Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

hosting Intermediate

Implement Lighttpd 1.4 load balancing with multiple backend servers for high availability

Configure Lighttpd 1.4 with mod_proxy for load balancing across multiple backend web servers. Set up health checks, SSL termination, and failover mechanisms for production environments.

45 min 4 distros 87 views
monitoring Intermediate

Set up Linux storage monitoring with smartmontools and automated health alerts

Monitor disk health and prevent storage failures with S.M.A.R.T monitoring, automated email alerts, and custom dashboards. Covers smartd daemon configuration, health checks, and integration with monitoring systems.

25 min 4 distros 80 views
security Intermediate

Implement Caddy 2 rate limiting and DDoS protection with advanced security rules

Configure Caddy 2 web server with comprehensive rate limiting, request throttling, and DDoS protection using built-in security modules and advanced filtering rules.

45 min 4 distros 86 views
monitoring Intermediate

Implement log-based monitoring and alerting with Grafana and Loki

Set up comprehensive log aggregation with Loki, centralized visualization with Grafana dashboards, and automated alerting rules for proactive incident response across your infrastructure.

45 min 4 distros 105 views
hosting Intermediate

Configure Apache reverse proxy and load balancing for high availability

Set up Apache as a reverse proxy with load balancing across multiple backend servers. Configure health checks, SSL termination, and failover for production high availability deployments.

45 min 4 distros 84 views
monitoring Intermediate

Configure ELK stack for centralized logging with Elasticsearch 8, Logstash 8, and Kibana 8

Set up a production-grade ELK stack with Elasticsearch 8, Logstash 8, and Kibana 8 for centralized log management. Configure authentication, SSL encryption, and log processing pipelines across multiple data sources.

45 min 4 distros 94 views
databases Advanced

Setup automated backup verification and recovery testing with PostgreSQL, MySQL and filesystem backups

Build a comprehensive backup verification framework that automatically tests database restores, validates filesystem backups, and performs recovery testing using systemd timers and custom scripts.

45 min 4 distros 100 views
security Intermediate

Implement Linux security hardening with CIS benchmarks and automated compliance scanning

Harden your Linux systems using CIS benchmarks with automated compliance scanning and continuous monitoring. Learn to implement security controls for filesystem permissions, user authentication, network policies, and maintain ongoing compliance with industry standards.

45 min 4 distros 83 views
security Intermediate

Configure NGINX rate limiting and DDoS protection with advanced security rules

Set up NGINX rate limiting modules, implement connection limits, and configure geographic blocking to protect your web applications from DDoS attacks and abuse.

25 min 4 distros 94 views
linux Intermediate

Configure centralized logging with rsyslog and logrotate for system monitoring and log management

Set up a centralized logging system using rsyslog server to collect logs from multiple clients, implement TLS encryption for secure transmission, and configure logrotate for automated log rotation and management.

45 min 4 distros 132 views
networking Advanced

Implement WireGuard multi-site mesh networking with automatic routing and failover

Deploy a scalable WireGuard mesh network across multiple sites with automatic routing, failover mechanisms, and centralized management for high-availability site-to-site connectivity.

45 min 4 distros 147 views
security Advanced

Integrate WireGuard VPN server with LDAP authentication for enterprise user management

Configure WireGuard VPN server to authenticate users against LDAP directory services like Active Directory. Automate client certificate management and implement centralized user access control for enterprise environments.

45 min 4 distros 140 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer