Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxSet up Node.js application security with Helmet and rate limiting
securityInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingInstall and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications
hostingInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesRecently published
Configure logrotate with Elasticsearch and Kibana integration for automated log management
monitoringSetup log aggregation with rsyslog and logrotate for centralized system monitoring
linuxConfigure SSH key authentication and security hardening
securityConfigure PostgreSQL 17 SSL encryption and advanced security hardening
securityIntegrate ModSecurity 3 with SOAR platforms for automated incident response and threat detection
securityIntegrate MinIO with Kubernetes for persistent storage and object data management
Deploy MinIO on Kubernetes using the operator for scalable object storage. Configure persistent volumes, high availability tenants, and secure ingress with SSL certificates.
Configure intrusion detection with OSSEC and Wazuh for real-time security monitoring
Set up comprehensive host-based intrusion detection with OSSEC HIDS and Wazuh manager for real-time security monitoring, file integrity checking, and automated threat response across your infrastructure.
Integrate Nexus Repository with Kubernetes and Docker registry authentication
Set up Nexus Repository Manager as a private Docker registry integrated with Kubernetes clusters, configure secure authentication and authorization, and enable automated container image deployment with RBAC controls.
Configure ClamAV cluster scanning for high availability and enterprise threat detection
Build a production-grade ClamAV cluster with HAProxy load balancing, shared virus definitions, and comprehensive monitoring for enterprise-scale threat detection and high availability.
Implement Kubernetes resource quotas and limits for namespace isolation and workload management
Configure namespace resource quotas, container resource limits, and limit ranges to ensure fair resource allocation and prevent resource exhaustion in multi-tenant Kubernetes clusters.
Configure Istio traffic management with virtual services and destination rules
Configure advanced Istio traffic management using virtual services for intelligent request routing and destination rules for load balancing and service subsets in production Kubernetes environments.
Configure Kubernetes persistent volumes with NFS storage for container data persistence
Set up NFS-backed persistent volumes in Kubernetes to provide shared, durable storage for containerized applications across multiple nodes with automatic failover capabilities.
Set up Nexus Repository Manager high availability clustering for production scale
Deploy a production-ready Nexus Repository Manager cluster with shared storage, load balancing, and automated failover for enterprise artifact management and zero-downtime operations.
Configure Linux file encryption with LUKS and cryptsetup for data protection
Learn how to encrypt files and partitions using LUKS encryption with cryptsetup tools. This tutorial covers creating encrypted volumes, managing encryption keys, and automating mount operations for secure data protection.
Configure Linux file compression and archiving with tar, gzip and backup automation
Learn to create compressed archives with tar and gzip, manage different compression formats, and implement automated backup scripts with rotation for efficient system maintenance and data protection.
Secure Podman containers with SELinux and AppArmor mandatory access controls
Implement mandatory access controls for Podman containers using SELinux on Red Hat-based systems and AppArmor on Debian-based systems. Learn to configure security policies, monitor violations, and harden container security with production-grade controls.
Install and configure Kubernetes cluster with kubeadm and security hardening
Set up a production-ready Kubernetes cluster using kubeadm with proper security hardening, RBAC configuration, and CNI networking. Includes worker node setup and verification steps.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer