Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

hosting Intermediate

Install and configure OpenResty web server with Lua scripting and performance optimization

Set up OpenResty as a high-performance web server and API gateway with embedded Lua scripting capabilities, SSL certificates, and advanced caching optimization for production workloads.

45 min 6 distros 580 views
performance Intermediate

Optimize HAProxy performance with connection pooling and advanced load balancing algorithms

Configure HAProxy with connection pooling, advanced load balancing algorithms, and performance tuning for high-throughput workloads. Learn to implement least-conn, URI hashing, and buffer optimization.

25 min 6 distros 713 views
performance Intermediate

Optimize Apache HTTP server performance with caching, compression and worker tuning

Boost Apache performance through worker MPM optimization, compression modules, and intelligent caching strategies. Achieve 3-5x performance improvements for high-traffic production workloads.

35 min 6 distros 545 views
linux Intermediate

Configure Linux system firewall with nftables and security hardening

Learn how to configure nftables firewall with advanced security rules, rate limiting, and fail2ban integration. This tutorial covers migration from iptables, logging configuration, and production-grade security hardening for modern Linux systems.

45 min 6 distros 730 views
hosting Intermediate

Install and configure Lighttpd web server with SSL and FastCGI for lightweight hosting

Set up Lighttpd web server with SSL certificates from Let's Encrypt and FastCGI support for PHP applications. Configure virtual hosts, optimize performance, and implement security hardening for production hosting.

25 min 6 distros 494 views
hosting Beginner

Install and configure Caddy web server with automatic HTTPS and reverse proxy

Set up Caddy, a modern web server with automatic HTTPS certificates from Let's Encrypt, zero-config HTTP/2, and built-in reverse proxy capabilities for production applications.

25 min 6 distros 1,624 views
linux Intermediate

Configure Linux system logging with rsyslog and journald for centralized log management

Set up comprehensive Linux logging infrastructure using rsyslog for traditional syslog handling and journald for systemd service logs. Configure remote logging, log rotation, filtering rules, and troubleshoot common logging performance issues.

25 min 6 distros 855 views
hosting Intermediate

Configure Apache web server with virtual hosts and SSL certificates

Set up Apache HTTP server with multiple virtual hosts, secure SSL certificates from Let's Encrypt, and implement security hardening for production workloads.

45 min 6 distros 595 views
hosting Intermediate

Setup nginx reverse proxy with SSL certificates and security hardening

Configure nginx as a secure reverse proxy with Let's Encrypt SSL certificates, security headers, and DDoS protection. Learn to proxy backend applications, implement rate limiting, and harden your web server configuration.

35 min 4 distros 472 views
devops Intermediate

Configure GitLab container registry with SSL certificates and security hardening

Set up GitLab's integrated Docker registry with SSL/TLS encryption, security headers, and production-ready hardening for secure container image storage and distribution.

45 min 4 distros 423 views
networking Advanced

Configure Envoy proxy rate limiting and circuit breakers for microservices resilience

Learn to implement production-grade Envoy proxy with global and local rate limiting, circuit breakers, and health checks to build resilient microservices architecture that can handle traffic spikes and service failures gracefully.

45 min 4 distros 641 views
security Intermediate

Configure NGINX rate limiting and DDoS protection with advanced security rules

Learn to configure production-grade NGINX rate limiting and DDoS protection with multiple security zones, advanced rules, and real-time monitoring to protect your web applications from malicious traffic and resource exhaustion attacks.

45 min 4 distros 534 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer