Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Beginner

Configure SSH key authentication and disable password login for secure server access

Set up SSH public key authentication on Linux servers and disable password-based logins to prevent brute force attacks and improve security. This tutorial covers key generation, server configuration, and troubleshooting common authentication issues.

20 min 6 distros 337 views
networking Advanced

Configure OSPF dynamic routing with FRRouting for enterprise network failover

Set up Open Shortest Path First (OSPF) protocol using FRRouting for dynamic network routing, multi-area configurations, and automatic failover in enterprise environments.

45 min 6 distros 368 views
hosting Intermediate

Install and configure Jetty application server with SSL certificates and performance tuning

Deploy Eclipse Jetty application server with SSL/TLS encryption, systemd service management, and production-ready performance optimizations. Configure reverse proxy integration and security hardening for Java web applications.

45 min 6 distros 460 views
networking Advanced

Configure network interface bonding with LACP and failover for enterprise networking

Set up LACP bonding for high-availability network interfaces with automatic failover. Configure both Linux bonding drivers and switch-side LACP for enterprise network redundancy and increased bandwidth.

45 min 6 distros 376 views
security Intermediate

Configure AppArmor security profiles for web servers and databases with custom policy enforcement

Set up mandatory access control for Nginx, Apache, MySQL, and PostgreSQL using AppArmor security profiles. Learn to create custom policies, debug profile violations, and implement advanced enforcement for production web servers and databases.

45 min 6 distros 385 views
networking Intermediate

Configure Tailscale mesh VPN with subnet routing and ACL policies for secure network access

Set up a zero-trust mesh VPN network with Tailscale that includes subnet routing for local network access, granular ACL policies for security, and exit nodes for secure internet access.

25 min 6 distros 334 views
databases Advanced

Configure ZooKeeper for ClickHouse replication with multi-node cluster setup

Set up a production-ready ZooKeeper ensemble to enable ClickHouse replication across multiple nodes. This tutorial covers ZooKeeper cluster configuration, ClickHouse integration, security hardening, and failover testing.

45 min 4 distros 297 views
devops Intermediate

Install and configure Cilium CNI for Kubernetes with eBPF networking and security policies

Set up Cilium as your Kubernetes CNI plugin with advanced eBPF networking, load balancing, and network security policies. Includes Hubble observability for complete network visibility.

25 min 6 distros 372 views
databases Intermediate

Install and configure Elasticsearch 8 with security and performance optimization

Set up a production-ready Elasticsearch 8 cluster with SSL/TLS security, optimized JVM settings, and automated backups. Includes memory tuning, index mapping strategies, and common troubleshooting fixes.

45 min 6 distros 312 views
devops Intermediate

Install and configure Podman for rootless containers on Linux

Learn to install Podman and configure rootless containers as a secure Docker alternative. Includes Docker Compose migration, systemd integration, and troubleshooting common permission issues.

25 min 6 distros 448 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer