Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

performance Intermediate

Configure Django Redis caching and session storage for high-performance web applications

Set up Redis as both cache backend and session storage for Django applications. Improve page load times and user experience with proper Redis configuration and Django integration.

25 min 4 distros 4 views
databases Intermediate

Configure DuckDB cluster setup for distributed analytics and high performance workloads

Set up a DuckDB cluster with distributed query processing, network security, and performance optimization for high-throughput analytical workloads across multiple nodes.

45 min 4 distros 30 views
security Intermediate

Configure Nagios Core 4.5 SSL certificates and security hardening with authentication controls

Secure your Nagios monitoring with SSL certificates, advanced authentication, and comprehensive access controls. This guide covers Let's Encrypt integration, web interface hardening, and security monitoring setup.

45 min 4 distros 52 views
networking Intermediate

Install and configure ntopng for comprehensive network monitoring with traffic analysis and real-time dashboards

Set up ntopng to monitor network traffic in real-time with detailed analytics, bandwidth monitoring, and customizable dashboards. Learn to configure interface monitoring, traffic analysis rules, and alerting for complete network visibility.

45 min 4 distros 101 views
security Advanced

Configure intrusion detection with OSSEC and fail2ban integration

Set up comprehensive intrusion detection by integrating OSSEC HIDS with fail2ban for automated threat response. This advanced configuration provides real-time monitoring, log analysis, and automated IP blocking for enhanced server security.

45 min 4 distros 56 views
security Advanced

Integrate ModSecurity 3 with SOAR platforms for automated incident response and threat detection

Set up ModSecurity 3 with structured logging, webhook notifications, and API integrations to automatically feed security events into SOAR platforms for real-time threat detection and incident response workflows.

45 min 4 distros 51 views
security Intermediate

Implement network security policies with iptables and firewalld for enterprise infrastructure protection

Configure enterprise-grade network security with iptables and firewalld, implementing zone-based policies, advanced rules, and comprehensive logging for production infrastructure protection.

45 min 4 distros 48 views
security Intermediate

Implement Linux security hardening with CIS benchmarks and automated compliance scanning

Harden your Linux systems using CIS benchmarks with automated compliance scanning and continuous monitoring. Learn to implement security controls for filesystem permissions, user authentication, network policies, and maintain ongoing compliance with industry standards.

45 min 4 distros 60 views
security Advanced

Implement Podman pod security with network policies and microsegmentation

Secure Podman pods with custom network policies, traffic filtering, and microsegmentation using CNI plugins and netavark. Implement zero-trust networking with firewall rules and container isolation.

45 min 4 distros 137 views
devops Advanced

Configure Spark Kubernetes Operator with MinIO for cloud-native analytics

Deploy Apache Spark on Kubernetes with the Spark Operator and MinIO object storage for scalable big data processing. Configure RBAC, SSL certificates, and persistent storage for production-ready analytics workloads.

45 min 4 distros 130 views
security Intermediate

Configure Podman image scanning with Trivy security vulnerability detection

Set up automated container image security scanning using Trivy with Podman to detect vulnerabilities, misconfigurations, and security issues before deploying containers to production.

45 min 4 distros 122 views
security Advanced

Configure advanced iptables firewall rules with logging, port knocking, and DDoS protection

Build a production-grade iptables firewall with connection tracking, rate limiting, and port knocking. Includes automated DDoS protection, detailed logging, and security hardening for enterprise environments.

45 min 4 distros 129 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer