Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Install and configure CockroachDB cluster with high availability and distributed SQL
databasesConfigure network interface monitoring with ICMP ping and connectivity testing
networkingInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesInstall and configure ArgoCD for GitOps continuous deployment with RBAC and SSL
devopsInstall and configure Loki for centralized log aggregation with Grafana integration
monitoringRecently published
Monitor MongoDB 8.0 performance with Prometheus and Grafana for real-time metrics and alerting
monitoringConfigure Prometheus Alertmanager with email notifications for production monitoring
monitoringOptimize ClickHouse performance for large datasets with advanced tuning and memory management
databasesConfigure HAProxy SSL termination with Let's Encrypt and security headers
networkingConfigure Apache HTTP Server clustering with mod_cluster and JBoss EAP for enterprise load balancing
hostingConfigure Prometheus Alertmanager with email notifications for production monitoring
Set up Prometheus Alertmanager to send email notifications when your systems trigger alerts. This tutorial covers SMTP configuration, alert routing rules, and email template customization for production monitoring workflows.
Configure Linux file and directory ownership with chown and security best practices
Learn to properly configure file and directory ownership using chown, understand user and group permissions, and implement secure ownership patterns for web servers and applications.
Fix SSH sign_and_send_pubkey: signing failed: agent refused operation
Resolve SSH authentication errors when the SSH agent refuses to sign public keys. This tutorial covers checking agent status, fixing key permissions, restarting the agent, and troubleshooting SSH client configuration.
Configure Linux swap space with memory management and performance optimization
Set up and optimize Linux swap space for better system performance. Learn to create swap files, configure swappiness parameters, and monitor memory usage across different Linux distributions.
Fix systemd service keeps restarting in a loop
Stop systemd services from continuously restarting by identifying restart loop causes, debugging configuration issues, and implementing proper service constraints to ensure stable operation.
Install and configure uWSGI application server with Nginx reverse proxy for Python web applications
Set up a production-ready Python web application stack with uWSGI as the WSGI server and Nginx as a reverse proxy. Includes SSL certificate setup, systemd service configuration, and troubleshooting guide for Django and Flask deployments.
Configure Linux text editors with vim and nano for system administration
Learn to configure vim and nano text editors for efficient Linux system administration. Master keyboard shortcuts, create custom .vimrc configurations, and choose the right editor for different tasks.
Configure Linux process monitoring with top, htop, and btop for system performance analysis
Master Linux process monitoring using top, htop, and btop to analyze system performance, identify resource bottlenecks, and troubleshoot performance issues in production environments.
Set up Grafana Enterprise SSO authentication with LDAP, SAML, and OAuth2 integration
Configure Grafana Enterprise with comprehensive single sign-on authentication supporting LDAP, SAML, and OAuth2 providers. Set up role-based access control with automated team mapping and user provisioning for enterprise environments.
Configure shell aliases and functions for development productivity
Set up custom shell aliases and functions to streamline your development workflow, reduce typing, and boost terminal productivity with reusable commands and automation shortcuts.
Configure Keycloak OAuth2 integration with OpenResty for enterprise SSO
Set up enterprise single sign-on by integrating Keycloak OAuth2 authentication with OpenResty using lua-resty-openidc. Configure secure authentication flows, JWT token validation, and session management for production web applications.
Configure intrusion detection with OSSEC and Wazuh for real-time security monitoring
Set up comprehensive host-based intrusion detection with OSSEC HIDS and Wazuh manager for real-time security monitoring, file integrity checking, and automated threat response across your infrastructure.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer