Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Intermediate

Set up NGINX web application firewall with ModSecurity 3 and OWASP Core Rule Set

Configure a production-grade web application firewall using NGINX with ModSecurity 3 and OWASP Core Rule Set. Includes logging, monitoring, and fail2ban integration for comprehensive threat protection.

45 min 4 distros 63 views
security Intermediate

Implement network security with iptables connection tracking and stateful packet filtering

Configure iptables with connection tracking modules to implement stateful packet filtering, advanced NAT rules, and comprehensive network security monitoring. Build robust firewall rules that track connection states and provide granular control over network traffic.

45 min 4 distros 73 views
networking Advanced

Set up OpenVPN high availability cluster with automatic failover and load balancing

Build a production-ready OpenVPN high availability cluster using keepalived for automatic failover and HAProxy for load balancing across multiple OpenVPN servers.

90 min 4 distros 30 views
monitoring Intermediate

Implement PHP application monitoring with New Relic and logging

Set up comprehensive PHP application monitoring using New Relic APM with custom metrics and error tracking. Configure structured logging with centralized collection and automated monitoring alerts.

45 min 4 distros 78 views
databases Advanced

Backup and restore Redis Sentinel cluster data with automated strategies and monitoring

Learn to implement production-grade backup and restore procedures for Redis Sentinel clusters with automated scheduling, point-in-time recovery, and comprehensive monitoring to ensure data durability and business continuity.

45 min 4 distros 66 views
networking Intermediate

Implement SNMP device auto-discovery with network scanning and automated inventory management

Set up automated SNMP device discovery using nmap network scanning and Python scripts for dynamic inventory management. Integrate with Zabbix and Grafana for comprehensive network monitoring and visualization.

45 min 4 distros 103 views
databases Advanced

Optimize MariaDB 11.6 performance with query analysis and indexing for high-traffic applications

Learn advanced MariaDB performance optimization techniques including query profiling, slow query analysis, and strategic indexing for high-traffic applications. This tutorial covers query execution plan analysis, covering indexes, and automated monitoring setup.

45 min 4 distros 97 views
security Intermediate

Implement Apache web application firewall with ModSecurity 3 and OWASP Core Rule Set

Deploy ModSecurity 3 as an Apache module with OWASP Core Rule Set to protect web applications from common attacks. Configure real-time logging, custom rules, and automated threat detection for production environments.

45 min 4 distros 156 views
security Intermediate

Implement HAProxy rate limiting and DDoS protection with advanced security rules

Configure HAProxy with comprehensive rate limiting, connection throttling, and DDoS protection using stick tables, ACLs, and advanced security rules to protect your applications from malicious traffic and ensure service availability.

45 min 4 distros 112 views
networking Advanced

Configure advanced iptables QoS with DSCP marking and traffic classification

Set up Quality of Service (QoS) on Linux servers using iptables DSCP marking, HTB queuing, and traffic classification. This tutorial shows you how to prioritize network traffic, implement bandwidth limits, and ensure critical applications get the network resources they need for optimal performance.

35 min 4 distros 85 views
databases Intermediate

Configure MinIO backup and disaster recovery with automated snapshots and replication

Configure comprehensive backup and disaster recovery for MinIO object storage with automated snapshots, cross-site replication, and encryption. Implement production-ready backup strategies to protect critical data and ensure business continuity.

45 min 4 distros 142 views
security Intermediate

Setup remote backup storage with S3-compatible encryption and automated retention policies

Configure secure, encrypted backup storage using S3-compatible providers with automated retention policies, client-side GPG encryption, and monitoring scripts for reliable data protection.

45 min 4 distros 202 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer