Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Install and configure Deno for web development with systemd and reverse proxy
hostingInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingInstall and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications
hostingInstall and configure Ollama for local AI models on Linux servers
devopsConfigure Linux system time synchronization with chrony and NTP hardening
linuxRecently published
Configure Kafka Streams state stores and RocksDB optimization for high-performance streaming applications
devopsImplement Django continuous deployment with Git hooks and automated testing
devopsConfigure Django Redis caching and session storage for high-performance web applications
performanceSet up Kafka Streams testing framework with TopologyTestDriver for automated stream processing validation
devopsBenchmark database performance with sysbench and fio integration
databasesImplement FastAPI authentication with JWT and OAuth2 for secure API development
Build secure FastAPI applications with JWT token authentication and OAuth2 password bearer flows. Learn to implement role-based access control and protect API endpoints with production-ready security patterns.
Implement Kubernetes network policies with Calico CNI and OPA Gatekeeper for security enforcement
Secure your Kubernetes cluster with Calico CNI network policies and OPA Gatekeeper admission control. This tutorial shows you how to implement pod isolation, policy enforcement, and admission validation for production-grade security.
Implement Kubernetes resource quotas and limits for namespace isolation and workload management
Configure namespace resource quotas, container resource limits, and limit ranges to ensure fair resource allocation and prevent resource exhaustion in multi-tenant Kubernetes clusters.
Configure Linux environment variables and PATH management for development workflows
Learn how to properly configure Linux environment variables and manage your PATH for development workflows. This guide covers temporary and persistent variables, user vs system-wide configuration, and troubleshooting common issues across Ubuntu, Debian, AlmaLinux, Rocky Linux, and Fedora.
Integrate SonarQube with Kubernetes and Helm charts for automated code quality scanning
Deploy SonarQube on Kubernetes using Helm charts with PostgreSQL database, configure automated code scanning workflows, and implement persistent storage for comprehensive code quality analysis in your CI/CD pipeline.
Integrate SonarQube with Kubernetes security scanning workflows for continuous code quality analysis
Set up SonarQube scanner in Kubernetes pods with admission controllers for automated security scanning. Configure CI/CD pipeline integration and security reporting for continuous code quality analysis in containerized environments.
Set up SonarQube branch analysis with pull request decoration for enhanced code quality workflows
Configure SonarQube Developer Edition with branch analysis capabilities and pull request decoration for GitHub and GitLab. Implement automated code quality checks in CI/CD pipelines with comprehensive branch coverage and merge request feedback.
Configure Ansible AWX 24.6 for enterprise automation with RBAC and inventory management
Deploy Ansible AWX 24.6 with Docker Compose, PostgreSQL backend, and enterprise-grade RBAC. Set up dynamic inventory management with multiple sources and implement automated job workflows with notifications for production environments.
Configure GitLab LDAP authentication and user management with Active Directory integration
Set up GitLab LDAP authentication with Active Directory to centralize user management, enable automatic user provisioning, and implement group-based access control for your GitLab instance.
Setup SonarQube scanner for multiple programming languages with automated code quality analysis
Configure SonarQube Scanner CLI to analyze Java, Python, JavaScript, and C# projects with automated quality gates and CI/CD integration. Streamline code quality analysis across your entire development pipeline with Docker and Jenkins automation.
Secure Podman containers with SELinux and AppArmor mandatory access controls
Implement mandatory access controls for Podman containers using SELinux on Red Hat-based systems and AppArmor on Debian-based systems. Learn to configure security policies, monitor violations, and harden container security with production-grade controls.
Implement Cilium Tetragon runtime security for Kubernetes with eBPF monitoring and threat detection
Deploy Cilium Tetragon for advanced runtime security monitoring in Kubernetes clusters using eBPF technology. Configure security policies, threat detection rules, and real-time monitoring with Grafana dashboards for comprehensive container protection.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer