Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Intermediate

Configure backup encryption with GPG and rsync for secure automated backups

Set up automated encrypted backups using GPG 2.4 and rsync with systemd timers. This tutorial covers GPG key management, encrypted backup scripts, and restoration procedures for production environments.

45 min 4 distros 531 views
devops Advanced

Configure Consul backup and disaster recovery with automated snapshots and restoration

Set up automated Consul snapshots with verification, implement disaster recovery procedures, and configure monitoring for production-grade backup strategies that ensure service discovery data protection.

45 min 4 distros 495 views
networking Beginner

Configure network interface monitoring with ICMP ping and connectivity testing

Set up automated network connectivity monitoring using ICMP ping tests with email alerts for interface failures. Create comprehensive network health checks and reporting for production systems.

45 min 6 distros 711 views
security Beginner

Configure Linux file encryption with LUKS and cryptsetup for data protection

Learn how to encrypt files and partitions using LUKS encryption with cryptsetup tools. This tutorial covers creating encrypted volumes, managing encryption keys, and automating mount operations for secure data protection.

45 min 6 distros 544 views
monitoring Beginner

Install and configure Uptime Kuma for website monitoring with SSL and email alerts

Learn how to install Uptime Kuma, a self-hosted monitoring tool, with SSL certificates, email notifications, and comprehensive website monitoring capabilities. Set up automated alerts and maintain reliable uptime tracking for your web services.

25 min 6 distros 690 views
linux Beginner

Configure Linux file compression and archiving with tar, gzip and backup automation

Learn to create compressed archives with tar and gzip, manage different compression formats, and implement automated backup scripts with rotation for efficient system maintenance and data protection.

25 min 6 distros 488 views
performance Beginner

Optimize Linux filesystem performance with mount options and I/O schedulers

Learn to optimize Linux filesystem performance by configuring I/O schedulers, tuning ext4 mount options, and monitoring disk performance with iostat and iotop for high-throughput workloads.

25 min 6 distros 447 views
security Beginner

Configure SSH key authentication and disable password login for secure server access

Set up SSH public key authentication on Linux servers and disable password-based logins to prevent brute force attacks and improve security. This tutorial covers key generation, server configuration, and troubleshooting common authentication issues.

20 min 6 distros 443 views
databases Intermediate

Install and configure ScyllaDB cluster with replication and performance tuning

Set up a production-ready ScyllaDB cluster with multi-node configuration, automatic replication, and performance optimization. ScyllaDB provides 10x better performance than Cassandra with drop-in compatibility.

45 min 6 distros 435 views
security Intermediate

Configure ClamAV antivirus scanning with automated threat detection and email alerts

Set up ClamAV daemon for real-time malware detection with automated scanning schedules, email notifications for threats, and optimized performance settings for production servers.

25 min 6 distros 539 views
performance Intermediate

Optimize Redis 7 memory usage and performance with advanced configuration tuning

Learn to optimize Redis 7 memory consumption and performance through advanced configuration tuning, including eviction policies, compressed data structures, active defragmentation, and comprehensive monitoring techniques.

25 min 6 distros 605 views
linux Intermediate

Configure Linux system firewall with nftables and security hardening

Learn how to configure nftables firewall with advanced security rules, rate limiting, and fail2ban integration. This tutorial covers migration from iptables, logging configuration, and production-grade security hardening for modern Linux systems.

45 min 6 distros 504 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer