Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxSet up Node.js application security with Helmet and rate limiting
securityInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingInstall and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications
hostingInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesRecently published
Configure systemd service resource limits and security isolation
linuxConfigure NGINX SSL termination with Redis session storage
hostingConfigure intrusion detection with OSSEC and fail2ban integration
securitySet up Varnish 7 cluster with load balancing across multiple backends
performanceConfigure OSSEC active response for automated threat blocking
securityConfigure logrotate with Elasticsearch and Kibana integration for automated log management
Set up automated log rotation with Elasticsearch index lifecycle management and Kibana dashboard integration for scalable log management. Configure retention policies and monitoring alerts for production environments.
Configure Redis 7 cluster sharding for horizontal scaling with automated failover and monitoring
Set up Redis 7 cluster with automatic sharding across multiple nodes for horizontal scaling. Configure hash slots, master-slave replication, and automated failover with comprehensive monitoring.
Configure backup compression and deduplication with BorgBackup and rsync for optimal storage efficiency
Set up automated backup systems with BorgBackup's advanced compression and deduplication alongside rsync strategies for maximum storage efficiency and reliable data protection.
Implement OpenLiteSpeed WAF and DDoS protection with ModSecurity 3 and rate limiting
Set up comprehensive web application security for OpenLiteSpeed with ModSecurity 3 web application firewall, OWASP Core Rule Set for threat protection, and advanced rate limiting to defend against DDoS attacks and malicious traffic.
Monitor MySQL performance with Prometheus and Grafana dashboards
Set up comprehensive MySQL monitoring with Prometheus MySQL Exporter and Grafana dashboards. Track query performance, connections, replication lag, and resource usage with automated alerts for production database health.
Implement MySQL backup automation with Percona XtraBackup and systemd timers
Set up automated MySQL hot backups with Percona XtraBackup, systemd timers, compression, and encryption. Configure backup verification, retention policies, and restoration procedures for production-ready database backup automation.
Configure Zabbix 7 with SSL certificates and database encryption
Secure your Zabbix 7 monitoring infrastructure with SSL certificates for the web interface, encrypted database connections, and TLS-protected agent communication. Essential for production monitoring environments.
Configure AWX backup and disaster recovery procedures with automated PostgreSQL snapshots and restoration
Set up comprehensive backup and disaster recovery for AWX (Ansible Tower) with automated PostgreSQL database snapshots, configuration backups, and tested restoration procedures to ensure business continuity.
Set up GitLab backup and disaster recovery with automated restoration
Configure automated GitLab backups with disaster recovery procedures and automated restoration scripts. Includes monitoring, alerting, and production-grade recovery workflows.
Implement Podman pod security with network policies and microsegmentation
Secure Podman pods with custom network policies, traffic filtering, and microsegmentation using CNI plugins and netavark. Implement zero-trust networking with firewall rules and container isolation.
Implement Ansible AWX Tower for enterprise automation workflows with RBAC and inventory management
Deploy Ansible AWX with Docker Compose for centralized automation management. Configure enterprise RBAC, dynamic inventory sources, and workflow templates for scalable infrastructure orchestration across multiple environments.
Configure SSL certificates and security hardening for Nexus Repository Manager
Secure your Nexus Repository Manager with SSL/TLS certificates, enforce HTTPS connections, and implement comprehensive security hardening including authentication controls, access policies, and audit logging for production environments.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer