Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Install and configure Deno for web development with systemd and reverse proxy
hostingInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingInstall and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications
hostingInstall and configure Ollama for local AI models on Linux servers
devopsConfigure Linux system time synchronization with chrony and NTP hardening
linuxRecently published
Configure Kubernetes network policies for enhanced cluster security
securitySet up Kubernetes persistent volume snapshots and backup automation
devopsImplement Kafka Streams exactly-once processing semantics with Java applications
devopsImplement ClickHouse backup automation with compression and S3 integration
databasesInstall and configure Filebeat 8.15 for efficient log shipping to ELK stack
monitoringConfigure OSSEC active response for automated threat blocking
Set up OSSEC active response to automatically block threats by configuring firewall rules, custom response scripts, and tuning response actions for real-time intrusion prevention.
Set up Fail2ban with Cloudflare API integration for automatic IP blocking and enhanced security
Configure Fail2ban to automatically add malicious IPs to Cloudflare's firewall rules for enhanced protection. This tutorial covers installation, custom filters, API integration, and monitoring for comprehensive security automation across your infrastructure.
Configure ModSecurity machine learning anomaly detection for automated threat protection
Set up ModSecurity 3 with machine learning anomaly detection to automatically identify and block unknown attack patterns. This advanced configuration adds intelligent threat protection beyond traditional signature-based rules.
Implement Apache log analysis with GoAccess and ELK stack for real-time monitoring
Set up comprehensive Apache log monitoring with GoAccess for real-time analysis and ELK stack for centralized log processing, creating powerful Kibana dashboards for web server insights and automated alerting.
Set up InfluxDB alerting with Kapacitor and notifications
Configure comprehensive alerting for InfluxDB using Kapacitor with email, Slack, and webhook notifications. Set up real-time monitoring, thresholds, and automated responses for time-series data anomalies.
Set up Docker Compose monitoring stack with Prometheus and Grafana for AI model performance tracking
Deploy a complete monitoring stack using Docker Compose with Prometheus for metrics collection and Grafana for visualization, specifically configured to track AI model performance metrics like inference latency, throughput, and resource utilization.
Set up ELK stack alerting with Watcher and email notifications for monitoring and incident response
Configure Elasticsearch Watcher to monitor log data and automatically send email alerts when critical system events occur. Create sophisticated alert conditions, manage email notification templates, and set up automated incident response workflows.
Setup Nginx with ModSecurity 3 web application firewall for advanced threat protection
Configure Nginx with ModSecurity 3 and OWASP Core Rule Set to protect web applications against SQL injection, XSS, and other common attacks. This tutorial covers complete WAF setup with security rules, performance optimization, and threat testing.
Implement Apache Spark 3.5 cluster with YARN and HDFS for distributed computing
Set up a production-grade Apache Spark 3.5 cluster with YARN resource management and HDFS distributed storage for scalable big data processing. This tutorial covers multi-node Hadoop cluster configuration, YARN integration, and monitoring setup.
Configure ModSecurity 3 web application firewall with OWASP Core Rule Set for advanced threat protection
Set up ModSecurity 3 with OWASP Core Rule Set 4.0 to protect web applications from SQL injection, XSS, and other attacks. Configure integration with Nginx and Apache, implement custom rules, and optimize performance for production environments.
Configure Linux memory management and swap optimization for high-performance workloads
Optimize Linux memory subsystem performance through advanced swap configuration, virtual memory tuning, and memory compression techniques. Learn to configure transparent huge pages, zram, and application-specific memory settings for high-performance workloads.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer