Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

linux Intermediate

Setup log aggregation with rsyslog and logrotate for centralized system monitoring

Configure rsyslog for centralized log collection across servers, implement advanced logrotate policies for automated retention, and set up remote log shipping with filtering for comprehensive system monitoring and audit compliance.

45 min 4 distros 93 views
security Intermediate

Configure SSH key authentication and security hardening

Replace password authentication with SSH keys and implement comprehensive security hardening including fail2ban, audit logging, and access controls to protect your Linux servers from unauthorized access and brute force attacks.

25 min 4 distros 91 views
security Advanced

Integrate ModSecurity 3 with SOAR platforms for automated incident response and threat detection

Set up ModSecurity 3 with structured logging, webhook notifications, and API integrations to automatically feed security events into SOAR platforms for real-time threat detection and incident response workflows.

45 min 4 distros 76 views
security Intermediate

Implement network security policies with iptables and firewalld for enterprise infrastructure protection

Configure enterprise-grade network security with iptables and firewalld, implementing zone-based policies, advanced rules, and comprehensive logging for production infrastructure protection.

45 min 4 distros 78 views
security Intermediate

Implement container security with AppArmor and seccomp profiles

Secure your containers with AppArmor mandatory access controls and seccomp system call filtering. Learn to create custom security profiles, implement runtime policies, and monitor container security violations in production environments.

45 min 4 distros 307 views
networking Intermediate

Setup Tailscale site-to-site VPN with multiple exit nodes for redundancy

Configure a resilient Tailscale mesh VPN with multiple exit nodes for high availability site-to-site connectivity. Set up subnet routing, automatic failover, and monitoring across distributed networks.

45 min 4 distros 139 views
security Advanced

Set up centralized security monitoring with ClamAV 1.4 and Elasticsearch 8

Build a comprehensive security monitoring infrastructure with ClamAV antivirus scanning, Elasticsearch log storage, and automated threat detection. This setup provides real-time malware scanning with centralized log aggregation for enterprise security compliance.

45 min 4 distros 98 views
security Intermediate

Configure ClamAV integration with web servers and email systems for automated threat detection

Integrate ClamAV antivirus with NGINX, Apache, Postfix and Dovecot for automated file scanning and email protection. Set up real-time threat detection with monitoring and alerting.

45 min 4 distros 70 views
databases Advanced

Set up PostgreSQL 17 streaming replication with PgBouncer connection pooling and load balancing

Configure PostgreSQL 17 with streaming replication for high availability, then add PgBouncer connection pooling with intelligent load balancing across primary and replica servers for production-grade database infrastructure.

45 min 4 distros 109 views
security Advanced

Implement Tailscale OAuth integration with identity providers for enterprise authentication

Configure Tailscale with enterprise identity providers including SAML and OIDC authentication, implement access control policies, and manage users across distributed teams for secure zero-trust networking.

45 min 4 distros 194 views
networking Advanced

Configure BIRD BGP routing daemon for advanced routing policies and network automation

Set up BIRD 2.15 BGP daemon with advanced routing policies, route filtering, and automated network management. Configure BGP peering, implement complex routing decisions, and set up route aggregation for production networks.

45 min 4 distros 137 views
performance Intermediate

Configure Linux process scheduling and CPU affinity for performance optimization

Learn to optimize Linux process performance by configuring CPU scheduling priorities, CPU affinity, and systemd resource management for better workload distribution and reduced context switching.

45 min 4 distros 191 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer