Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Beginner

Configure Linux audit system with auditd for security compliance and file monitoring

Set up the Linux audit system with auditd to monitor file access, user activities, and system calls for security compliance. Learn to create audit rules, analyze logs, and track privilege escalations.

25 min 6 distros 272 views
networking Beginner

Set up network interface monitoring with SNMP and basic traffic analysis

Learn how to install and configure SNMP daemon for network interface monitoring, implement basic traffic analysis with automated alerting, and create monitoring scripts with cron jobs for continuous network performance tracking.

25 min 6 distros 241 views
monitoring Beginner

Install and configure Uptime Kuma for website monitoring with SSL and email alerts

Learn how to install Uptime Kuma, a self-hosted monitoring tool, with SSL certificates, email notifications, and comprehensive website monitoring capabilities. Set up automated alerts and maintain reliable uptime tracking for your web services.

25 min 6 distros 249 views
monitoring Beginner

Install and configure Nagios Core 4.5 for network and server monitoring with web interface

Set up Nagios Core 4.5 monitoring system with Apache web interface to monitor servers, network devices, and services. Configure hosts, services, and email notifications for comprehensive infrastructure monitoring.

45 min 6 distros 185 views
linux Intermediate

Configure Linux system time synchronization with chrony and NTP hardening

Set up reliable time synchronization with chrony NTP client, configure secure time servers, and implement monitoring to prevent time drift on production servers.

25 min 6 distros 255 views
security Intermediate

Configure OSSEC HIDS for intrusion detection with email alerts and real-time monitoring

Set up OSSEC Host-based Intrusion Detection System with server-agent architecture, custom detection rules, email notifications, and real-time monitoring for comprehensive security monitoring across multiple systems.

45 min 6 distros 146 views
hosting Intermediate

Install and configure Varnish Cache 7 with NGINX backend for high-performance web acceleration

Set up Varnish Cache 7 as a high-performance HTTP accelerator with NGINX backend integration. This tutorial covers installation, SSL termination, cache optimization, purging mechanisms, and monitoring for production environments.

45 min 6 distros 139 views
networking Intermediate

Configure network load balancing with keepalived and VRRP for high availability failover

Set up keepalived with VRRP to create highly available network services with automatic failover. Configure virtual IP addresses that move between servers when one fails, ensuring zero-downtime load balancing.

25 min 6 distros 159 views
security Intermediate

Configure Linux firewall rules with fail2ban for SSH brute force protection and intrusion prevention

Set up fail2ban to automatically block SSH brute force attacks and protect your Linux server from unauthorized access attempts. Configure custom jails, firewall integration, and email notifications for comprehensive intrusion prevention.

25 min 6 distros 126 views
linux Intermediate

Configure Linux log rotation with logrotate and compression for system maintenance

Master log rotation with logrotate to manage disk space efficiently. Configure custom rotation policies, compression settings, and automated cleanup for applications and system logs.

25 min 6 distros 296 views
security Intermediate

Configure ModSecurity 3 web application firewall with OWASP Core Rule Set for advanced threat protection

Set up ModSecurity 3 with OWASP Core Rule Set 4.0 to protect web applications from SQL injection, XSS, and other attacks. Configure integration with Nginx and Apache, implement custom rules, and optimize performance for production environments.

45 min 6 distros 259 views
security Intermediate

Configure ClamAV antivirus scanning with automated threat detection and email alerts

Set up ClamAV daemon for real-time malware detection with automated scanning schedules, email notifications for threats, and optimized performance settings for production servers.

25 min 6 distros 221 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer