Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

monitoring Beginner

Install and configure Uptime Kuma for website monitoring with SSL and email alerts

Learn how to install Uptime Kuma, a self-hosted monitoring tool, with SSL certificates, email notifications, and comprehensive website monitoring capabilities. Set up automated alerts and maintain reliable uptime tracking for your web services.

25 min 6 distros 271 views
databases Beginner

Install and configure MongoDB 8.0 with authentication and SSL encryption

Set up MongoDB 8.0 from official repositories with authentication enabled and SSL/TLS encryption. Configure admin users, implement security hardening, and establish monitoring for production deployments.

25 min 6 distros 151 views
linux Beginner

Configure Linux user and group management with useradd, usermod and advanced account security

Learn to manage Linux users and groups with useradd, usermod, and groupadd commands. This tutorial covers creating accounts, setting permissions, configuring password policies, and implementing security best practices for production systems.

25 min 6 distros 164 views
monitoring Beginner

Install and configure Nagios Core 4.5 for network and server monitoring with web interface

Set up Nagios Core 4.5 monitoring system with Apache web interface to monitor servers, network devices, and services. Configure hosts, services, and email notifications for comprehensive infrastructure monitoring.

45 min 6 distros 219 views
security Beginner

Configure Linux file permissions and access control with umask and chmod best practices

Learn how to configure secure Linux file permissions using chmod, set default permissions with umask, and implement proper access control to prevent security vulnerabilities while fixing permission denied errors.

25 min 6 distros 145 views
security Beginner

Configure SSH key authentication and disable password login for secure server access

Set up SSH public key authentication on Linux servers and disable password-based logins to prevent brute force attacks and improve security. This tutorial covers key generation, server configuration, and troubleshooting common authentication issues.

20 min 6 distros 150 views
databases Intermediate

Install and configure ScyllaDB cluster with replication and performance tuning

Set up a production-ready ScyllaDB cluster with multi-node configuration, automatic replication, and performance optimization. ScyllaDB provides 10x better performance than Cassandra with drop-in compatibility.

45 min 6 distros 133 views
networking Advanced

Configure OSPF dynamic routing with FRRouting for enterprise network failover

Set up Open Shortest Path First (OSPF) protocol using FRRouting for dynamic network routing, multi-area configurations, and automatic failover in enterprise environments.

45 min 6 distros 171 views
linux Intermediate

Configure Linux system time synchronization with chrony and NTP hardening

Set up reliable time synchronization with chrony NTP client, configure secure time servers, and implement monitoring to prevent time drift on production servers.

25 min 6 distros 273 views
databases Intermediate

Configure Apache Cassandra cluster with multi-node setup and performance optimization

Set up a production-ready Apache Cassandra cluster with multiple nodes, configure replication strategies, and optimize JVM settings and performance parameters for high-throughput distributed NoSQL workloads.

45 min 6 distros 170 views
performance Intermediate

Optimize Nginx caching performance with Redis backend and memory tuning for high-traffic websites

Supercharge your web application performance by integrating Redis as a caching backend for Nginx using lua-resty-redis. This tutorial covers Redis memory optimization, Nginx worker tuning, and comprehensive performance testing for production environments.

45 min 6 distros 155 views
security Intermediate

Configure OSSEC HIDS for intrusion detection with email alerts and real-time monitoring

Set up OSSEC Host-based Intrusion Detection System with server-agent architecture, custom detection rules, email notifications, and real-time monitoring for comprehensive security monitoring across multiple systems.

45 min 6 distros 170 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer