Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxInstall and configure CockroachDB cluster with high availability and distributed SQL
databasesConfigure network interface monitoring with ICMP ping and connectivity testing
networkingInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesInstall and configure ArgoCD for GitOps continuous deployment with RBAC and SSL
devopsRecently published
Implement Podman pod security with network policies and microsegmentation
securityConfigure Apache Airflow high availability with CeleryExecutor and Redis clustering for production deployments
devopsConfigure advanced gRPC load balancing with Envoy Proxy health checks and circuit breakers
networkingConfigure custom Grafana plugins for specialized monitoring requirements
monitoringConfigure NGINX monitoring with Prometheus and Grafana dashboards for real-time web server performance metrics
monitoringConfigure GitLab SAML authentication with Keycloak for enterprise SSO
Set up single sign-on (SSO) authentication between GitLab and Keycloak using SAML 2.0 protocol. This enables centralized user management and secure authentication for your GitLab instance through your existing identity provider infrastructure.
Monitor HAProxy and Consul with Prometheus and Grafana dashboards
Configure comprehensive monitoring for HAProxy load balancer and Consul service discovery using Prometheus metrics collection and Grafana visualization dashboards. This tutorial covers setting up exporters, configuring scraping targets, and creating production-ready monitoring dashboards.
Configure Kibana LDAP authentication and RBAC with Active Directory integration
Set up secure Kibana authentication using Active Directory LDAP with role-based access control to manage user permissions and streamline enterprise login workflows. This tutorial covers Elasticsearch security configuration, LDAP realm setup, and user role mappings.
Setup Elasticsearch 8 SSL/TLS encryption and advanced security hardening with authentication and access control
Secure your Elasticsearch 8 cluster with comprehensive SSL/TLS encryption, user authentication, role-based access control, and network hardening. This tutorial covers production-grade security configuration to protect your search infrastructure.
Configure NGINX load balancing with health checks and automatic failover
Set up NGINX as a load balancer with upstream servers, active health checks, and automatic failover capabilities. This tutorial covers round-robin, least-connections, and IP-hash load balancing methods with real-time backend monitoring.
Configure Lighttpd 1.4 with Redis caching for high-performance websites
Set up Lighttpd web server with Redis caching to dramatically improve website performance through intelligent content caching, reducing server load and response times for high-traffic applications.
Configure Kubernetes persistent volumes with NFS storage for container data persistence
Set up NFS-backed persistent volumes in Kubernetes to provide shared, durable storage for containerized applications across multiple nodes with automatic failover capabilities.
Setup Elasticsearch 8 authentication with LDAP and Active Directory integration
Configure Elasticsearch 8 with X-Pack security to authenticate users against LDAP and Active Directory servers. This tutorial covers LDAP realm configuration, role-based access control, and troubleshooting authentication issues.
Implement OpenResty JWT authentication with OAuth2 integration for secure web applications
Set up secure JWT-based authentication in OpenResty with OAuth2 provider integration using lua-resty-jwt module. Configure token validation, authentication middleware, and security policies for production web applications.
Configure Redis Sentinel with SSL/TLS encryption and authentication for high availability
Set up a production-grade Redis Sentinel cluster with SSL/TLS encryption, authentication, and automatic failover for high availability. This tutorial covers certificate generation, security configuration, and monitoring setup.
Setup centralized log aggregation with Elasticsearch 8, Logstash 8, and Kibana 8 (ELK Stack)
Deploy a production-ready ELK stack for centralized log aggregation with Elasticsearch 8, Logstash 8, and Kibana 8. Configure secure log shipping from multiple sources with authentication and SSL encryption.
Deploy Django application with Gunicorn and PostgreSQL database migrations
Learn how to deploy a production-ready Django application with Gunicorn WSGI server, PostgreSQL database, and automated database migrations on Ubuntu, Debian, AlmaLinux, and Rocky Linux systems.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer