Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxInstall and configure CockroachDB cluster with high availability and distributed SQL
databasesConfigure network interface monitoring with ICMP ping and connectivity testing
networkingInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesInstall and configure ArgoCD for GitOps continuous deployment with RBAC and SSL
devopsRecently published
Implement Podman pod security with network policies and microsegmentation
securityConfigure Apache Airflow high availability with CeleryExecutor and Redis clustering for production deployments
devopsConfigure advanced gRPC load balancing with Envoy Proxy health checks and circuit breakers
networkingConfigure custom Grafana plugins for specialized monitoring requirements
monitoringConfigure NGINX monitoring with Prometheus and Grafana dashboards for real-time web server performance metrics
monitoringIntegrate SNMP monitoring with InfluxDB and Telegraf for time-series analysis
Learn to set up a comprehensive SNMP monitoring solution using InfluxDB 2.7 for time-series storage and Telegraf for data collection. Configure monitoring for network devices, system metrics, and create visualization dashboards with Grafana.
Implement OpenResty JWT authentication with OAuth2 integration for secure web applications
Set up secure JWT-based authentication in OpenResty with OAuth2 provider integration using lua-resty-jwt module. Configure token validation, authentication middleware, and security policies for production web applications.
Configure Linux cron jobs and system task scheduling with best practices
Learn to configure cron jobs and systemd timers for automated task scheduling on Linux systems with proper logging, security, and troubleshooting techniques.
Monitor system resources with Netdata real-time performance dashboard
Set up Netdata for comprehensive real-time monitoring of CPU, memory, disk, and network resources with a web-based dashboard, email alerts, and customizable thresholds.
Configure Linux environment variables and PATH management for development workflows
Learn how to properly configure Linux environment variables and manage your PATH for development workflows. This guide covers temporary and persistent variables, user vs system-wide configuration, and troubleshooting common issues across Ubuntu, Debian, AlmaLinux, Rocky Linux, and Fedora.
Configure SSH key authentication and disable password login for secure server access
Set up SSH public key authentication on Linux servers and disable password-based logins to prevent brute force attacks and improve security. This tutorial covers key generation, server configuration, and troubleshooting common authentication issues.
Configure Linux kernel parameters for container workloads with sysctl optimization
Configure Linux kernel parameters for optimal container performance with sysctl tuning. This guide covers memory management, network stack optimization, file descriptor limits, and security parameters for Docker and Podman workloads.
Optimize Redis 7 memory usage and performance with advanced configuration tuning
Learn to optimize Redis 7 memory consumption and performance through advanced configuration tuning, including eviction policies, compressed data structures, active defragmentation, and comprehensive monitoring techniques.
Install and configure Fail2ban with advanced rules and email alerts
Set up Fail2ban intrusion prevention system with custom SSH, web server, and application protection rules. Configure email notifications and advanced filtering to automatically block malicious IP addresses based on log patterns.
Install and configure PostgreSQL 17 with performance tuning and security hardening
Learn to install PostgreSQL 17 from official repositories, optimize performance with proper memory settings, and implement security best practices including SSL encryption and authentication hardening.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer