Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

performance Advanced

Implement NGINX Lua scripting for advanced caching logic with OpenResty

Configure OpenResty with Lua scripting for advanced caching strategies including dynamic cache keys, intelligent TTL management, and conditional cache invalidation based on business logic.

45 min 4 distros 557 views
databases Intermediate

Configure MinIO backup and disaster recovery with automated snapshots and replication

Configure comprehensive backup and disaster recovery for MinIO object storage with automated snapshots, cross-site replication, and encryption. Implement production-ready backup strategies to protect critical data and ensure business continuity.

45 min 4 distros 434 views
security Advanced

Implement Consul ACL security and encryption for production deployments

Configure Consul's Access Control List (ACL) system with bootstrap tokens, implement TLS encryption for client-server communication, and enable gossip encryption to secure your Consul cluster for production environments with comprehensive authentication and authorization.

45 min 4 distros 573 views
security Advanced

Configure advanced iptables rules for bridge network security and container isolation

Implement comprehensive bridge network security using advanced iptables rules to isolate containers, control traffic flow, and prevent lateral movement in virtualized environments.

45 min 4 distros 602 views
hosting Intermediate

Configure Cherokee web server reverse proxy and load balancing with SSL

Set up Cherokee web server with reverse proxy capabilities, load balancing across backend servers, and SSL encryption for high-performance production environments.

45 min 4 distros 470 views
networking Intermediate

Configure NTP server with chrony and security hardening for precise time synchronization

Set up a production-grade NTP server using chrony with client access controls, firewall rules, and security hardening. Learn to configure upstream time sources, implement monitoring, and troubleshoot common synchronization issues.

35 min 4 distros 682 views
databases Advanced

Configure MariaDB 11.6 master-slave replication with SSL encryption and automatic failover

Set up production-grade MariaDB master-slave replication with SSL/TLS encryption for secure data transmission and MaxScale for automatic failover and load balancing.

45 min 4 distros 476 views
devops Intermediate

Deploy Deno applications with Docker containers and production optimization

Learn how to containerize Deno applications with Docker using multi-stage builds, security hardening, and production-ready configuration. This tutorial covers creating optimized Dockerfiles, implementing proper caching strategies, and deploying with Docker Compose for scalable web applications.

35 min 4 distros 372 views
security Intermediate

Configure Apache rate limiting and DDoS protection with mod_security and mod_evasive

Set up comprehensive Apache protection against DDoS attacks and malicious traffic using mod_evasive for rate limiting, mod_security with OWASP rules for web application firewall capabilities, and fail2ban integration for automated IP blocking.

25 min 4 distros 474 views
databases Intermediate

Set up MySQL backup encryption and remote storage with rsync

Create automated MySQL backups with GPG encryption and secure remote storage using rsync and SSH keys. This tutorial covers database dumping, compression, encryption, and automated synchronization to remote servers.

45 min 4 distros 512 views
databases Intermediate

Configure application connection pooling for CockroachDB with PgBouncer and HAProxy

Set up efficient connection pooling for CockroachDB applications using PgBouncer as a connection pool manager and HAProxy for load balancing across multiple database nodes. This configuration reduces database connection overhead and improves application performance.

45 min 4 distros 476 views
security Intermediate

Set up Node.js application security with Helmet and rate limiting

Secure your Node.js Express applications against common vulnerabilities with Helmet.js middleware and implement rate limiting to prevent abuse and DDoS attacks.

25 min 4 distros 931 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer