Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Install and configure CockroachDB cluster with high availability and distributed SQL
databasesInstall and configure ArgoCD for GitOps continuous deployment with RBAC and SSL
devopsInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesInstall and configure WireGuard VPN server with client management
networkingInstall and configure Loki for centralized log aggregation with Grafana integration
monitoringRecently published
Configure SSL encryption and authentication for ClamAV cluster with high availability scanning
securityImplement MinIO security hardening with IAM policies and audit logging
securitySetup Elasticsearch monitoring with Metricbeat and Kibana dashboards
monitoringConfigure Vault auto-unseal with AWS KMS for high availability secrets management
securityImplement MariaDB connection pooling with ProxySQL for high availability
databasesImplement Kubernetes network policies with Calico CNI and OPA Gatekeeper for security enforcement
Secure your Kubernetes cluster with Calico CNI network policies and OPA Gatekeeper admission control. This tutorial shows you how to implement pod isolation, policy enforcement, and admission validation for production-grade security.
Configure application connection pooling for CockroachDB with PgBouncer and HAProxy
Set up efficient connection pooling for CockroachDB applications using PgBouncer as a connection pool manager and HAProxy for load balancing across multiple database nodes. This configuration reduces database connection overhead and improves application performance.
Setup Tomcat 10 clustering with HAProxy load balancing for high availability
Configure Apache Tomcat 10 clustering with HAProxy load balancing to distribute traffic across multiple application server instances. Implement session replication and automatic failover for production-grade Java web applications with high availability and zero-downtime deployments.
Set up Node.js application security with Helmet and rate limiting
Secure your Node.js Express applications against common vulnerabilities with Helmet.js middleware and implement rate limiting to prevent abuse and DDoS attacks.
Configure Nginx Redis caching with SSL authentication and security hardening
Set up high-performance Nginx caching with Redis backend using SSL/TLS encryption and authentication. This tutorial covers Redis 7 SSL configuration, Nginx cache module setup, and comprehensive security hardening for production environments.
Configure GitLab SAML authentication with Keycloak for enterprise SSO
Set up single sign-on (SSO) authentication between GitLab and Keycloak using SAML 2.0 protocol. This enables centralized user management and secure authentication for your GitLab instance through your existing identity provider infrastructure.
Monitor HAProxy and Consul with Prometheus and Grafana dashboards
Configure comprehensive monitoring for HAProxy load balancer and Consul service discovery using Prometheus metrics collection and Grafana visualization dashboards. This tutorial covers setting up exporters, configuring scraping targets, and creating production-ready monitoring dashboards.
Implement Nginx Redis cluster caching for high availability
Set up a Redis cluster with Nginx caching for high availability and improved performance. This configuration provides distributed caching with automatic failover and enhanced scalability for production web applications.
Configure Kibana LDAP authentication and RBAC with Active Directory integration
Set up secure Kibana authentication using Active Directory LDAP with role-based access control to manage user permissions and streamline enterprise login workflows. This tutorial covers Elasticsearch security configuration, LDAP realm setup, and user role mappings.
Setup Elasticsearch 8 SSL/TLS encryption and advanced security hardening with authentication and access control
Secure your Elasticsearch 8 cluster with comprehensive SSL/TLS encryption, user authentication, role-based access control, and network hardening. This tutorial covers production-grade security configuration to protect your search infrastructure.
Integrate SNMP monitoring with InfluxDB and Telegraf for time-series analysis
Learn to set up a comprehensive SNMP monitoring solution using InfluxDB 2.7 for time-series storage and Telegraf for data collection. Configure monitoring for network devices, system metrics, and create visualization dashboards with Grafana.
Implement Kubernetes resource quotas and limits for namespace isolation and workload management
Configure namespace resource quotas, container resource limits, and limit ranges to ensure fair resource allocation and prevent resource exhaustion in multi-tenant Kubernetes clusters.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer