Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

databases Advanced

Configure Redis 7 cluster sharding for horizontal scaling with automated failover and monitoring

Set up Redis 7 cluster with automatic sharding across multiple nodes for horizontal scaling. Configure hash slots, master-slave replication, and automated failover with comprehensive monitoring.

45 min 4 distros 16 views
performance Intermediate

Configure H2O HTTP/2 web server caching and compression optimization for high performance

Optimize H2O web server performance with advanced caching strategies, HTTP/2 compression, and production-grade tuning for high-traffic applications.

45 min 4 distros 10 views
hosting Intermediate

Integrate H2O with Let's Encrypt for automatic SSL certificates

Set up H2O HTTP/2 web server with automatic SSL certificate management using Let's Encrypt and certbot. Configure SSL termination, automatic renewal, and security hardening for production deployments.

30 min 4 distros 11 views
networking Advanced

Configure H2O HTTP/2 server load balancing with health checks and SSL termination

Set up H2O as a high-performance load balancer with HTTP/2 support, automated health monitoring, and SSL termination for production web applications.

45 min 4 distros 15 views
security Advanced

Set up centralized security monitoring with ClamAV 1.4 and Elasticsearch 8

Build a comprehensive security monitoring infrastructure with ClamAV antivirus scanning, Elasticsearch log storage, and automated threat detection. This setup provides real-time malware scanning with centralized log aggregation for enterprise security compliance.

45 min 4 distros 11 views
security Intermediate

Configure ClamAV integration with web servers and email systems for automated threat detection

Integrate ClamAV antivirus with NGINX, Apache, Postfix and Dovecot for automated file scanning and email protection. Set up real-time threat detection with monitoring and alerting.

45 min 4 distros 6 views
devops Advanced

Setup Gunicorn blue-green deployment with NGINX for zero downtime Python applications

Configure zero-downtime deployments for Python web applications using Gunicorn blue-green deployment strategy with NGINX reverse proxy, automated health checks, and rollback mechanisms for production reliability.

45 min 4 distros 14 views
monitoring Intermediate

Configure Tailscale monitoring with Prometheus and Grafana dashboards

Set up comprehensive monitoring for your Tailscale mesh VPN network using Prometheus metrics collection and Grafana dashboards to track node connectivity, traffic patterns, and performance across your distributed infrastructure.

45 min 4 distros 34 views
networking Advanced

Set up Linux network traffic shaping with tc and QoS for bandwidth management

Learn how to implement advanced network traffic control on Linux using tc (traffic control) and HTB (Hierarchical Token Bucket) queueing disciplines. This tutorial covers bandwidth limiting, QoS policies, and traffic prioritization for optimal network performance.

45 min 4 distros 24 views
linux Intermediate

Configure backup compression and deduplication with BorgBackup and rsync for optimal storage efficiency

Set up automated backup systems with BorgBackup's advanced compression and deduplication alongside rsync strategies for maximum storage efficiency and reliable data protection.

25 min 4 distros 9 views
databases Advanced

Set up PostgreSQL 17 streaming replication with PgBouncer connection pooling and load balancing

Configure PostgreSQL 17 with streaming replication for high availability, then add PgBouncer connection pooling with intelligent load balancing across primary and replica servers for production-grade database infrastructure.

45 min 4 distros 14 views
security Advanced

Implement Tailscale OAuth integration with identity providers for enterprise authentication

Configure Tailscale with enterprise identity providers including SAML and OIDC authentication, implement access control policies, and manage users across distributed teams for secure zero-trust networking.

45 min 4 distros 57 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer