Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxSet up Node.js application security with Helmet and rate limiting
securityInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingInstall and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications
hostingInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesRecently published
Configure OSSEC active response for automated threat blocking
securityConfigure CockroachDB 24.3 multi-region deployment with high availability clustering
databasesSet up Fail2ban with Cloudflare API integration for automatic IP blocking and enhanced security
securityConfigure keepalived with HAProxy backend health monitoring for high availability load balancing
networkingConfigure ModSecurity machine learning anomaly detection for automated threat protection
securitySet up Zabbix proxy for distributed network monitoring
Configure Zabbix proxy servers to distribute monitoring load across multiple network segments, reduce server load, and monitor remote locations through secure proxy connections.
Implement Envoy proxy JWT authentication with OAuth2 integration
Configure Envoy proxy with JWT authentication filters integrated with Keycloak OAuth2 provider for secure microservices communication and advanced rate limiting policies.
Configure Kafka Streams for real-time data processing and analytics
Set up Kafka Streams applications with Java development environment to build real-time data processing pipelines for analytics and monitoring workloads.
Configure Apache Airflow high availability with CeleryExecutor and Redis clustering for production deployments
Set up Apache Airflow with CeleryExecutor and Redis clustering for high availability production deployments. Configure multiple workers, load balancing, monitoring, and automated failover to handle enterprise-scale workflow orchestration with zero downtime.
Configure advanced gRPC load balancing with Envoy Proxy health checks and circuit breakers
Set up Envoy Proxy with intelligent gRPC load balancing, health checks, and circuit breakers for production microservices. Includes SSL termination, monitoring integration, and security hardening.
Implement Grafana high availability clustering with PostgreSQL backend and load balancing
Set up a production-ready Grafana high availability cluster with PostgreSQL shared database backend and HAProxy load balancing for enterprise monitoring infrastructure with automatic failover.
Configure Spark Kubernetes Operator with MinIO for cloud-native analytics
Deploy Apache Spark on Kubernetes with the Spark Operator and MinIO object storage for scalable big data processing. Configure RBAC, SSL certificates, and persistent storage for production-ready analytics workloads.
Configure Consul Connect with Kubernetes integration for secure service mesh communication
Set up Consul Connect as a service mesh on Kubernetes with Helm, enabling automatic mTLS encryption, service discovery, and traffic routing between microservices for secure inter-service communication.
Implement Kubernetes network policies with Calico for microsegmentation
Configure Calico CNI to enforce network policies for pod-to-pod traffic control and namespace isolation. This tutorial covers advanced microsegmentation patterns, ingress/egress rules, and policy monitoring for production Kubernetes security.
Integrate OPA Gatekeeper with ArgoCD for GitOps policy management
Set up Open Policy Agent Gatekeeper with ArgoCD to enforce Kubernetes admission policies through GitOps workflows. This tutorial covers installation, policy template creation, and automated policy enforcement with monitoring.
Configure Istio distributed tracing with Jaeger and Zipkin for comprehensive microservices observability
Set up comprehensive distributed tracing in your Istio service mesh using both Jaeger and Zipkin backends. Configure telemetry collection, trace sampling, and monitoring dashboards for full microservices observability.
Configure Falco runtime security for Kubernetes threat detection with eBPF monitoring
Set up Falco with eBPF monitoring to detect runtime security threats in Kubernetes clusters. Configure custom rules, integrate Prometheus metrics, and establish comprehensive threat detection for container workloads.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer