Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

hosting Beginner

Install and configure Waitress WSGI server with SSL certificates for Python web applications

Deploy production-ready Python web applications using Waitress WSGI server with SSL certificates, systemd service management, and reverse proxy configuration for Flask and Django applications.

25 min 6 distros 272 views
hosting Beginner

Install and configure Tengine web server with SSL certificates and performance optimization

Install Tengine web server from source and packages, configure virtual hosts with SSL certificates, and optimize performance with dynamic upstream health checks and security hardening.

45 min 6 distros 217 views
hosting Beginner

Install and configure uWSGI application server with Nginx reverse proxy for Python web applications

Set up a production-ready Python web application stack with uWSGI as the WSGI server and Nginx as a reverse proxy. Includes SSL certificate setup, systemd service configuration, and troubleshooting guide for Django and Flask deployments.

25 min 6 distros 209 views
linux Beginner

Configure Linux text editors with vim and nano for system administration

Learn to configure vim and nano text editors for efficient Linux system administration. Master keyboard shortcuts, create custom .vimrc configurations, and choose the right editor for different tasks.

25 min 6 distros 233 views
hosting Beginner

Install and configure Go web applications with systemd and reverse proxy

Deploy Go web applications in production with systemd service management, NGINX reverse proxy with SSL termination, and comprehensive logging for monitoring and maintenance.

25 min 6 distros 261 views
security Advanced

Set up Grafana Enterprise SSO authentication with LDAP, SAML, and OAuth2 integration

Configure Grafana Enterprise with comprehensive single sign-on authentication supporting LDAP, SAML, and OAuth2 providers. Set up role-based access control with automated team mapping and user provisioning for enterprise environments.

45 min 4 distros 220 views
linux Beginner

Configure shell aliases and functions for development productivity

Set up custom shell aliases and functions to streamline your development workflow, reduce typing, and boost terminal productivity with reusable commands and automation shortcuts.

20 min 4 distros 175 views
monitoring Intermediate

Monitor Django applications with Prometheus and Grafana for comprehensive performance insights

Set up comprehensive Django application monitoring using Prometheus metrics collection and Grafana dashboards. Configure django-prometheus middleware to track request metrics, database queries, and application performance with real-time alerting.

45 min 4 distros 287 views
linux Intermediate

Configure Linux user session limits with systemd and pam_limits for resource management

Learn to set up comprehensive user session resource limits using both traditional pam_limits.conf and modern systemd user slices. This tutorial covers memory, CPU, and process limits to prevent resource exhaustion on multi-user systems.

25 min 4 distros 155 views
security Intermediate

Configure SSH port forwarding and tunneling for secure connections

Learn to configure SSH port forwarding, remote tunnels, and SOCKS proxy for secure network connections. Set up local, remote, and dynamic port forwarding with automated monitoring and security hardening.

35 min 4 distros 180 views
hosting Advanced

Configure OpenResty with PostgreSQL connection pooling for database integration

Set up OpenResty with lua-resty-postgres for high-performance database connection pooling. This tutorial covers installation, connection management, health checks, and security hardening for production web applications.

45 min 4 distros 172 views
security Intermediate

Set up OSSEC agent deployment and centralized management with automated configuration

Deploy and manage OSSEC Host-based Intrusion Detection System (HIDS) across multiple servers with centralized monitoring, automated agent configuration, and real-time security event processing for enterprise-scale infrastructure protection.

45 min 4 distros 267 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer