Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

devops Intermediate

Configure Kubernetes persistent volumes with NFS storage for container data persistence

Set up NFS-backed persistent volumes in Kubernetes to provide shared, durable storage for containerized applications across multiple nodes with automatic failover capabilities.

25 min 4 distros 269 views
security Advanced

Implement OpenResty JWT authentication with OAuth2 integration for secure web applications

Set up secure JWT-based authentication in OpenResty with OAuth2 provider integration using lua-resty-jwt module. Configure token validation, authentication middleware, and security policies for production web applications.

45 min 4 distros 418 views
security Advanced

Configure Redis Sentinel with SSL/TLS encryption and authentication for high availability

Set up a production-grade Redis Sentinel cluster with SSL/TLS encryption, authentication, and automatic failover for high availability. This tutorial covers certificate generation, security configuration, and monitoring setup.

45 min 4 distros 328 views
hosting Intermediate

Deploy Django application with Gunicorn and PostgreSQL database migrations

Learn how to deploy a production-ready Django application with Gunicorn WSGI server, PostgreSQL database, and automated database migrations on Ubuntu, Debian, AlmaLinux, and Rocky Linux systems.

35 min 4 distros 508 views
performance Beginner

Benchmark and optimize Linux disk I/O performance with fio testing

Learn how to benchmark disk I/O performance using fio (Flexible I/O tester) to identify storage bottlenecks and optimize your Linux system's disk performance through comprehensive read/write testing and analysis.

25 min 6 distros 475 views
linux Beginner

Configure Linux cron jobs and system task scheduling with best practices

Learn to configure cron jobs and systemd timers for automated task scheduling on Linux systems with proper logging, security, and troubleshooting techniques.

25 min 6 distros 471 views
security Beginner

Configure Linux file encryption with LUKS and cryptsetup for data protection

Learn how to encrypt files and partitions using LUKS encryption with cryptsetup tools. This tutorial covers creating encrypted volumes, managing encryption keys, and automating mount operations for secure data protection.

45 min 6 distros 443 views
security Beginner

Configure Linux audit system with auditd for security compliance and file monitoring

Set up the Linux audit system with auditd to monitor file access, user activities, and system calls for security compliance. Learn to create audit rules, analyze logs, and track privilege escalations.

25 min 6 distros 563 views
monitoring Beginner

Install and configure Uptime Kuma for website monitoring with SSL and email alerts

Learn how to install Uptime Kuma, a self-hosted monitoring tool, with SSL certificates, email notifications, and comprehensive website monitoring capabilities. Set up automated alerts and maintain reliable uptime tracking for your web services.

25 min 6 distros 565 views
databases Beginner

Install and configure MongoDB 8.0 with authentication and SSL encryption

Set up MongoDB 8.0 from official repositories with authentication enabled and SSL/TLS encryption. Configure admin users, implement security hardening, and establish monitoring for production deployments.

25 min 6 distros 367 views
linux Beginner

Configure Linux file compression and archiving with tar, gzip and backup automation

Learn to create compressed archives with tar and gzip, manage different compression formats, and implement automated backup scripts with rotation for efficient system maintenance and data protection.

25 min 6 distros 420 views
linux Beginner

Configure Linux user and group management with useradd, usermod and advanced account security

Learn to manage Linux users and groups with useradd, usermod, and groupadd commands. This tutorial covers creating accounts, setting permissions, configuring password policies, and implementing security best practices for production systems.

25 min 6 distros 376 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer