Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Advanced

Configure Linux audit system with SIEM integration for Splunk security monitoring

Set up auditd with custom security rules, configure Splunk Universal Forwarder for log shipping, and implement real-time monitoring workflows for comprehensive security event tracking and compliance reporting.

45 min 4 distros 14 views
security Advanced

Configure auditd with Elasticsearch and Kibana for compliance reporting

Set up comprehensive Linux audit logging with auditd, integrate with Elasticsearch 8 and Kibana 8 for centralized analysis, and create compliance dashboards for PCI DSS, HIPAA, and SOX reporting requirements.

45 min 4 distros 79 views
linux Intermediate

Optimize systemd journal logging performance and storage

Learn how to optimize systemd journald for production environments by configuring storage limits, compression, performance settings, and implementing log forwarding with monitoring.

25 min 4 distros 57 views
security Intermediate

Configure SELinux mandatory access controls for enhanced security

Set up SELinux on Ubuntu and Debian systems, configure security modes and policies, create custom application rules, and implement comprehensive monitoring for enhanced Linux security hardening.

45 min 4 distros 68 views
security Intermediate

Implement Linux file system encryption with LUKS and cryptsetup

Encrypt Linux file systems and partitions using LUKS (Linux Unified Key Setup) with cryptsetup tools. Configure encrypted storage, manage encryption keys, and implement backup procedures for production environments.

25 min 4 distros 121 views
linux Intermediate

Configure systemd service resource limits and security isolation

Configure cgroups v2 resource limits and security isolation for systemd services to prevent resource exhaustion and improve system security. This tutorial covers memory, CPU, and I/O limits with monitoring and troubleshooting.

35 min 4 distros 142 views
security Intermediate

Configure SSH key authentication and security hardening

Replace password authentication with SSH keys and implement comprehensive security hardening including fail2ban, audit logging, and access controls to protect your Linux servers from unauthorized access and brute force attacks.

25 min 4 distros 91 views
security Intermediate

Implement network security policies with iptables and firewalld for enterprise infrastructure protection

Configure enterprise-grade network security with iptables and firewalld, implementing zone-based policies, advanced rules, and comprehensive logging for production infrastructure protection.

45 min 4 distros 78 views
security Intermediate

Configure ClamAV integration with web servers and email systems for automated threat detection

Integrate ClamAV antivirus with NGINX, Apache, Postfix and Dovecot for automated file scanning and email protection. Set up real-time threat detection with monitoring and alerting.

45 min 4 distros 70 views
security Advanced

Implement Tailscale OAuth integration with identity providers for enterprise authentication

Configure Tailscale with enterprise identity providers including SAML and OIDC authentication, implement access control policies, and manage users across distributed teams for secure zero-trust networking.

45 min 4 distros 194 views
security Intermediate

Implement Caddy 2 rate limiting and DDoS protection with advanced security rules

Configure Caddy 2 web server with comprehensive rate limiting, request throttling, and DDoS protection using built-in security modules and advanced filtering rules.

45 min 4 distros 86 views
monitoring Intermediate

Configure ELK stack for centralized logging with Elasticsearch 8, Logstash 8, and Kibana 8

Set up a production-grade ELK stack with Elasticsearch 8, Logstash 8, and Kibana 8 for centralized log management. Configure authentication, SSL encryption, and log processing pipelines across multiple data sources.

45 min 4 distros 94 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer