Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

hosting Beginner

Install and configure Bun JavaScript runtime with systemd and reverse proxy

Deploy Bun JavaScript runtime on Linux with automatic service management through systemd and secure SSL reverse proxy configuration with Nginx for production applications.

25 min 6 distros 200 views
security Intermediate

Configure NGINX rate limiting and advanced security rules for DDoS protection

Configure NGINX with comprehensive rate limiting, connection throttling, and advanced security headers to protect your web applications from DDoS attacks and malicious traffic. Learn to implement zone-based rate limiting, geographic blocking, and real-time monitoring for production environments.

25 min 4 distros 243 views
hosting Advanced

Configure OpenResty with PostgreSQL connection pooling for database integration

Set up OpenResty with lua-resty-postgres for high-performance database connection pooling. This tutorial covers installation, connection management, health checks, and security hardening for production web applications.

45 min 4 distros 162 views
hosting Intermediate

Configure Lighttpd 1.4 with multiple virtual hosts and subdomains

Set up Lighttpd web server with multiple virtual hosts, subdomain routing, SSL certificates, and performance optimization for hosting multiple websites on a single server with security hardening.

45 min 4 distros 163 views
networking Intermediate

Install and configure Squid 6 proxy server with bandwidth controls and content filtering

Set up Squid 6 proxy server with advanced traffic shaping, content filtering, and user authentication. Configure bandwidth limits, access control lists, and comprehensive logging for enterprise proxy deployments.

45 min 4 distros 148 views
monitoring Intermediate

Set up multi-location monitoring with distributed Uptime Kuma instances

Deploy multiple Uptime Kuma instances across different geographic locations to monitor your services from various vantage points. This setup provides comprehensive monitoring coverage, reduces false positives, and enables regional performance analysis with centralized alerting.

45 min 4 distros 207 views
security Intermediate

Configure Node.js JWT authentication with Redis session storage and security hardening

Set up secure JWT authentication for Node.js applications with Redis session storage, security middleware, and production-ready hardening practices.

45 min 4 distros 195 views
devops Intermediate

Integrate Redis 7 with microservices architecture for caching and session management

Set up Redis 7 as a centralized caching layer and session store for microservices, with service discovery integration and clustering for high availability. Configure distributed session management patterns and implement Redis clustering for horizontal scalability.

45 min 4 distros 284 views
security Intermediate

Configure SonarQube LDAP authentication and user management with Active Directory integration

Set up enterprise user authentication for SonarQube using LDAP and Active Directory. Configure group mapping, role-based access control, and automated user provisioning for centralized identity management.

45 min 4 distros 208 views
devops Intermediate

Configure Deno application clustering with load balancing for high availability

Set up Deno application clustering with worker threads and HAProxy load balancing for production-grade high availability deployments. Configure health checks, monitoring, and automatic failover mechanisms.

45 min 4 distros 274 views
monitoring Intermediate

Monitor Cherokee web server performance with custom Grafana dashboards and Prometheus alerts

Set up comprehensive monitoring for Cherokee web server with Prometheus metrics collection, custom Grafana dashboards for performance visualization, and automated alerting for critical performance thresholds.

45 min 4 distros 229 views
security Advanced

Configure SSL encryption and authentication for ClamAV cluster with high availability scanning

Set up a secure ClamAV cluster with SSL/TLS encryption, certificate-based authentication, and load balancing for enterprise-grade antivirus scanning. This tutorial covers SSL certificate generation, encrypted inter-node communication, and HAProxy SSL termination.

45 min 4 distros 278 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer