Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

monitoring Intermediate

Monitor FastAPI applications with Prometheus and Grafana for production observability

Set up comprehensive monitoring for FastAPI applications using Prometheus metrics collection and Grafana dashboards. Configure custom metrics, alerting rules, and real-time visualization for API performance tracking.

45 min 4 distros 3 views
monitoring Intermediate

Configure logrotate with Elasticsearch and Kibana integration for automated log management

Set up automated log rotation with Elasticsearch index lifecycle management and Kibana dashboard integration for scalable log management. Configure retention policies and monitoring alerts for production environments.

45 min 4 distros 6 views
security Intermediate

Configure SSH key authentication and security hardening

Replace password authentication with SSH keys and implement comprehensive security hardening including fail2ban, audit logging, and access controls to protect your Linux servers from unauthorized access and brute force attacks.

25 min 4 distros 4 views
monitoring Intermediate

Monitor Node.js applications with Prometheus and Grafana for comprehensive performance metrics

Set up comprehensive Node.js application monitoring with Prometheus metrics collection and Grafana dashboards. Configure alerting rules for performance issues, memory usage, and error tracking in production environments.

45 min 4 distros 9 views
databases Advanced

Set up PostgreSQL 17 streaming replication with PgBouncer connection pooling and load balancing

Configure PostgreSQL 17 streaming replication with automatic failover, PgBouncer connection pooling for performance optimization, and HAProxy load balancing for high availability database architecture.

45 min 4 distros 41 views
security Intermediate

Set up ELK Stack for centralized ModSecurity log analysis and monitoring

Configure Elasticsearch 8, Logstash 8, and Kibana 8 to collect, parse, and visualize ModSecurity web application firewall logs from multiple servers for centralized security monitoring and threat detection.

45 min 4 distros 5 views
devops Intermediate

Deploy FastAPI applications with Docker Compose and production optimization

Learn to containerize FastAPI applications with Docker Compose, integrate PostgreSQL and Redis services, configure Nginx reverse proxy with SSL, and implement production monitoring for scalable microservices deployment.

45 min 4 distros 12 views
databases Advanced

Configure Redis 7 cluster sharding for horizontal scaling with automated failover and monitoring

Set up Redis 7 cluster with automatic sharding across multiple nodes for horizontal scaling. Configure hash slots, master-slave replication, and automated failover with comprehensive monitoring.

45 min 4 distros 6 views
performance Intermediate

Configure H2O HTTP/2 web server caching and compression optimization for high performance

Optimize H2O web server performance with advanced caching strategies, HTTP/2 compression, and production-grade tuning for high-traffic applications.

45 min 4 distros 5 views
hosting Intermediate

Integrate H2O with Let's Encrypt for automatic SSL certificates

Set up H2O HTTP/2 web server with automatic SSL certificate management using Let's Encrypt and certbot. Configure SSL termination, automatic renewal, and security hardening for production deployments.

30 min 4 distros 8 views
networking Advanced

Configure H2O HTTP/2 server load balancing with health checks and SSL termination

Set up H2O as a high-performance load balancer with HTTP/2 support, automated health monitoring, and SSL termination for production web applications.

45 min 4 distros 11 views
security Advanced

Set up centralized security monitoring with ClamAV 1.4 and Elasticsearch 8

Build a comprehensive security monitoring infrastructure with ClamAV antivirus scanning, Elasticsearch log storage, and automated threat detection. This setup provides real-time malware scanning with centralized log aggregation for enterprise security compliance.

45 min 4 distros 10 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer