDAP authentication for enterprise users with Active Directory integration

Set up OpenVPN server with LDAP authentication against Active Directory, enabling centralized user management and group-based access control for enterprise VPN deployments.

45 min 4 distros 171 views
security Advanced

Configure Airflow DAG security and isolation with RBAC policies

Set up comprehensive security for Apache Airflow with role-based access control, DAG-level permissions, and resource isolation. Configure user authentication, implement fine-grained security policies, and establish monitoring for production-grade workflow orchestration.

45 min 4 distros 169 views
monitoring Advanced

Integrate OpenTelemetry with ELK stack for unified observability and distributed tracing

Set up a comprehensive observability stack by integrating OpenTelemetry Collector with Elasticsearch, Logstash, and Kibana for distributed tracing, metrics collection, and unified monitoring across microservices and applications.

45 min 4 distros 123 views
networking Intermediate

Install and configure Squid 6 proxy server with bandwidth controls and content filtering

Set up Squid 6 proxy server with advanced traffic shaping, content filtering, and user authentication. Configure bandwidth limits, access control lists, and comprehensive logging for enterprise proxy deployments.

45 min 4 distros 101 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer