Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Install and configure CockroachDB cluster with high availability and distributed SQL
databasesInstall and configure ArgoCD for GitOps continuous deployment with RBAC and SSL
devopsInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesInstall and configure WireGuard VPN server with client management
networkingInstall and configure Loki for centralized log aggregation with Grafana integration
monitoringRecently published
Configure SSL encryption and authentication for ClamAV cluster with high availability scanning
securityImplement MinIO security hardening with IAM policies and audit logging
securitySetup Elasticsearch monitoring with Metricbeat and Kibana dashboards
monitoringConfigure Vault auto-unseal with AWS KMS for high availability secrets management
securityImplement MariaDB connection pooling with ProxySQL for high availability
databasesSetup Elasticsearch 8 SSL/TLS encryption and advanced security hardening with authentication and access control
Secure your Elasticsearch 8 cluster with comprehensive SSL/TLS encryption, user authentication, role-based access control, and network hardening. This tutorial covers production-grade security configuration to protect your search infrastructure.
Configure Linux audit logging for security compliance and monitoring
Set up comprehensive audit logging with auditd daemon to track file system changes, process execution, and network connections for security compliance and forensic analysis.
Configure backup encryption with GPG and rsync for secure automated backups
Set up automated encrypted backups using GPG 2.4 and rsync with systemd timers. This tutorial covers GPG key management, encrypted backup scripts, and restoration procedures for production environments.
Setup Elasticsearch 8 authentication with LDAP and Active Directory integration
Configure Elasticsearch 8 with X-Pack security to authenticate users against LDAP and Active Directory servers. This tutorial covers LDAP realm configuration, role-based access control, and troubleshooting authentication issues.
Implement OpenResty JWT authentication with OAuth2 integration for secure web applications
Set up secure JWT-based authentication in OpenResty with OAuth2 provider integration using lua-resty-jwt module. Configure token validation, authentication middleware, and security policies for production web applications.
Configure Redis Sentinel with SSL/TLS encryption and authentication for high availability
Set up a production-grade Redis Sentinel cluster with SSL/TLS encryption, authentication, and automatic failover for high availability. This tutorial covers certificate generation, security configuration, and monitoring setup.
Setup centralized log aggregation with Elasticsearch 8, Logstash 8, and Kibana 8 (ELK Stack)
Deploy a production-ready ELK stack for centralized log aggregation with Elasticsearch 8, Logstash 8, and Kibana 8. Configure secure log shipping from multiple sources with authentication and SSL encryption.
Configure Consul backup and disaster recovery with automated snapshots and restoration
Set up automated Consul snapshots with verification, implement disaster recovery procedures, and configure monitoring for production-grade backup strategies that ensure service discovery data protection.
Set up automated MySQL database backups with compression and rotation
Create production-grade MySQL backup automation with gzip compression, logrotate management, and systemd timer scheduling. Includes integrity checking and email notifications for reliable database protection.
Configure Linux file encryption with LUKS and cryptsetup for data protection
Learn how to encrypt files and partitions using LUKS encryption with cryptsetup tools. This tutorial covers creating encrypted volumes, managing encryption keys, and automating mount operations for secure data protection.
Set up network interface monitoring with SNMP and basic traffic analysis
Learn how to install and configure SNMP daemon for network interface monitoring, implement basic traffic analysis with automated alerting, and create monitoring scripts with cron jobs for continuous network performance tracking.
Install and configure Uptime Kuma for website monitoring with SSL and email alerts
Learn how to install Uptime Kuma, a self-hosted monitoring tool, with SSL certificates, email notifications, and comprehensive website monitoring capabilities. Set up automated alerts and maintain reliable uptime tracking for your web services.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer