Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxInstall and configure CockroachDB cluster with high availability and distributed SQL
databasesConfigure network interface monitoring with ICMP ping and connectivity testing
networkingInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesInstall and configure ArgoCD for GitOps continuous deployment with RBAC and SSL
devopsRecently published
Deploy Envoy-based service mesh in Kubernetes production environment with SSL and observability
devopsSet up Zabbix proxy for distributed network monitoring
monitoringImplement Envoy proxy JWT authentication with OAuth2 integration
securityConfigure Kafka Streams for real-time data processing and analytics
devopsImplement Podman pod security with network policies and microsegmentation
securityIntegrate Zabbix 7 with network automation and orchestration tools using Ansible and Python APIs
Build comprehensive network automation workflows by integrating Zabbix 7 monitoring with Ansible playbooks and custom Python scripts. This tutorial covers API authentication, automated host provisioning, and dynamic monitoring configuration for enterprise infrastructure management.
Set up iptables high availability clustering with keepalived for automatic failover
Configure a highly available firewall cluster using iptables and keepalived with VRRP for automatic failover. Set up rule synchronization between nodes and implement monitoring for production-grade firewall redundancy.
Set up Linux performance monitoring with perf tools and flame graphs
Configure perf tools and FlameGraph toolkit to capture detailed CPU profiling data and generate interactive flame graphs for Linux performance analysis. Monitor application hotspots, CPU usage patterns, and identify performance bottlenecks in production environments.
Configure Linux system performance monitoring with sar and sysstat for real-time metrics collection
Set up comprehensive system performance monitoring using sar and sysstat to collect CPU, memory, disk I/O, and network metrics with automated reporting and custom alerting for production Linux servers.
Configure SELinux policies for web applications and databases with custom rules and security hardening
Learn how to implement mandatory access controls with SELinux for web servers and databases. Configure custom security contexts, create application-specific policies, and harden your infrastructure with advanced SELinux rules.
Set up Thanos Receiver for remote write scalability with Prometheus integration
Configure Thanos Receiver to handle high-volume remote write traffic from multiple Prometheus instances. This tutorial covers installation, multi-tenancy setup, and performance optimization for large-scale metrics ingestion.
Configure advanced iptables rules for bridge network security and container isolation
Implement comprehensive bridge network security using advanced iptables rules to isolate containers, control traffic flow, and prevent lateral movement in virtualized environments.
Implement Istio security policies with authorization and authentication for Kubernetes service mesh
Configure Istio service mesh security with mTLS authentication, JWT validation, and RBAC authorization policies. This tutorial covers implementing comprehensive security controls for microservices communication in production Kubernetes environments.
Setup Elasticsearch 8 authentication with LDAP and Active Directory integration
Configure Elasticsearch 8 with X-Pack security to authenticate users against LDAP and Active Directory servers. This tutorial covers LDAP realm configuration, role-based access control, and troubleshooting authentication issues.
Optimize PHP-FPM performance with memory tuning and connection pooling for high-traffic websites
Configure PHP-FPM with optimized memory pools, process management, and connection limits to handle high-traffic websites efficiently. Learn production-grade tuning strategies for maximum performance.
Configure Linux cron jobs and system task scheduling with best practices
Learn to configure cron jobs and systemd timers for automated task scheduling on Linux systems with proper logging, security, and troubleshooting techniques.
Configure Linux environment variables and PATH management for development workflows
Learn how to properly configure Linux environment variables and manage your PATH for development workflows. This guide covers temporary and persistent variables, user vs system-wide configuration, and troubleshooting common issues across Ubuntu, Debian, AlmaLinux, Rocky Linux, and Fedora.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer