Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

monitoring Advanced

Install and configure Graylog 5 for centralized log management with MongoDB and Elasticsearch

Set up Graylog 5 with MongoDB 8.0 and Elasticsearch 8 for centralized log collection, analysis, and alerting. Learn to configure secure inputs, data streams, and monitoring for production environments.

45 min 4 distros 71 views
security Intermediate

Configure NGINX rate limiting and advanced security rules for DDoS protection

Configure NGINX with comprehensive rate limiting, connection throttling, and advanced security headers to protect your web applications from DDoS attacks and malicious traffic. Learn to implement zone-based rate limiting, geographic blocking, and real-time monitoring for production environments.

25 min 4 distros 90 views
databases Intermediate

Implement Redis backup automation with compression and encryption

Set up automated Redis backups with compression and GPG encryption for production environments. Create systemd timers for scheduled backups and implement secure remote storage for Redis data protection.

25 min 4 distros 108 views
databases Intermediate

Implement MongoDB 8.0 change streams for real-time data processing and application synchronization

Set up MongoDB 8.0 change streams to monitor database changes in real-time. Configure replica sets, implement Python and Node.js clients, and add filtering and resumability for production applications.

45 min 4 distros 99 views
monitoring Intermediate

Set up OpenTelemetry custom instrumentation and metrics collection with Prometheus integration

Configure OpenTelemetry Collector with custom metrics exporters and processors, set up application instrumentation with SDKs, and integrate with Prometheus and Grafana for comprehensive distributed system monitoring and observability.

45 min 4 distros 118 views
databases Advanced

Implement ScyllaDB disaster recovery with cross-region replication

Set up ScyllaDB multi-region cluster with automated backup strategies, cross-datacenter replication, and failover automation for enterprise-grade disaster recovery and business continuity.

180 min 4 distros 90 views
security Advanced

Configure OpenVPN LDAP authentication for enterprise users with Active Directory integration

Set up OpenVPN server with LDAP authentication against Active Directory, enabling centralized user management and group-based access control for enterprise VPN deployments.

45 min 4 distros 114 views
hosting Advanced

Configure OpenResty with PostgreSQL connection pooling for database integration

Set up OpenResty with lua-resty-postgres for high-performance database connection pooling. This tutorial covers installation, connection management, health checks, and security hardening for production web applications.

45 min 4 distros 69 views
databases Advanced

Set up Redis 7 cluster with multiple master nodes for high availability and horizontal scaling

Configure a production-ready Redis 7 cluster with multiple master nodes and replicas for high availability, automatic failover, and horizontal data distribution. Includes cluster initialization, topology configuration, and comprehensive health monitoring.

45 min 4 distros 79 views
security Intermediate

Configure SonarQube LDAP authentication with Active Directory and user group management

Set up SonarQube to authenticate users against Active Directory using LDAP. Configure automatic user provisioning, group synchronization, and role-based access control for enterprise environments with centralized authentication.

25 min 4 distros 78 views
security Advanced

Implement HAProxy WAF integration with ModSecurity 3 for advanced threat protection

Configure HAProxy with ModSecurity 3 using SPOE protocol to create a high-performance web application firewall that protects against OWASP Top 10 threats while maintaining load balancing capabilities.

45 min 4 distros 111 views
security Intermediate

Set up centralized logging with rsyslog and logrotate for security events

Configure a centralized rsyslog server to collect security events from multiple systems, implement automated log rotation with logrotate, and set up filtering and alerting for critical security incidents across your infrastructure.

45 min 4 distros 96 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer