Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Install and configure Deno for web development with systemd and reverse proxy
hostingInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingInstall and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications
hostingInstall and configure Ollama for local AI models on Linux servers
devopsConfigure Linux system time synchronization with chrony and NTP hardening
linuxRecently published
Configure Kubernetes network policies for enhanced cluster security
securitySet up Kubernetes persistent volume snapshots and backup automation
devopsImplement Kafka Streams exactly-once processing semantics with Java applications
devopsImplement ClickHouse backup automation with compression and S3 integration
databasesInstall and configure Filebeat 8.15 for efficient log shipping to ELK stack
monitoringConfigure Linux cgroups v2 for container resource management and isolation
Set up cgroups v2 for container resource limits, CPU and memory isolation, and performance monitoring with systemd integration across modern Linux distributions.
Configure SonarQube quality gates and custom rules for automated code quality enforcement
Set up SonarQube quality gates with custom conditions, create language-specific rules, and integrate automated quality enforcement into CI/CD pipelines for continuous code quality monitoring.
Configure Linux file and directory ownership with chown and security best practices
Learn to properly configure file and directory ownership using chown, understand user and group permissions, and implement secure ownership patterns for web servers and applications.
Configure Linux text editors with vim and nano for system administration
Learn to configure vim and nano text editors for efficient Linux system administration. Master keyboard shortcuts, create custom .vimrc configurations, and choose the right editor for different tasks.
Configure shell aliases and functions for development productivity
Set up custom shell aliases and functions to streamline your development workflow, reduce typing, and boost terminal productivity with reusable commands and automation shortcuts.
Implement Linux memory cgroups for container workload isolation
Configure cgroups v2 memory subsystem to isolate container workloads with precise memory limits, monitoring, and automated enforcement for production environments.
Configure SonarQube LDAP authentication with Active Directory and user group management
Set up SonarQube to authenticate users against Active Directory using LDAP. Configure automatic user provisioning, group synchronization, and role-based access control for enterprise environments with centralized authentication.
Configure Linux user and group management with sudo access control
Learn to create and manage Linux users and groups with proper sudo access control, security hardening, and monitoring. This comprehensive guide covers account creation, group membership management, sudo configuration, and security best practices for production environments.
Configure Linux user and group management with useradd, usermod and advanced account security
Learn to manage Linux users and groups with useradd, usermod, and groupadd commands. This tutorial covers creating accounts, setting permissions, configuring password policies, and implementing security best practices for production systems.
Configure Linux file permissions and access control with umask and chmod best practices
Learn how to configure secure Linux file permissions using chmod, set default permissions with umask, and implement proper access control to prevent security vulnerabilities while fixing permission denied errors.
Configure Apache Airflow LDAP authentication and RBAC with Active Directory integration
Configure Apache Airflow with LDAP authentication against Active Directory, implement role-based access control (RBAC), and set up secure user group management for enterprise environments.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer