Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxSet up Node.js application security with Helmet and rate limiting
securityInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingInstall and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications
hostingInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesRecently published
Configure Cassandra SSL encryption and authentication with security hardening
databasesInstall and configure ntopng for comprehensive network monitoring with traffic analysis and real-time dashboards
networkingOptimize Cassandra data modeling and query performance with advanced tuning and monitoring
databasesMonitor system time drift with Prometheus and Grafana alerts
monitoringSet up Cassandra backup automation with nodetool
databasesConfigure systemd service resource limits and security isolation
Configure cgroups v2 resource limits and security isolation for systemd services to prevent resource exhaustion and improve system security. This tutorial covers memory, CPU, and I/O limits with monitoring and troubleshooting.
Configure NGINX HTTP/2 server push and connection multiplexing
Configure NGINX HTTP/2 server push and connection multiplexing to reduce page load times by up to 50% through proactive resource delivery and efficient connection reuse for high-performance web applications.
Integrate ModSecurity 3 with SOAR platforms for automated incident response and threat detection
Set up ModSecurity 3 with structured logging, webhook notifications, and API integrations to automatically feed security events into SOAR platforms for real-time threat detection and incident response workflows.
Set up ELK Stack for centralized ModSecurity log analysis and monitoring
Configure Elasticsearch 8, Logstash 8, and Kibana 8 to collect, parse, and visualize ModSecurity web application firewall logs from multiple servers for centralized security monitoring and threat detection.
Implement network security policies with iptables and firewalld for enterprise infrastructure protection
Configure enterprise-grade network security with iptables and firewalld, implementing zone-based policies, advanced rules, and comprehensive logging for production infrastructure protection.
Implement Tailscale OAuth integration with identity providers for enterprise authentication
Configure Tailscale with enterprise identity providers including SAML and OIDC authentication, implement access control policies, and manage users across distributed teams for secure zero-trust networking.
Integrate Apache Tomcat 11 with Prometheus and Grafana monitoring for comprehensive performance tracking
Set up comprehensive monitoring for Apache Tomcat 11 using JMX Prometheus Java agent, configure Prometheus to scrape metrics, create detailed Grafana dashboards, and implement alerting rules for performance tracking and health monitoring.
Configure Linux process scheduling and CPU affinity for performance optimization
Learn to optimize Linux process performance by configuring CPU scheduling priorities, CPU affinity, and systemd resource management for better workload distribution and reduced context switching.
Implement OpenLiteSpeed WAF and DDoS protection with ModSecurity 3 and rate limiting
Set up comprehensive web application security for OpenLiteSpeed with ModSecurity 3 web application firewall, OWASP Core Rule Set for threat protection, and advanced rate limiting to defend against DDoS attacks and malicious traffic.
Set up OpenLiteSpeed with Docker containers for development
Deploy OpenLiteSpeed web server in Docker containers with PHP-FPM, SSL certificates, and persistent volumes for scalable development environments.
Configure Kubernetes resource quotas and limit ranges for namespace-level resource management
Set up Kubernetes resource quotas and limit ranges to control CPU, memory, and storage consumption at the namespace level. This tutorial covers implementing resource constraints, monitoring usage, and troubleshooting quota issues for multi-tenant cluster management.
Set up Apache Airflow performance monitoring with DataDog agent integration and custom dashboards
Configure comprehensive Apache Airflow monitoring using DataDog agent to track DAG performance, task execution metrics, and resource utilization with custom dashboards and automated alerting for production workflow management.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer