Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Advanced

Integrate OSSEC with Splunk for centralized security monitoring and log analysis

Set up OSSEC HIDS with Splunk Universal Forwarder to centralize security events, create monitoring dashboards, and enable real-time threat correlation across your infrastructure.

45 min 4 distros 28 views
security Advanced

Configure intrusion detection with OSSEC and fail2ban integration

Set up comprehensive intrusion detection by integrating OSSEC HIDS with fail2ban for automated threat response. This advanced configuration provides real-time monitoring, log analysis, and automated IP blocking for enhanced server security.

45 min 4 distros 23 views
security Intermediate

Configure OSSEC active response for automated threat blocking

Set up OSSEC active response to automatically block threats by configuring firewall rules, custom response scripts, and tuning response actions for real-time intrusion prevention.

25 min 4 distros 40 views
security Advanced

Integrate ModSecurity 3 with SOAR platforms for automated incident response and threat detection

Set up ModSecurity 3 with structured logging, webhook notifications, and API integrations to automatically feed security events into SOAR platforms for real-time threat detection and incident response workflows.

45 min 4 distros 34 views
security Intermediate

Set up ELK Stack for centralized ModSecurity log analysis and monitoring

Configure Elasticsearch 8, Logstash 8, and Kibana 8 to collect, parse, and visualize ModSecurity web application firewall logs from multiple servers for centralized security monitoring and threat detection.

45 min 4 distros 32 views
security Advanced

Set up centralized security monitoring with ClamAV 1.4 and Elasticsearch 8

Build a comprehensive security monitoring infrastructure with ClamAV antivirus scanning, Elasticsearch log storage, and automated threat detection. This setup provides real-time malware scanning with centralized log aggregation for enterprise security compliance.

45 min 4 distros 35 views
security Intermediate

Configure ClamAV integration with web servers and email systems for automated threat detection

Integrate ClamAV antivirus with NGINX, Apache, Postfix and Dovecot for automated file scanning and email protection. Set up real-time threat detection with monitoring and alerting.

45 min 4 distros 26 views
security Advanced

Implement Tailscale OAuth integration with identity providers for enterprise authentication

Configure Tailscale with enterprise identity providers including SAML and OIDC authentication, implement access control policies, and manage users across distributed teams for secure zero-trust networking.

45 min 4 distros 104 views
security Advanced

Configure SSL encryption and authentication for ClamAV cluster with high availability scanning

Set up a secure ClamAV cluster with SSL/TLS encryption, certificate-based authentication, and load balancing for enterprise-grade antivirus scanning. This tutorial covers SSL certificate generation, encrypted inter-node communication, and HAProxy SSL termination.

45 min 4 distros 244 views
security Advanced

Configure ClamAV cluster scanning for high availability and enterprise threat detection

Build a production-grade ClamAV cluster with HAProxy load balancing, shared virus definitions, and comprehensive monitoring for enterprise-scale threat detection and high availability.

45 min 4 distros 535 views
security Intermediate

Configure OSSEC HIDS for intrusion detection with email alerts and real-time monitoring

Set up OSSEC Host-based Intrusion Detection System with server-agent architecture, custom detection rules, email notifications, and real-time monitoring for comprehensive security monitoring across multiple systems.

45 min 6 distros 472 views
security Intermediate

Configure Linux firewall rules with fail2ban for SSH brute force protection and intrusion prevention

Set up fail2ban to automatically block SSH brute force attacks and protect your Linux server from unauthorized access attempts. Configure custom jails, firewall integration, and email notifications for comprehensive intrusion prevention.

25 min 6 distros 553 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer