Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Intermediate

Configure Podman image scanning with Trivy security vulnerability detection

Set up automated container image security scanning using Trivy with Podman to detect vulnerabilities, misconfigurations, and security issues before deploying containers to production.

45 min 4 distros 125 views
devops Intermediate

Configure SonarQube quality gates and custom rules for automated code quality enforcement

Set up SonarQube quality gates with custom conditions, create language-specific rules, and integrate automated quality enforcement into CI/CD pipelines for continuous code quality monitoring.

45 min 4 distros 121 views
networking Advanced

Configure HAProxy advanced routing with ACLs and maps for intelligent traffic management

Set up sophisticated traffic routing in HAProxy using Access Control Lists (ACLs) and map files for dynamic backend selection, SSL SNI routing, and intelligent request distribution based on headers, paths, and custom conditions.

45 min 4 distros 182 views
hosting Advanced

Configure Apache HTTP Server clustering with mod_cluster and JBoss EAP for enterprise load balancing

Set up Apache HTTP Server with mod_cluster module to create an intelligent load balancing cluster with JBoss EAP application servers, featuring automatic node discovery, session clustering, and health monitoring.

45 min 6 distros 257 views
security Intermediate

Set up OSSEC agent deployment and centralized management with automated configuration

Deploy and manage OSSEC Host-based Intrusion Detection System (HIDS) across multiple servers with centralized monitoring, automated agent configuration, and real-time security event processing for enterprise-scale infrastructure protection.

45 min 4 distros 254 views
databases Intermediate

Implement MinIO data lifecycle management and automated archival with S3 retention policies

Configure MinIO lifecycle policies to automatically transition and expire objects based on age and storage class. Set up intelligent tiering and automated archival to optimize storage costs and compliance with data retention requirements.

35 min 4 distros 446 views
devops Intermediate

Configure SonarQube quality gates and automated project analysis with multi-language support

Set up custom SonarQube quality gates with automated project analysis for multiple programming languages. Configure SonarScanner integration, webhook notifications, and CI/CD pipeline automation for continuous code quality monitoring.

45 min 4 distros 254 views
networking Advanced

Set up automated network topology discovery with SNMP and LLDP for infrastructure mapping

Build an automated network discovery system that uses SNMP and LLDP protocols to map your infrastructure topology, detect device relationships, and create visual network diagrams with real-time monitoring integration.

45 min 4 distros 364 views
security Advanced

Set up intrusion detection with OSSEC HIDS and nftables integration for automated threat response

Configure OSSEC Host-based Intrusion Detection System with nftables firewall integration for real-time threat detection and automated response. Monitor system activity, detect intrusions, and automatically block malicious IPs using active response mechanisms.

45 min 4 distros 411 views
security Advanced

Configure ClamAV cluster scanning for high availability and enterprise threat detection

Build a production-grade ClamAV cluster with HAProxy load balancing, shared virus definitions, and comprehensive monitoring for enterprise-scale threat detection and high availability.

45 min 4 distros 574 views
security Intermediate

Configure OSSEC HIDS for intrusion detection with email alerts and real-time monitoring

Set up OSSEC Host-based Intrusion Detection System with server-agent architecture, custom detection rules, email notifications, and real-time monitoring for comprehensive security monitoring across multiple systems.

45 min 6 distros 547 views
security Intermediate

Configure ModSecurity 3 web application firewall with OWASP Core Rule Set for advanced threat protection

Set up ModSecurity 3 with OWASP Core Rule Set 4.0 to protect web applications from SQL injection, XSS, and other attacks. Configure integration with Nginx and Apache, implement custom rules, and optimize performance for production environments.

45 min 6 distros 1,069 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer