Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

monitoring Intermediate

Monitor container performance with Prometheus and cAdvisor for comprehensive metrics collection

Set up comprehensive container monitoring with cAdvisor, Prometheus, and Grafana to collect detailed metrics on CPU, memory, network, and disk usage. This tutorial covers installation, configuration, and alerting for production-ready container performance monitoring.

35 min 4 distros 125 views
security Intermediate

Configure Linux audit logging for security compliance and monitoring

Set up comprehensive audit logging with auditd daemon to track file system changes, process execution, and network connections for security compliance and forensic analysis.

35 min 4 distros 113 views
security Beginner

Configure Linux audit system with auditd for security compliance and file monitoring

Set up the Linux audit system with auditd to monitor file access, user activities, and system calls for security compliance. Learn to create audit rules, analyze logs, and track privilege escalations.

25 min 6 distros 293 views
linux Beginner

Configure Linux user and group management with useradd, usermod and advanced account security

Learn to manage Linux users and groups with useradd, usermod, and groupadd commands. This tutorial covers creating accounts, setting permissions, configuring password policies, and implementing security best practices for production systems.

25 min 6 distros 168 views
databases Beginner

Install and configure MariaDB 11.6 with performance optimization and security hardening

Set up MariaDB 11.6 as a high-performance MySQL alternative with InnoDB optimization, SSL encryption, automated backups, and comprehensive security hardening for production environments.

45 min 6 distros 136 views
security Intermediate

Configure OSSEC HIDS for intrusion detection with email alerts and real-time monitoring

Set up OSSEC Host-based Intrusion Detection System with server-agent architecture, custom detection rules, email notifications, and real-time monitoring for comprehensive security monitoring across multiple systems.

45 min 6 distros 170 views
security Intermediate

Configure Linux firewall rules with fail2ban for SSH brute force protection and intrusion prevention

Set up fail2ban to automatically block SSH brute force attacks and protect your Linux server from unauthorized access attempts. Configure custom jails, firewall integration, and email notifications for comprehensive intrusion prevention.

25 min 6 distros 147 views
security Intermediate

Configure ModSecurity 3 web application firewall with OWASP Core Rule Set for advanced threat protection

Set up ModSecurity 3 with OWASP Core Rule Set 4.0 to protect web applications from SQL injection, XSS, and other attacks. Configure integration with Nginx and Apache, implement custom rules, and optimize performance for production environments.

45 min 6 distros 292 views
hosting Intermediate

Install and configure H2O HTTP/2 web server with FastCGI and SSL certificates

Deploy H2O, a high-performance HTTP/2 web server with native FastCGI support and SSL/TLS termination. Configure virtual hosts, PHP-FPM integration, and performance optimization for production environments.

25 min 6 distros 271 views
security Intermediate

Configure NGINX rate limiting and DDoS protection with advanced security rules

Learn to configure production-grade NGINX rate limiting and DDoS protection with multiple security zones, advanced rules, and real-time monitoring to protect your web applications from malicious traffic and resource exhaustion attacks.

45 min 4 distros 143 views
security Intermediate

Secure Podman containers with SELinux and AppArmor mandatory access controls

Implement mandatory access controls for Podman containers using SELinux on Red Hat-based systems and AppArmor on Debian-based systems. Learn to configure security policies, monitor violations, and harden container security with production-grade controls.

45 min 4 distros 182 views
security Advanced

Implement Cilium Tetragon runtime security for Kubernetes with eBPF monitoring and threat detection

Deploy Cilium Tetragon for advanced runtime security monitoring in Kubernetes clusters using eBPF technology. Configure security policies, threat detection rules, and real-time monitoring with Grafana dashboards for comprehensive container protection.

45 min 4 distros 231 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer