Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Install and configure CockroachDB cluster with high availability and distributed SQL
databasesConfigure network interface monitoring with ICMP ping and connectivity testing
networkingInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesInstall and configure ArgoCD for GitOps continuous deployment with RBAC and SSL
devopsInstall and configure Loki for centralized log aggregation with Grafana integration
monitoringRecently published
Monitor MongoDB 8.0 performance with Prometheus and Grafana for real-time metrics and alerting
monitoringConfigure Prometheus Alertmanager with email notifications for production monitoring
monitoringOptimize ClickHouse performance for large datasets with advanced tuning and memory management
databasesConfigure HAProxy SSL termination with Let's Encrypt and security headers
networkingConfigure Apache HTTP Server clustering with mod_cluster and JBoss EAP for enterprise load balancing
hostingInstall and configure PHP 8.4 with Apache and security hardening
Set up PHP 8.4 with Apache web server using PHP-FPM for optimal performance and security. Learn to configure essential PHP modules, implement security hardening measures, and optimize your LAMP stack for production environments.
Configure Linux user and group management with useradd, usermod and advanced account security
Learn to manage Linux users and groups with useradd, usermod, and groupadd commands. This tutorial covers creating accounts, setting permissions, configuring password policies, and implementing security best practices for production systems.
Install and configure Nagios Core 4.5 for network and server monitoring with web interface
Set up Nagios Core 4.5 monitoring system with Apache web interface to monitor servers, network devices, and services. Configure hosts, services, and email notifications for comprehensive infrastructure monitoring.
Configure Linux file permissions and access control with umask and chmod best practices
Learn how to configure secure Linux file permissions using chmod, set default permissions with umask, and implement proper access control to prevent security vulnerabilities while fixing permission denied errors.
Configure Linux environment variables and PATH management for development workflows
Learn how to properly configure Linux environment variables and manage your PATH for development workflows. This guide covers temporary and persistent variables, user vs system-wide configuration, and troubleshooting common issues across Ubuntu, Debian, AlmaLinux, Rocky Linux, and Fedora.
Configure SSH key authentication and disable password login for secure server access
Set up SSH public key authentication on Linux servers and disable password-based logins to prevent brute force attacks and improve security. This tutorial covers key generation, server configuration, and troubleshooting common authentication issues.
Install and configure Jetty application server with SSL certificates and performance tuning
Deploy Eclipse Jetty application server with SSL/TLS encryption, systemd service management, and production-ready performance optimizations. Configure reverse proxy integration and security hardening for Java web applications.
Install and configure Cherokee web server with FastCGI and virtual hosts
Set up Cherokee web server with web-based administration, FastCGI support for PHP applications, SSL-enabled virtual hosts, and performance optimizations for lightweight web hosting environments.
Configure network traffic shaping with tc and HTB for bandwidth management and QoS
Set up hierarchical token bucket (HTB) traffic shaping with tc to control bandwidth allocation, prioritize network traffic, and implement quality of service policies for optimal network performance.
Configure OSSEC HIDS for intrusion detection with email alerts and real-time monitoring
Set up OSSEC Host-based Intrusion Detection System with server-agent architecture, custom detection rules, email notifications, and real-time monitoring for comprehensive security monitoring across multiple systems.
Configure network load balancing with keepalived and VRRP for high availability failover
Set up keepalived with VRRP to create highly available network services with automatic failover. Configure virtual IP addresses that move between servers when one fails, ensuring zero-downtime load balancing.
Configure Linux firewall rules with fail2ban for SSH brute force protection and intrusion prevention
Set up fail2ban to automatically block SSH brute force attacks and protect your Linux server from unauthorized access attempts. Configure custom jails, firewall integration, and email notifications for comprehensive intrusion prevention.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer