Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Advanced

Configure SSH certificate authentication with CA signing for secure server access

Set up SSH certificate-based authentication using a Certificate Authority to eliminate individual key management. Create signed user certificates that provide secure, scalable access control for multiple servers and users.

45 min 4 distros 62 views
security Intermediate

Configure SSH key authentication and security hardening

Replace password authentication with SSH keys and implement comprehensive security hardening including fail2ban, audit logging, and access controls to protect your Linux servers from unauthorized access and brute force attacks.

25 min 4 distros 65 views
security Intermediate

Implement Linux security hardening with CIS benchmarks and automated compliance scanning

Harden your Linux systems using CIS benchmarks with automated compliance scanning and continuous monitoring. Learn to implement security controls for filesystem permissions, user authentication, network policies, and maintain ongoing compliance with industry standards.

45 min 4 distros 60 views
security Intermediate

Secure Grafana with OAuth authentication and RBAC integration

Configure Grafana with OAuth SSO authentication, implement role-based access control (RBAC), and harden security with SSL certificates for enterprise-grade monitoring dashboard access.

45 min 4 distros 125 views
security Beginner

Configure SSH key authentication and disable password login for secure server access

Set up SSH public key authentication on Linux servers and disable password-based logins to prevent brute force attacks and improve security. This tutorial covers key generation, server configuration, and troubleshooting common authentication issues.

20 min 6 distros 566 views
security Intermediate

Install and configure Fail2ban with advanced rules and email alerts

Set up Fail2ban intrusion prevention system with custom SSH, web server, and application protection rules. Configure email notifications and advanced filtering to automatically block malicious IP addresses based on log patterns.

45 min 6 distros 605 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer