Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

hosting Intermediate

Configure Apache reverse proxy and load balancing for high availability

Set up Apache as a reverse proxy with load balancing across multiple backend servers. Configure health checks, SSL termination, and failover for production high availability deployments.

45 min 4 distros 69 views
performance Advanced

Configure Linux NUMA optimization for multi-socket servers with memory policy tuning and CPU affinity

Optimize multi-socket server performance by configuring NUMA memory policies, CPU affinity, and topology-aware application placement. Achieve significant performance gains through proper NUMA optimization.

45 min 4 distros 74 views
security Intermediate

Implement Linux security hardening with CIS benchmarks and automated compliance scanning

Harden your Linux systems using CIS benchmarks with automated compliance scanning and continuous monitoring. Learn to implement security controls for filesystem permissions, user authentication, network policies, and maintain ongoing compliance with industry standards.

45 min 4 distros 68 views
security Intermediate

Configure NGINX rate limiting and DDoS protection with advanced security rules

Set up NGINX rate limiting modules, implement connection limits, and configure geographic blocking to protect your web applications from DDoS attacks and abuse.

25 min 4 distros 71 views
linux Intermediate

Configure centralized logging with rsyslog and logrotate for system monitoring and log management

Set up a centralized logging system using rsyslog server to collect logs from multiple clients, implement TLS encryption for secure transmission, and configure logrotate for automated log rotation and management.

45 min 4 distros 111 views
security Intermediate

Configure Falco runtime security for Kubernetes threat detection with eBPF monitoring

Set up Falco with eBPF monitoring to detect runtime security threats in Kubernetes clusters. Configure custom rules, integrate Prometheus metrics, and establish comprehensive threat detection for container workloads.

45 min 4 distros 149 views
monitoring Intermediate

Configure Prometheus Blackbox Exporter for endpoint monitoring with SSL and alerting

Set up Prometheus Blackbox Exporter to monitor HTTP, HTTPS, DNS, TCP, and ICMP endpoints with SSL certificate validation and automated alerting for comprehensive uptime monitoring.

25 min 4 distros 138 views
monitoring Intermediate

Configure Jaeger with NGINX reverse proxy and SSL termination

Set up Jaeger distributed tracing behind an NGINX reverse proxy with SSL termination and authentication. Learn to configure secure access, performance optimization, and production-ready monitoring for your microservices.

45 min 4 distros 140 views
monitoring Intermediate

Configure Zabbix 7 API automation with Python scripts for monitoring and alerting

Automate Zabbix 7 monitoring tasks with Python scripts using the API. Set up host discovery, template assignment, custom monitoring scripts, and alerting automation for streamlined infrastructure management.

45 min 4 distros 151 views
devops Intermediate

Configure SonarQube quality gates and custom rules for automated code quality enforcement

Set up SonarQube quality gates with custom conditions, create language-specific rules, and integrate automated quality enforcement into CI/CD pipelines for continuous code quality monitoring.

45 min 4 distros 121 views
security Intermediate

Configure Keycloak OAuth2 integration with web applications using OIDC and JWT tokens

Set up Keycloak as an OAuth2 identity provider with OIDC authentication flows. Configure client applications, implement JWT token validation, and secure NGINX reverse proxy with lua-resty-openidc for production web applications.

45 min 4 distros 185 views
security Intermediate

Implement two-factor authentication for SSH with Google Authenticator and TOTP

Secure your SSH connections by adding TOTP-based two-factor authentication using Google Authenticator and PAM modules for an additional layer of protection beyond passwords and keys.

25 min 4 distros 176 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer