Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Intermediate

Configure Linux audit logging for security compliance and monitoring

Set up comprehensive audit logging with auditd daemon to track file system changes, process execution, and network connections for security compliance and forensic analysis.

35 min 4 distros 112 views
security Intermediate

Configure backup encryption with GPG and rsync for secure automated backups

Set up automated encrypted backups using GPG 2.4 and rsync with systemd timers. This tutorial covers GPG key management, encrypted backup scripts, and restoration procedures for production environments.

45 min 4 distros 217 views
monitoring Intermediate

Setup OpenResty monitoring with Prometheus and Grafana dashboards for performance analytics

Configure comprehensive monitoring for OpenResty web server using nginx-lua-prometheus module to collect metrics, Prometheus for storage, and Grafana for visualization with custom dashboards and alerting rules.

45 min 4 distros 206 views
security Advanced

Setup Elasticsearch 8 authentication with LDAP and Active Directory integration

Configure Elasticsearch 8 with X-Pack security to authenticate users against LDAP and Active Directory servers. This tutorial covers LDAP realm configuration, role-based access control, and troubleshooting authentication issues.

45 min 4 distros 81 views
security Advanced

Implement OpenResty JWT authentication with OAuth2 integration for secure web applications

Set up secure JWT-based authentication in OpenResty with OAuth2 provider integration using lua-resty-jwt module. Configure token validation, authentication middleware, and security policies for production web applications.

45 min 4 distros 197 views
monitoring Intermediate

Setup centralized log aggregation with Elasticsearch 8, Logstash 8, and Kibana 8 (ELK Stack)

Deploy a production-ready ELK stack for centralized log aggregation with Elasticsearch 8, Logstash 8, and Kibana 8. Configure secure log shipping from multiple sources with authentication and SSL encryption.

45 min 4 distros 177 views
databases Advanced

Set up ClickHouse and Kafka real-time data pipeline with streaming analytics

Build a production-ready real-time data pipeline using ClickHouse for high-performance analytics and Apache Kafka for streaming data ingestion. Configure clustering, replication, and automated data processing workflows.

45 min 4 distros 90 views
devops Advanced

Configure Consul backup and disaster recovery with automated snapshots and restoration

Set up automated Consul snapshots with verification, implement disaster recovery procedures, and configure monitoring for production-grade backup strategies that ensure service discovery data protection.

45 min 4 distros 245 views
databases Beginner

Install and configure MongoDB 8.0 with authentication and SSL encryption

Set up MongoDB 8.0 from official repositories with authentication enabled and SSL/TLS encryption. Configure admin users, implement security hardening, and establish monitoring for production deployments.

25 min 6 distros 151 views
databases Intermediate

Configure Apache Cassandra cluster with multi-node setup and performance optimization

Set up a production-ready Apache Cassandra cluster with multiple nodes, configure replication strategies, and optimize JVM settings and performance parameters for high-throughput distributed NoSQL workloads.

45 min 6 distros 172 views
hosting Intermediate

Install and configure Varnish Cache 7 with NGINX backend for high-performance web acceleration

Set up Varnish Cache 7 as a high-performance HTTP accelerator with NGINX backend integration. This tutorial covers installation, SSL termination, cache optimization, purging mechanisms, and monitoring for production environments.

45 min 6 distros 163 views
networking Intermediate

Configure Tailscale mesh VPN with subnet routing and ACL policies for secure network access

Set up a zero-trust mesh VPN network with Tailscale that includes subnet routing for local network access, granular ACL policies for security, and exit nodes for secure internet access.

25 min 6 distros 150 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer