Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Install and configure CockroachDB cluster with high availability and distributed SQL
databasesInstall and configure ArgoCD for GitOps continuous deployment with RBAC and SSL
devopsConfigure network interface monitoring with ICMP ping and connectivity testing
networkingInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesInstall and configure Loki for centralized log aggregation with Grafana integration
monitoringRecently published
Monitor Elasticsearch cluster with Prometheus and Grafana dashboards
monitoringImplement Redis backup automation with RDB and AOF persistence
databasesSet up keepalived cluster monitoring with Prometheus alerts and Grafana dashboards
monitoringImplement Prometheus federation for multi-cluster monitoring with centralized metrics aggregation
monitoringConfigure SonarQube LDAP authentication and user management with Active Directory integration
securityInstall and configure Nagios Core 4.5 for network and server monitoring with web interface
Set up Nagios Core 4.5 monitoring system with Apache web interface to monitor servers, network devices, and services. Configure hosts, services, and email notifications for comprehensive infrastructure monitoring.
Configure Linux file permissions and access control with umask and chmod best practices
Learn how to configure secure Linux file permissions using chmod, set default permissions with umask, and implement proper access control to prevent security vulnerabilities while fixing permission denied errors.
Configure SSH key authentication and disable password login for secure server access
Set up SSH public key authentication on Linux servers and disable password-based logins to prevent brute force attacks and improve security. This tutorial covers key generation, server configuration, and troubleshooting common authentication issues.
Install and configure ScyllaDB cluster with replication and performance tuning
Set up a production-ready ScyllaDB cluster with multi-node configuration, automatic replication, and performance optimization. ScyllaDB provides 10x better performance than Cassandra with drop-in compatibility.
Configure OSPF dynamic routing with FRRouting for enterprise network failover
Set up Open Shortest Path First (OSPF) protocol using FRRouting for dynamic network routing, multi-area configurations, and automatic failover in enterprise environments.
Configure Linux system time synchronization with chrony and NTP hardening
Set up reliable time synchronization with chrony NTP client, configure secure time servers, and implement monitoring to prevent time drift on production servers.
Configure Apache Cassandra cluster with multi-node setup and performance optimization
Set up a production-ready Apache Cassandra cluster with multiple nodes, configure replication strategies, and optimize JVM settings and performance parameters for high-throughput distributed NoSQL workloads.
Optimize Nginx caching performance with Redis backend and memory tuning for high-traffic websites
Supercharge your web application performance by integrating Redis as a caching backend for Nginx using lua-resty-redis. This tutorial covers Redis memory optimization, Nginx worker tuning, and comprehensive performance testing for production environments.
Configure OSSEC HIDS for intrusion detection with email alerts and real-time monitoring
Set up OSSEC Host-based Intrusion Detection System with server-agent architecture, custom detection rules, email notifications, and real-time monitoring for comprehensive security monitoring across multiple systems.
Install and configure CockroachDB cluster with high availability and distributed SQL
Set up a production-ready CockroachDB cluster with SSL certificates, load balancing, and automated backups for distributed SQL workloads. This tutorial covers multi-node deployment, security hardening, and performance optimization for enterprise environments.
Install and configure Varnish Cache 7 with NGINX backend for high-performance web acceleration
Set up Varnish Cache 7 as a high-performance HTTP accelerator with NGINX backend integration. This tutorial covers installation, SSL termination, cache optimization, purging mechanisms, and monitoring for production environments.
Configure Linux user session limits with systemd and pam_limits for resource management
Set up comprehensive user session resource limits using systemd and PAM to prevent resource exhaustion, fix 'too many open files' errors, and enforce memory, CPU, and process restrictions for better system stability.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer