Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

databases Advanced

Optimize CockroachDB 24.3 performance with advanced tuning and configuration

Master advanced CockroachDB 24.3 performance optimization through memory, CPU, storage, and query tuning. Configure cluster parameters, connection pooling, and indexing strategies for production-grade distributed SQL workloads.

45 min 4 distros 19 views
linux Intermediate

Configure system backup automation with BorgBackup and systemd timers

Set up automated, deduplicated backups with BorgBackup and systemd timers for reliable system protection. This tutorial covers installation, repository setup with encryption, automated scheduling, and monitoring for production environments.

45 min 4 distros 25 views
devops Advanced

Advanced Nomad job templates and deployment strategies with rolling updates and canary deployments

Master production-grade Nomad job templates with HCL syntax, implement rolling updates with health checks, and deploy advanced blue-green and canary deployment patterns for resilient containerized workloads.

45 min 4 distros 74 views
monitoring Intermediate

Configure Linux system performance monitoring with sar and sysstat for real-time metrics collection

Set up comprehensive system performance monitoring using sar and sysstat to collect CPU, memory, disk I/O, and network metrics with automated reporting and custom alerting for production Linux servers.

25 min 4 distros 41 views
monitoring Intermediate

Set up ClickHouse monitoring with Prometheus and Grafana dashboards

Configure comprehensive ClickHouse monitoring using Prometheus for metrics collection and Grafana for visualization. Set up system metrics, query performance monitoring, and alerting rules for production ClickHouse deployments.

45 min 4 distros 106 views
security Advanced

Configure advanced Consul ACL policies for production security hardening

Set up comprehensive Consul Access Control Lists with bootstrap tokens, role-based permissions, and secure inter-node communication for production environments. This tutorial covers ACL system initialization, policy creation, and agent token configuration.

35 min 4 distros 97 views
security Advanced

Configure Kibana 8 advanced security with field-level restrictions and role-based access control

Implement comprehensive security controls in Kibana 8 with field-level restrictions, document-level security, and role-based access control for production Elasticsearch deployments.

45 min 4 distros 65 views
devops Intermediate

Configure Deno application clustering with load balancing for high availability

Set up Deno application clustering with worker threads and HAProxy load balancing for production-grade high availability deployments. Configure health checks, monitoring, and automatic failover mechanisms.

45 min 4 distros 120 views
monitoring Intermediate

Set up network monitoring with Nagios Core 4.5 and SNMP for infrastructure alerting

Configure Nagios Core 4.5 with SNMP monitoring to track network devices, servers, and services with automated alerting. Set up custom monitoring templates, notification systems, and dashboards for comprehensive infrastructure visibility.

45 min 4 distros 48 views
monitoring Intermediate

Monitor Cherokee web server performance with custom Grafana dashboards and Prometheus alerts

Set up comprehensive monitoring for Cherokee web server with Prometheus metrics collection, custom Grafana dashboards for performance visualization, and automated alerting for critical performance thresholds.

45 min 4 distros 85 views
security Advanced

Configure SSL encryption and authentication for ClamAV cluster with high availability scanning

Set up a secure ClamAV cluster with SSL/TLS encryption, certificate-based authentication, and load balancing for enterprise-grade antivirus scanning. This tutorial covers SSL certificate generation, encrypted inter-node communication, and HAProxy SSL termination.

45 min 4 distros 102 views
security Advanced

Implement MinIO security hardening with IAM policies and audit logging

Secure your MinIO object storage with comprehensive IAM policies, role-based access control, and audit logging for compliance monitoring. This tutorial covers user management, policy creation, and security validation for production environments.

45 min 4 distros 173 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer