Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

devops Intermediate

Set up automated backup and disaster recovery for Nexus Repository Manager 3 with blob store migration

Configure comprehensive backup automation for Nexus Repository Manager 3 including blob store migration, disaster recovery procedures, and automated scheduling with systemd timers for production environments.

45 min 4 distros 8 views
databases Advanced

Configure MySQL binary log backup and point-in-time recovery

Set up automated MySQL binary log backup with rotation and implement point-in-time recovery procedures for complete database disaster recovery and operational continuity.

45 min 4 distros 57 views
security Advanced

Configure encrypted network storage with LUKS and NFS for secure file sharing

Set up enterprise-grade encrypted network storage by combining LUKS disk encryption with NFS file sharing. This advanced configuration provides secure, centralized file access across multiple systems while maintaining data protection at rest.

45 min 4 distros 51 views
security Intermediate

Set up LUKS full disk encryption during Linux installation

Configure full disk encryption with LUKS during OS installation to secure your data at rest. Includes post-installation key management, performance optimization, and troubleshooting for production systems.

45 min 4 distros 95 views
security Intermediate

Configure SELinux mandatory access controls for enhanced security

Set up SELinux on Ubuntu and Debian systems, configure security modes and policies, create custom application rules, and implement comprehensive monitoring for enhanced Linux security hardening.

45 min 4 distros 43 views
security Intermediate

Implement Linux file system encryption with LUKS and cryptsetup

Encrypt Linux file systems and partitions using LUKS (Linux Unified Key Setup) with cryptsetup tools. Configure encrypted storage, manage encryption keys, and implement backup procedures for production environments.

25 min 4 distros 86 views
databases Advanced

Optimize ScyllaDB performance for time-series data workloads with advanced configuration tuning

Configure ScyllaDB with specialized optimizations for time-series workloads including partitioning strategies, compaction settings, and memory tuning. Set up monitoring with Prometheus and Grafana for production performance insights.

45 min 4 distros 72 views
databases Advanced

Configure ScyllaDB SSL encryption and authentication with certificate management and security hardening

Secure your ScyllaDB cluster with comprehensive SSL/TLS encryption for client connections and inter-node communication. This tutorial covers certificate generation, authentication setup, and production security hardening.

45 min 4 distros 80 views
monitoring Intermediate

Monitor ScyllaDB cluster with Prometheus and Grafana for comprehensive performance tracking

Set up complete ScyllaDB cluster monitoring using Prometheus for metrics collection and Grafana for visualization. Configure alerting rules for proactive performance monitoring and issue detection.

45 min 4 distros 88 views
databases Intermediate

Set up Cassandra backup automation with nodetool

Automate Apache Cassandra backups using nodetool snapshots, systemd timers, and retention policies. Configure monitoring and alerting for production-grade backup management with automated cleanup and verification.

45 min 4 distros 57 views
databases Advanced

Configure CockroachDB 24.3 multi-region deployment with high availability clustering

Deploy CockroachDB across multiple regions with automated failover, data locality controls, and production-grade security. Includes replication zones, load balancing, and disaster recovery strategies.

45 min 4 distros 159 views
security Intermediate

Configure SSH key authentication and security hardening

Replace password authentication with SSH keys and implement comprehensive security hardening including fail2ban, audit logging, and access controls to protect your Linux servers from unauthorized access and brute force attacks.

25 min 4 distros 73 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer