Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Intermediate

Set up NGINX web application firewall with ModSecurity 3 and OWASP Core Rule Set

Configure a production-grade web application firewall using NGINX with ModSecurity 3 and OWASP Core Rule Set. Includes logging, monitoring, and fail2ban integration for comprehensive threat protection.

45 min 4 distros 63 views
security Intermediate

Implement network security with iptables connection tracking and stateful packet filtering

Configure iptables with connection tracking modules to implement stateful packet filtering, advanced NAT rules, and comprehensive network security monitoring. Build robust firewall rules that track connection states and provide granular control over network traffic.

45 min 4 distros 73 views
security Intermediate

Configure Apache rate limiting and DDoS protection with mod_security and mod_evasive

Set up comprehensive Apache protection against DDoS attacks and malicious traffic using mod_evasive for rate limiting, mod_security with OWASP rules for web application firewall capabilities, and fail2ban integration for automated IP blocking.

25 min 4 distros 92 views
hosting Beginner

Install and configure Deno for web development with systemd and reverse proxy

Deploy production-ready Deno web applications with automatic process management using systemd and secure SSL termination through Nginx reverse proxy configuration.

25 min 6 distros 183 views
hosting Beginner

Install and configure PHP 8.4 with Apache and security hardening

Set up PHP 8.4 with Apache web server using PHP-FPM for optimal performance and security. Learn to configure essential PHP modules, implement security hardening measures, and optimize your LAMP stack for production environments.

25 min 6 distros 184 views
security Beginner

Configure Linux file permissions and access control with umask and chmod best practices

Learn how to configure secure Linux file permissions using chmod, set default permissions with umask, and implement proper access control to prevent security vulnerabilities while fixing permission denied errors.

25 min 6 distros 151 views
security Beginner

Configure SSH key authentication and disable password login for secure server access

Set up SSH public key authentication on Linux servers and disable password-based logins to prevent brute force attacks and improve security. This tutorial covers key generation, server configuration, and troubleshooting common authentication issues.

20 min 6 distros 150 views
hosting Intermediate

Install and configure Jetty application server with SSL certificates and performance tuning

Deploy Eclipse Jetty application server with SSL/TLS encryption, systemd service management, and production-ready performance optimizations. Configure reverse proxy integration and security hardening for Java web applications.

45 min 6 distros 273 views
hosting Intermediate

Install and configure Cherokee web server with FastCGI and virtual hosts

Set up Cherokee web server with web-based administration, FastCGI support for PHP applications, SSL-enabled virtual hosts, and performance optimizations for lightweight web hosting environments.

45 min 6 distros 282 views
security Intermediate

Configure OSSEC HIDS for intrusion detection with email alerts and real-time monitoring

Set up OSSEC Host-based Intrusion Detection System with server-agent architecture, custom detection rules, email notifications, and real-time monitoring for comprehensive security monitoring across multiple systems.

45 min 6 distros 172 views
networking Intermediate

Configure network load balancing with keepalived and VRRP for high availability failover

Set up keepalived with VRRP to create highly available network services with automatic failover. Configure virtual IP addresses that move between servers when one fails, ensuring zero-downtime load balancing.

25 min 6 distros 185 views
security Intermediate

Configure Linux firewall rules with fail2ban for SSH brute force protection and intrusion prevention

Set up fail2ban to automatically block SSH brute force attacks and protect your Linux server from unauthorized access attempts. Configure custom jails, firewall integration, and email notifications for comprehensive intrusion prevention.

25 min 6 distros 148 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer