Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxSet up Node.js application security with Helmet and rate limiting
securityInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingInstall and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications
hostingInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesRecently published
Set up Cassandra backup automation with nodetool
databasesConfigure OSSEC vulnerability detection with CVE scanning and automated security alerts
securityMonitor Apache Cassandra cluster with Prometheus and Grafana dashboards
monitoringIntegrate OSSEC with Splunk for centralized security monitoring and log analysis
securityConfigure systemd service resource limits and security isolation
linuxConfigure backup encryption with GPG and rsync for secure automated backups
Set up automated encrypted backups using GPG 2.4 and rsync with systemd timers. This tutorial covers GPG key management, encrypted backup scripts, and restoration procedures for production environments.
Configure Consul backup and disaster recovery with automated snapshots and restoration
Set up automated Consul snapshots with verification, implement disaster recovery procedures, and configure monitoring for production-grade backup strategies that ensure service discovery data protection.
Configure network interface monitoring with ICMP ping and connectivity testing
Set up automated network connectivity monitoring using ICMP ping tests with email alerts for interface failures. Create comprehensive network health checks and reporting for production systems.
Configure Linux file encryption with LUKS and cryptsetup for data protection
Learn how to encrypt files and partitions using LUKS encryption with cryptsetup tools. This tutorial covers creating encrypted volumes, managing encryption keys, and automating mount operations for secure data protection.
Install and configure Uptime Kuma for website monitoring with SSL and email alerts
Learn how to install Uptime Kuma, a self-hosted monitoring tool, with SSL certificates, email notifications, and comprehensive website monitoring capabilities. Set up automated alerts and maintain reliable uptime tracking for your web services.
Configure Linux file compression and archiving with tar, gzip and backup automation
Learn to create compressed archives with tar and gzip, manage different compression formats, and implement automated backup scripts with rotation for efficient system maintenance and data protection.
Optimize Linux filesystem performance with mount options and I/O schedulers
Learn to optimize Linux filesystem performance by configuring I/O schedulers, tuning ext4 mount options, and monitoring disk performance with iostat and iotop for high-throughput workloads.
Configure SSH key authentication and disable password login for secure server access
Set up SSH public key authentication on Linux servers and disable password-based logins to prevent brute force attacks and improve security. This tutorial covers key generation, server configuration, and troubleshooting common authentication issues.
Install and configure ScyllaDB cluster with replication and performance tuning
Set up a production-ready ScyllaDB cluster with multi-node configuration, automatic replication, and performance optimization. ScyllaDB provides 10x better performance than Cassandra with drop-in compatibility.
Configure ClamAV antivirus scanning with automated threat detection and email alerts
Set up ClamAV daemon for real-time malware detection with automated scanning schedules, email notifications for threats, and optimized performance settings for production servers.
Optimize Redis 7 memory usage and performance with advanced configuration tuning
Learn to optimize Redis 7 memory consumption and performance through advanced configuration tuning, including eviction policies, compressed data structures, active defragmentation, and comprehensive monitoring techniques.
Configure Linux system firewall with nftables and security hardening
Learn how to configure nftables firewall with advanced security rules, rate limiting, and fail2ban integration. This tutorial covers migration from iptables, logging configuration, and production-grade security hardening for modern Linux systems.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer