Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Intermediate

Set up ELK Stack for centralized ModSecurity log analysis and monitoring

Configure Elasticsearch 8, Logstash 8, and Kibana 8 to collect, parse, and visualize ModSecurity web application firewall logs from multiple servers for centralized security monitoring and threat detection.

45 min 4 distros 4 views
security Advanced

Set up centralized security monitoring with ClamAV 1.4 and Elasticsearch 8

Build a comprehensive security monitoring infrastructure with ClamAV antivirus scanning, Elasticsearch log storage, and automated threat detection. This setup provides real-time malware scanning with centralized log aggregation for enterprise security compliance.

45 min 4 distros 10 views
performance Intermediate

Configure Tomcat 11 database connection pooling with HikariCP and JNDI optimization for high-performance applications

Set up efficient database connection pooling in Apache Tomcat 11 using HikariCP through JNDI configuration. Optimize connection parameters, implement proper resource management, and configure monitoring for production database workloads.

25 min 4 distros 8 views
monitoring Intermediate

Integrate Apache Tomcat 11 with Prometheus and Grafana monitoring for comprehensive performance tracking

Set up comprehensive monitoring for Apache Tomcat 11 using JMX Prometheus Java agent, configure Prometheus to scrape metrics, create detailed Grafana dashboards, and implement alerting rules for performance tracking and health monitoring.

45 min 4 distros 7 views
monitoring Intermediate

Implement Apache log analysis with GoAccess and ELK stack for real-time monitoring

Set up comprehensive Apache log monitoring with GoAccess for real-time analysis and ELK stack for centralized log processing, creating powerful Kibana dashboards for web server insights and automated alerting.

45 min 4 distros 11 views
monitoring Intermediate

Configure ELK stack for centralized logging with Elasticsearch 8, Logstash 8, and Kibana 8

Set up a production-grade ELK stack with Elasticsearch 8, Logstash 8, and Kibana 8 for centralized log management. Configure authentication, SSL encryption, and log processing pipelines across multiple data sources.

45 min 4 distros 9 views
databases Advanced

Configure Elasticsearch 8 index lifecycle management with hot-warm-cold architecture for automated data tiering

Set up Elasticsearch 8 with hot-warm-cold node architecture and automated index lifecycle management policies to optimize storage costs and query performance. Configure ILM policies that automatically move data through different tiers based on age and usage patterns.

45 min 4 distros 54 views
devops Advanced

Set up Kafka Connect cluster with high availability and load balancing

Configure a production-ready Kafka Connect cluster with multiple worker nodes, HAProxy load balancing, and Prometheus monitoring. Includes distributed configuration, shared storage setup, and comprehensive health checks for reliable data pipeline processing.

45 min 4 distros 62 views
security Intermediate

Configure SSL certificates and security hardening for Nexus Repository Manager

Secure your Nexus Repository Manager with SSL/TLS certificates, enforce HTTPS connections, and implement comprehensive security hardening including authentication controls, access policies, and audit logging for production environments.

45 min 4 distros 107 views
security Advanced

Configure Keycloak high availability clustering for production with load balancing and failover

Set up a production-ready Keycloak cluster with PostgreSQL backend, HAProxy load balancing, and automatic failover to ensure identity services remain available during node failures and high traffic.

90 min 4 distros 133 views
security Intermediate

Configure Nexus Repository Manager LDAP authentication for enterprise user management

Set up LDAP authentication for Nexus Repository Manager to enable centralized enterprise user management and seamless integration with Active Directory for secure artifact repository access.

25 min 4 distros 57 views
security Advanced

Setup Keycloak SAML integration for enterprise single sign-on with identity providers

Configure Keycloak as a SAML identity provider for enterprise SSO, integrate with external identity providers, and implement secure SAML service provider connections with attribute mapping.

45 min 4 distros 65 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer