Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Advanced

Integrate OSSEC with Splunk for centralized security monitoring and log analysis

Set up OSSEC HIDS with Splunk Universal Forwarder to centralize security events, create monitoring dashboards, and enable real-time threat correlation across your infrastructure.

45 min 4 distros 55 views
security Advanced

Configure intrusion detection with OSSEC and fail2ban integration

Set up comprehensive intrusion detection by integrating OSSEC HIDS with fail2ban for automated threat response. This advanced configuration provides real-time monitoring, log analysis, and automated IP blocking for enhanced server security.

45 min 4 distros 72 views
security Intermediate

Set up OSSEC agent deployment and centralized management with automated configuration

Deploy and manage OSSEC Host-based Intrusion Detection System (HIDS) across multiple servers with centralized monitoring, automated agent configuration, and real-time security event processing for enterprise-scale infrastructure protection.

45 min 4 distros 266 views
networking Intermediate

Install and configure Squid 6 proxy server with bandwidth controls and content filtering

Set up Squid 6 proxy server with advanced traffic shaping, content filtering, and user authentication. Configure bandwidth limits, access control lists, and comprehensive logging for enterprise proxy deployments.

45 min 4 distros 158 views
security Advanced

Set up intrusion detection with OSSEC HIDS and nftables integration for automated threat response

Configure OSSEC Host-based Intrusion Detection System with nftables firewall integration for real-time threat detection and automated response. Monitor system activity, detect intrusions, and automatically block malicious IPs using active response mechanisms.

45 min 4 distros 417 views
networking Intermediate

Configure network traffic shaping with tc and HTB for bandwidth management and QoS

Set up hierarchical token bucket (HTB) traffic shaping with tc to control bandwidth allocation, prioritize network traffic, and implement quality of service policies for optimal network performance.

45 min 6 distros 773 views
security Intermediate

Configure OSSEC HIDS for intrusion detection with email alerts and real-time monitoring

Set up OSSEC Host-based Intrusion Detection System with server-agent architecture, custom detection rules, email notifications, and real-time monitoring for comprehensive security monitoring across multiple systems.

45 min 6 distros 555 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer