Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Install and configure CockroachDB cluster with high availability and distributed SQL
databasesConfigure network interface monitoring with ICMP ping and connectivity testing
networkingConfigure Linux system time synchronization with chrony and NTP hardening
linuxInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesInstall and configure ArgoCD for GitOps continuous deployment with RBAC and SSL
devopsRecently published
Configure Podman secrets management with HashiCorp Vault integration
devopsConfigure Podman image scanning with Trivy security vulnerability detection
securityConfigure Prometheus Blackbox Exporter for endpoint monitoring with SSL and alerting
monitoringSet up Prometheus and Grafana monitoring stack with Docker Compose
monitoringSet up InfluxDB alerting with Kapacitor and notifications
monitoringConfigure Podman secrets management with HashiCorp Vault integration
Set up secure container secrets management by integrating Podman with HashiCorp Vault. Configure dynamic secret injection, automated rotation, and production-ready monitoring for containerized applications.
Configure Podman image scanning with Trivy security vulnerability detection
Set up automated container image security scanning using Trivy with Podman to detect vulnerabilities, misconfigurations, and security issues before deploying containers to production.
Deploy Podman containers with Kubernetes YAML manifests and kubectl integration
Learn how to deploy and manage Podman containers using Kubernetes YAML manifests with kubectl integration. This tutorial covers systemd user services, YAML generation, pod networking, and volume management.
Configure nginx reverse proxy for Podman containers with SSL and load balancing
Set up nginx as a reverse proxy for Podman containers with SSL termination, health checks, and load balancing. Includes automated SSL certificate management with Let's Encrypt and container integration.
Configure Linux memory cgroups v2 with systemd for advanced process isolation and resource control
Set up cgroups v2 unified hierarchy with systemd to implement memory limits, isolation policies, and automated pressure responses for container workloads and system processes.
Implement container security monitoring with Falco runtime detection
Set up Falco for real-time container security monitoring with runtime threat detection, Kubernetes integration, and automated alerting through Grafana dashboards.
Configure SELinux policies for web applications and databases with custom rules and security hardening
Learn how to implement mandatory access controls with SELinux for web servers and databases. Configure custom security contexts, create application-specific policies, and harden your infrastructure with advanced SELinux rules.
Configure Linux kernel parameters for container workloads with sysctl optimization
Configure Linux kernel parameters for optimal container performance with sysctl tuning. This guide covers memory management, network stack optimization, file descriptor limits, and security parameters for Docker and Podman workloads.
Configure GitLab container registry with SSL certificates and security hardening
Set up GitLab's integrated Docker registry with SSL/TLS encryption, security headers, and production-ready hardening for secure container image storage and distribution.
Secure Podman containers with SELinux and AppArmor mandatory access controls
Implement mandatory access controls for Podman containers using SELinux on Red Hat-based systems and AppArmor on Debian-based systems. Learn to configure security policies, monitor violations, and harden container security with production-grade controls.
Install and configure Traefik reverse proxy with SSL automation
Set up Traefik as a reverse proxy with Docker Compose for automatic SSL certificate management, service discovery, and load balancing across multiple backend services.
Install and configure Podman for rootless containers on Linux
Learn to install Podman and configure rootless containers as a secure Docker alternative. Includes Docker Compose migration, systemd integration, and troubleshooting common permission issues.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer