Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxSet up Node.js application security with Helmet and rate limiting
securityInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesInstall and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications
hostingRecently published
Integrate ModSecurity 3 with SOAR platforms for automated incident response and threat detection
securityMonitor Node.js applications with Prometheus and Grafana for comprehensive performance metrics
monitoringSet up PostgreSQL 17 streaming replication with PgBouncer connection pooling and load balancing
databasesSet up ELK Stack for centralized ModSecurity log analysis and monitoring
securityImplement network security policies with iptables and firewalld for enterprise infrastructure protection
securityImplement automated ClickHouse backups with S3 storage and monitoring
Set up automated backup solutions for ClickHouse databases with S3 storage, retention policies, and monitoring alerts. This tutorial covers backup tool installation, S3 configuration, scheduling with systemd timers, and health monitoring.
Implement PHP application monitoring with New Relic and logging
Set up comprehensive PHP application monitoring using New Relic APM with custom metrics and error tracking. Configure structured logging with centralized collection and automated monitoring alerts.
Implement Apache web application firewall with ModSecurity 3 and OWASP Core Rule Set
Deploy ModSecurity 3 as an Apache module with OWASP Core Rule Set to protect web applications from common attacks. Configure real-time logging, custom rules, and automated threat detection for production environments.
Implement HAProxy rate limiting and DDoS protection with advanced security rules
Configure HAProxy with comprehensive rate limiting, connection throttling, and DDoS protection using stick tables, ACLs, and advanced security rules to protect your applications from malicious traffic and ensure service availability.
Setup remote backup storage with S3-compatible encryption and automated retention policies
Configure secure, encrypted backup storage using S3-compatible providers with automated retention policies, client-side GPG encryption, and monitoring scripts for reliable data protection.
Configure advanced iptables rules for bridge network security and container isolation
Implement comprehensive bridge network security using advanced iptables rules to isolate containers, control traffic flow, and prevent lateral movement in virtualized environments.
Configure network monitoring with SNMP and Grafana dashboards for infrastructure visibility
Set up comprehensive network monitoring using SNMP with Prometheus and Grafana to monitor network devices, collect performance metrics, and create visual dashboards for infrastructure visibility.
Implement Varnish cache warming with automated content preloading for high-performance websites
Set up automated Varnish cache warming with priority URL preloading, systemd timers for scheduled content refreshing, and comprehensive monitoring to optimize cache hit rates and reduce backend server load for high-traffic websites.
Configure Linux audit logging for security compliance and monitoring
Set up comprehensive audit logging with auditd daemon to track file system changes, process execution, and network connections for security compliance and forensic analysis.
Setup centralized log aggregation with Elasticsearch 8, Logstash 8, and Kibana 8 (ELK Stack)
Deploy a production-ready ELK stack for centralized log aggregation with Elasticsearch 8, Logstash 8, and Kibana 8. Configure secure log shipping from multiple sources with authentication and SSL encryption.
Set up automated MySQL database backups with compression and rotation
Create production-grade MySQL backup automation with gzip compression, logrotate management, and systemd timer scheduling. Includes integrity checking and email notifications for reliable database protection.
Configure network interface monitoring with ICMP ping and connectivity testing
Set up automated network connectivity monitoring using ICMP ping tests with email alerts for interface failures. Create comprehensive network health checks and reporting for production systems.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer