Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Install and configure CockroachDB cluster with high availability and distributed SQL
databasesConfigure network interface monitoring with ICMP ping and connectivity testing
networkingInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesInstall and configure ArgoCD for GitOps continuous deployment with RBAC and SSL
devopsInstall and configure Loki for centralized log aggregation with Grafana integration
monitoringRecently published
Monitor MongoDB 8.0 performance with Prometheus and Grafana for real-time metrics and alerting
monitoringConfigure Prometheus Alertmanager with email notifications for production monitoring
monitoringOptimize ClickHouse performance for large datasets with advanced tuning and memory management
databasesConfigure HAProxy SSL termination with Let's Encrypt and security headers
networkingConfigure Apache HTTP Server clustering with mod_cluster and JBoss EAP for enterprise load balancing
hostingImplement Varnish cache warming with automated content preloading for high-performance websites
Set up automated Varnish cache warming with priority URL preloading, systemd timers for scheduled content refreshing, and comprehensive monitoring to optimize cache hit rates and reduce backend server load for high-traffic websites.
Configure Linux audit logging for security compliance and monitoring
Set up comprehensive audit logging with auditd daemon to track file system changes, process execution, and network connections for security compliance and forensic analysis.
Configure backup encryption with GPG and rsync for secure automated backups
Set up automated encrypted backups using GPG 2.4 and rsync with systemd timers. This tutorial covers GPG key management, encrypted backup scripts, and restoration procedures for production environments.
Configure Kubernetes persistent volumes with NFS storage for container data persistence
Set up NFS-backed persistent volumes in Kubernetes to provide shared, durable storage for containerized applications across multiple nodes with automatic failover capabilities.
Implement OpenResty JWT authentication with OAuth2 integration for secure web applications
Set up secure JWT-based authentication in OpenResty with OAuth2 provider integration using lua-resty-jwt module. Configure token validation, authentication middleware, and security policies for production web applications.
Configure Redis Sentinel with SSL/TLS encryption and authentication for high availability
Set up a production-grade Redis Sentinel cluster with SSL/TLS encryption, authentication, and automatic failover for high availability. This tutorial covers certificate generation, security configuration, and monitoring setup.
Deploy Django application with Gunicorn and PostgreSQL database migrations
Learn how to deploy a production-ready Django application with Gunicorn WSGI server, PostgreSQL database, and automated database migrations on Ubuntu, Debian, AlmaLinux, and Rocky Linux systems.
Benchmark and optimize Linux disk I/O performance with fio testing
Learn how to benchmark disk I/O performance using fio (Flexible I/O tester) to identify storage bottlenecks and optimize your Linux system's disk performance through comprehensive read/write testing and analysis.
Configure Linux cron jobs and system task scheduling with best practices
Learn to configure cron jobs and systemd timers for automated task scheduling on Linux systems with proper logging, security, and troubleshooting techniques.
Configure Linux file encryption with LUKS and cryptsetup for data protection
Learn how to encrypt files and partitions using LUKS encryption with cryptsetup tools. This tutorial covers creating encrypted volumes, managing encryption keys, and automating mount operations for secure data protection.
Configure Linux audit system with auditd for security compliance and file monitoring
Set up the Linux audit system with auditd to monitor file access, user activities, and system calls for security compliance. Learn to create audit rules, analyze logs, and track privilege escalations.
Install and configure Uptime Kuma for website monitoring with SSL and email alerts
Learn how to install Uptime Kuma, a self-hosted monitoring tool, with SSL certificates, email notifications, and comprehensive website monitoring capabilities. Set up automated alerts and maintain reliable uptime tracking for your web services.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer