Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

linux Beginner

Configure Linux text editors with vim and nano for system administration

Learn to configure vim and nano text editors for efficient Linux system administration. Master keyboard shortcuts, create custom .vimrc configurations, and choose the right editor for different tasks.

25 min 6 distros 110 views
hosting Beginner

Fix high load average with low CPU usage on web servers

Diagnose and resolve high load average issues when CPU usage remains low on Linux web servers. Learn to identify I/O bottlenecks, blocked processes, and system resource contention affecting performance.

25 min 6 distros 212 views
hosting Beginner

Install and configure Bun JavaScript runtime with systemd and reverse proxy

Deploy Bun JavaScript runtime on Linux with automatic service management through systemd and secure SSL reverse proxy configuration with Nginx for production applications.

25 min 6 distros 109 views
linux Beginner

Configure Linux process monitoring with top, htop, and btop for system performance analysis

Master Linux process monitoring using top, htop, and btop to analyze system performance, identify resource bottlenecks, and troubleshoot performance issues in production environments.

25 min 6 distros 136 views
linux Intermediate

Implement Linux memory cgroups for container workload isolation

Configure cgroups v2 memory subsystem to isolate container workloads with precise memory limits, monitoring, and automated enforcement for production environments.

45 min 4 distros 97 views
security Intermediate

Configure NGINX rate limiting and advanced security rules for DDoS protection

Configure NGINX with comprehensive rate limiting, connection throttling, and advanced security headers to protect your web applications from DDoS attacks and malicious traffic. Learn to implement zone-based rate limiting, geographic blocking, and real-time monitoring for production environments.

25 min 4 distros 137 views
devops Advanced

Configure SonarQube high availability clustering with PostgreSQL and load balancing

Set up enterprise-grade SonarQube clustering with PostgreSQL database replication, multiple application nodes, and HAProxy load balancing for zero-downtime code quality analysis across distributed teams.

90 min 4 distros 187 views
hosting Intermediate

Configure Lighttpd 1.4 with multiple virtual hosts and subdomains

Set up Lighttpd web server with multiple virtual hosts, subdomain routing, SSL certificates, and performance optimization for hosting multiple websites on a single server with security hardening.

45 min 4 distros 98 views
devops Intermediate

Configure Kubernetes pod disruption budgets for high availability with policy enforcement

Learn to configure PodDisruptionBudget resources in Kubernetes to maintain application availability during voluntary disruptions. This tutorial covers creating disruption budgets, implementing policies for different workload types, and monitoring disruption events with kubectl.

45 min 4 distros 178 views
networking Intermediate

Install and configure Squid 6 proxy server with bandwidth controls and content filtering

Set up Squid 6 proxy server with advanced traffic shaping, content filtering, and user authentication. Configure bandwidth limits, access control lists, and comprehensive logging for enterprise proxy deployments.

45 min 4 distros 100 views
monitoring Intermediate

Set up multi-location monitoring with distributed Uptime Kuma instances

Deploy multiple Uptime Kuma instances across different geographic locations to monitor your services from various vantage points. This setup provides comprehensive monitoring coverage, reduces false positives, and enables regional performance analysis with centralized alerting.

45 min 4 distros 129 views
security Intermediate

Setup Nginx with ModSecurity 3 web application firewall for advanced threat protection

Configure Nginx with ModSecurity 3 and OWASP Core Rule Set to protect web applications against SQL injection, XSS, and other common attacks. This tutorial covers complete WAF setup with security rules, performance optimization, and threat testing.

45 min 4 distros 167 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer