Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Install and configure CockroachDB cluster with high availability and distributed SQL
databasesInstall and configure ArgoCD for GitOps continuous deployment with RBAC and SSL
devopsInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesInstall and configure Loki for centralized log aggregation with Grafana integration
monitoringInstall and configure WireGuard VPN server with client management
networkingRecently published
Configure Nagios SNMP monitoring for network devices with automated discovery and templates
monitoringIntegrate Elasticsearch 8 with Prometheus monitoring and Grafana dashboards
monitoringSet up NGINX web application firewall with ModSecurity 3 and OWASP Core Rule Set
securityConfigure NGINX reverse proxy with advanced caching and load balancing
hostingConfigure Netdata alerts with Slack and Microsoft Teams for real-time monitoring notifications
monitoringSetup nginx reverse proxy with SSL certificates and security hardening
Configure nginx as a secure reverse proxy with Let's Encrypt SSL certificates, security headers, and DDoS protection. Learn to proxy backend applications, implement rate limiting, and harden your web server configuration.
Optimize Elasticsearch 8 indexing performance for large datasets with bulk operations and memory tuning
Configure Elasticsearch 8 for maximum indexing performance when handling large datasets through bulk API optimization, JVM memory tuning, and index mapping strategies. This guide covers production-grade performance tuning for high-throughput indexing workloads.
Configure Kafka Connect for database integration with JDBC connectors and CDC
Set up Kafka Connect with JDBC connectors for real-time database integration and configure Debezium for change data capture. Monitor connector performance and troubleshoot common integration issues.
Configure GitLab container registry with SSL certificates and security hardening
Set up GitLab's integrated Docker registry with SSL/TLS encryption, security headers, and production-ready hardening for secure container image storage and distribution.
Configure GitLab LDAP authentication and user management with Active Directory integration
Set up GitLab LDAP authentication with Active Directory to centralize user management, enable automatic user provisioning, and implement group-based access control for your GitLab instance.
Implement Spark streaming with Kafka and MinIO for real-time analytics and big data processing
Build a production-ready real-time analytics pipeline using Apache Spark 3.5 streaming, Kafka for data ingestion, and MinIO for distributed object storage. This tutorial covers fault-tolerant streaming configurations and end-to-end pipeline implementation.
Configure NGINX rate limiting and DDoS protection with advanced security rules
Learn to configure production-grade NGINX rate limiting and DDoS protection with multiple security zones, advanced rules, and real-time monitoring to protect your web applications from malicious traffic and resource exhaustion attacks.
Configure Apache Airflow monitoring with Prometheus alerts and Grafana dashboards
Set up comprehensive monitoring for Apache Airflow with Prometheus metrics collection, StatsD integration, and custom Grafana dashboards. Configure automated alerting for DAG failures, task timeouts, and system health issues.
Secure Podman containers with SELinux and AppArmor mandatory access controls
Implement mandatory access controls for Podman containers using SELinux on Red Hat-based systems and AppArmor on Debian-based systems. Learn to configure security policies, monitor violations, and harden container security with production-grade controls.
Implement Cilium Tetragon runtime security for Kubernetes with eBPF monitoring and threat detection
Deploy Cilium Tetragon for advanced runtime security monitoring in Kubernetes clusters using eBPF technology. Configure security policies, threat detection rules, and real-time monitoring with Grafana dashboards for comprehensive container protection.
Configure Linux performance monitoring with collectd and InfluxDB 1.8 for real-time metrics collection
Set up comprehensive system monitoring using collectd to collect performance metrics and InfluxDB 1.8 as a time-series database backend. This tutorial covers installation, configuration, and retention policies for production monitoring environments.
Integrate Apache Airflow with Kubernetes RBAC and service accounts for secure workflow orchestration
Configure Apache Airflow KubernetesExecutor with proper RBAC permissions, service accounts, and role bindings to securely orchestrate workflows in Kubernetes environments with least-privilege access controls.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer