Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Advanced

Integrate OSSEC with Splunk for centralized security monitoring and log analysis

Set up OSSEC HIDS with Splunk Universal Forwarder to centralize security events, create monitoring dashboards, and enable real-time threat correlation across your infrastructure.

45 min 4 distros 68 views
security Advanced

Configure intrusion detection with OSSEC and fail2ban integration

Set up comprehensive intrusion detection by integrating OSSEC HIDS with fail2ban for automated threat response. This advanced configuration provides real-time monitoring, log analysis, and automated IP blocking for enhanced server security.

45 min 4 distros 83 views
devops Intermediate

Set up OpenLiteSpeed with Docker containers for development

Deploy OpenLiteSpeed web server in Docker containers with PHP-FPM, SSL certificates, and persistent volumes for scalable development environments.

45 min 4 distros 89 views
hosting Intermediate

Install and configure OpenLiteSpeed with WordPress and LSCache optimization

Set up OpenLiteSpeed web server with PHP 8.4, deploy WordPress with database integration, and enable LSCache plugin for maximum performance optimization.

35 min 4 distros 115 views
hosting Intermediate

Configure Caddy 2 with Docker containers and automatic SSL certificates

Set up Caddy 2 as a reverse proxy using Docker with automatic Let's Encrypt SSL certificates. Deploy containerized web applications behind Caddy with zero-downtime SSL management and built-in load balancing.

45 min 4 distros 90 views
performance Advanced

Optimize NGINX performance for high-traffic websites with advanced configuration and tuning

Configure NGINX for maximum performance with worker process optimization, advanced caching strategies, HTTP/2 tuning, and security hardening for high-traffic production environments.

45 min 4 distros 135 views
security Intermediate

Set up OSSEC agent deployment and centralized management with automated configuration

Deploy and manage OSSEC Host-based Intrusion Detection System (HIDS) across multiple servers with centralized monitoring, automated agent configuration, and real-time security event processing for enterprise-scale infrastructure protection.

45 min 4 distros 267 views
security Intermediate

Set up NGINX web application firewall with ModSecurity 3 and OWASP Core Rule Set

Configure a production-grade web application firewall using NGINX with ModSecurity 3 and OWASP Core Rule Set. Includes logging, monitoring, and fail2ban integration for comprehensive threat protection.

45 min 4 distros 326 views
security Advanced

Set up intrusion detection with OSSEC HIDS and nftables integration for automated threat response

Configure OSSEC Host-based Intrusion Detection System with nftables firewall integration for real-time threat detection and automated response. Monitor system activity, detect intrusions, and automatically block malicious IPs using active response mechanisms.

45 min 4 distros 417 views
security Intermediate

Implement Apache web application firewall with ModSecurity 3 and OWASP Core Rule Set

Deploy ModSecurity 3 as an Apache module with OWASP Core Rule Set to protect web applications from common attacks. Configure real-time logging, custom rules, and automated threat detection for production environments.

45 min 4 distros 554 views
security Intermediate

Configure OSSEC HIDS for intrusion detection with email alerts and real-time monitoring

Set up OSSEC Host-based Intrusion Detection System with server-agent architecture, custom detection rules, email notifications, and real-time monitoring for comprehensive security monitoring across multiple systems.

45 min 6 distros 565 views
hosting Intermediate

Install and configure Varnish Cache 7 with NGINX backend for high-performance web acceleration

Set up Varnish Cache 7 as a high-performance HTTP accelerator with NGINX backend integration. This tutorial covers installation, SSL termination, cache optimization, purging mechanisms, and monitoring for production environments.

45 min 6 distros 576 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer