Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxInstall and configure CockroachDB cluster with high availability and distributed SQL
databasesInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesConfigure network interface monitoring with ICMP ping and connectivity testing
networkingInstall and configure ArgoCD for GitOps continuous deployment with RBAC and SSL
devopsRecently published
Set up GitLab container registry mirror and proxy cache for improved performance
devopsConfigure SonarQube quality gates and custom rules for enterprise code analysis
devopsSet up Consul multi-datacenter replication with ACL token replication
devopsSet up Kafka Connect cluster with high availability and load balancing
devopsIntegrate AWX 24.6 with HashiCorp Vault for dynamic secrets management and secure automation workflows
devopsSet up GitLab container registry mirror and proxy cache for improved performance
Configure GitLab's built-in container registry as a mirror and proxy cache to reduce Docker Hub rate limits, speed up image pulls, and improve CI/CD pipeline performance across your organization.
Configure SonarQube quality gates and custom rules for enterprise code analysis
Set up SonarQube quality gates with custom conditions and coding rules to enforce enterprise-grade code quality standards. Configure LDAP authentication and integrate with CI/CD pipelines for automated code analysis workflows.
Integrate AWX 24.6 with HashiCorp Vault for dynamic secrets management and secure automation workflows
Configure AWX to securely retrieve database credentials and API keys from HashiCorp Vault using dynamic secrets that automatically rotate. Set up credential types, database engines, and secure playbook execution with centralized secrets management.
Implement GitLab CI/CD security scanning for Docker images
Set up automated container vulnerability scanning in GitLab CI/CD pipelines with Trivy and registry integration. Implement security gates, quality controls, and automated reporting for production-ready DevSecOps workflows.
Configure Zabbix 7 with SSL certificates and database encryption
Secure your Zabbix 7 monitoring infrastructure with SSL certificates for the web interface, encrypted database connections, and TLS-protected agent communication. Essential for production monitoring environments.
Set up Zabbix proxy for distributed network monitoring
Configure Zabbix proxy servers to distribute monitoring load across multiple network segments, reduce server load, and monitor remote locations through secure proxy connections.
Implement Envoy proxy JWT authentication with OAuth2 integration
Configure Envoy proxy with JWT authentication filters integrated with Keycloak OAuth2 provider for secure microservices communication and advanced rate limiting policies.
Implement Grafana high availability clustering with PostgreSQL backend and load balancing
Set up a production-ready Grafana high availability cluster with PostgreSQL shared database backend and HAProxy load balancing for enterprise monitoring infrastructure with automatic failover.
Implement Airflow DAG security scanning with Bandit and safety checks
Set up automated security scanning for Apache Airflow DAGs using Bandit for Python code analysis and Safety for vulnerability detection. Configure pre-commit hooks and CI/CD integration for continuous security monitoring.
Configure Kubernetes Pod Security Standards with admission controllers for policy enforcement
Learn how to implement Kubernetes Pod Security Standards using built-in admission controllers and OPA Gatekeeper for comprehensive policy enforcement, security compliance, and workload protection in production clusters.
Configure Podman image scanning with Trivy security vulnerability detection
Set up automated container image security scanning using Trivy with Podman to detect vulnerabilities, misconfigurations, and security issues before deploying containers to production.
Optimize ClickHouse performance for high-throughput workloads with advanced tuning and memory management
Learn how to optimize ClickHouse for high-throughput analytics workloads through advanced memory configuration, query performance tuning, storage engine optimization, and connection pooling strategies.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer