Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingInstall and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications
hostingSet up Node.js application security with Helmet and rate limiting
securityInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesRecently published
Monitor Jetty performance with JMX and Grafana dashboards
monitoringConfigure FRRouting route maps and prefix lists for advanced routing policies
networkingConfigure Jetty clustering and session replication for high availability
hostingConfigure Cherokee web server with MySQL database optimization and performance tuning
hostingConfigure Cassandra SSL encryption and authentication with security hardening
databasesMonitor Jetty performance with JMX and Grafana dashboards
Set up comprehensive Jetty monitoring using JMX metrics collection with Prometheus JMX Exporter and visualize performance data through custom Grafana dashboards with automated alerting.
Configure Jetty clustering and session replication for high availability
Set up Eclipse Jetty 12 in a clustered configuration with session replication across multiple nodes. This tutorial covers installation, clustering setup with JDBC session persistence, load balancer integration, and production monitoring for high-availability web applications.
Configure Cassandra SSL encryption and authentication with security hardening
Set up comprehensive SSL/TLS encryption for Apache Cassandra with client-to-node and node-to-node security, certificate management, and production-grade authentication hardening.
Configure OSSEC vulnerability detection with CVE scanning and automated security alerts
Set up OSSEC Host Intrusion Detection System with vulnerability scanning capabilities, CVE database integration, and automated alerting for comprehensive security monitoring across your infrastructure.
Integrate OSSEC with Splunk for centralized security monitoring and log analysis
Set up OSSEC HIDS with Splunk Universal Forwarder to centralize security events, create monitoring dashboards, and enable real-time threat correlation across your infrastructure.
Configure NGINX SSL termination with Redis session storage
Set up NGINX as an SSL termination proxy with Redis backend for session storage, enabling scalable load balancing and persistent user sessions across multiple application servers.
Set up Varnish 7 cluster with load balancing across multiple backends
Configure a high-performance Varnish Cache 7 cluster with intelligent load balancing across multiple web servers, SSL termination, health monitoring, and shared cache synchronization for enterprise web acceleration.
Configure OSSEC active response for automated threat blocking
Set up OSSEC active response to automatically block threats by configuring firewall rules, custom response scripts, and tuning response actions for real-time intrusion prevention.
Configure CockroachDB 24.3 multi-region deployment with high availability clustering
Deploy CockroachDB across multiple regions with automated failover, data locality controls, and production-grade security. Includes replication zones, load balancing, and disaster recovery strategies.
Configure keepalived with HAProxy backend health monitoring for high availability load balancing
Set up keepalived with HAProxy to create a high availability load balancer cluster with automatic failover, backend health monitoring, and VRRP protocol for seamless traffic distribution across multiple servers.
Set up ELK Stack for centralized ModSecurity log analysis and monitoring
Configure Elasticsearch 8, Logstash 8, and Kibana 8 to collect, parse, and visualize ModSecurity web application firewall logs from multiple servers for centralized security monitoring and threat detection.
Deploy FastAPI applications with Docker Compose and production optimization
Learn to containerize FastAPI applications with Docker Compose, integrate PostgreSQL and Redis services, configure Nginx reverse proxy with SSL, and implement production monitoring for scalable microservices deployment.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer