Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Advanced

Configure ClamAV cluster scanning for high availability and enterprise threat detection

Build a production-grade ClamAV cluster with HAProxy load balancing, shared virus definitions, and comprehensive monitoring for enterprise-scale threat detection and high availability.

45 min 4 distros 485 views
security Intermediate

Set up Node.js application security with Helmet and rate limiting

Secure your Node.js Express applications against common vulnerabilities with Helmet.js middleware and implement rate limiting to prevent abuse and DDoS attacks.

25 min 4 distros 742 views
security Beginner

Configure Linux audit system with auditd for security compliance and file monitoring

Set up the Linux audit system with auditd to monitor file access, user activities, and system calls for security compliance. Learn to create audit rules, analyze logs, and track privilege escalations.

25 min 6 distros 655 views
monitoring Beginner

Install and configure Nagios Core 4.5 for network and server monitoring with web interface

Set up Nagios Core 4.5 monitoring system with Apache web interface to monitor servers, network devices, and services. Configure hosts, services, and email notifications for comprehensive infrastructure monitoring.

45 min 6 distros 463 views
linux Intermediate

Configure Linux system time synchronization with chrony and NTP hardening

Set up reliable time synchronization with chrony NTP client, configure secure time servers, and implement monitoring to prevent time drift on production servers.

25 min 6 distros 860 views
hosting Intermediate

Install and configure Varnish Cache 7 with NGINX backend for high-performance web acceleration

Set up Varnish Cache 7 as a high-performance HTTP accelerator with NGINX backend integration. This tutorial covers installation, SSL termination, cache optimization, purging mechanisms, and monitoring for production environments.

45 min 6 distros 428 views
linux Intermediate

Configure Linux log rotation with logrotate and compression for system maintenance

Master log rotation with logrotate to manage disk space efficiently. Configure custom rotation policies, compression settings, and automated cleanup for applications and system logs.

25 min 6 distros 637 views
linux Intermediate

Configure Linux system backup automation with rsync and systemd timers

Set up automated Linux system backups using rsync with SSH authentication, systemd timers for scheduling, retention policies, email notifications, and monitoring. Perfect for production environments requiring reliable backup automation.

25 min 6 distros 488 views
linux Intermediate

Configure Linux system logging with rsyslog and journald for centralized log management

Set up comprehensive Linux logging infrastructure using rsyslog for traditional syslog handling and journald for systemd service logs. Configure remote logging, log rotation, filtering rules, and troubleshoot common logging performance issues.

25 min 6 distros 591 views
linux Intermediate

Configure automatic security updates with unattended-upgrades and email notifications

Set up automated security patching on Linux servers with unattended-upgrades and dnf-automatic. Configure email notifications, update policies, and monitoring to keep your systems secure while maintaining control over critical services.

25 min 6 distros 543 views
devops Intermediate

Configure Kafka Connect for database integration with JDBC connectors and CDC

Set up Kafka Connect with JDBC connectors for real-time database integration and configure Debezium for change data capture. Monitor connector performance and troubleshoot common integration issues.

45 min 4 distros 410 views
security Intermediate

Secure Podman containers with SELinux and AppArmor mandatory access controls

Implement mandatory access controls for Podman containers using SELinux on Red Hat-based systems and AppArmor on Debian-based systems. Learn to configure security policies, monitor violations, and harden container security with production-grade controls.

45 min 4 distros 383 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer