Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Install and configure Deno for web development with systemd and reverse proxy
hostingInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingInstall and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications
hostingInstall and configure Ollama for local AI models on Linux servers
devopsConfigure Linux system time synchronization with chrony and NTP hardening
linuxRecently published
Configure Kafka Schema Registry with Avro serialization for data processing
devopsSetup Elasticsearch 8 index lifecycle management for automated log retention and storage optimization
devopsConfigure Kafka Streams state stores and RocksDB optimization for high-performance streaming applications
devopsImplement Django continuous deployment with Git hooks and automated testing
devopsConfigure Django Redis caching and session storage for high-performance web applications
performanceConfigure Linux file encryption with LUKS and cryptsetup for data protection
Learn how to encrypt files and partitions using LUKS encryption with cryptsetup tools. This tutorial covers creating encrypted volumes, managing encryption keys, and automating mount operations for secure data protection.
Configure Linux audit system with auditd for security compliance and file monitoring
Set up the Linux audit system with auditd to monitor file access, user activities, and system calls for security compliance. Learn to create audit rules, analyze logs, and track privilege escalations.
Configure Linux environment variables and PATH management for development workflows
Learn how to properly configure Linux environment variables and manage your PATH for development workflows. This guide covers temporary and persistent variables, user vs system-wide configuration, and troubleshooting common issues across Ubuntu, Debian, AlmaLinux, Rocky Linux, and Fedora.
Configure OSSEC HIDS for intrusion detection with email alerts and real-time monitoring
Set up OSSEC Host-based Intrusion Detection System with server-agent architecture, custom detection rules, email notifications, and real-time monitoring for comprehensive security monitoring across multiple systems.
Configure ModSecurity 3 web application firewall with OWASP Core Rule Set for advanced threat protection
Set up ModSecurity 3 with OWASP Core Rule Set 4.0 to protect web applications from SQL injection, XSS, and other attacks. Configure integration with Nginx and Apache, implement custom rules, and optimize performance for production environments.
Configure AppArmor security profiles for web servers and databases with custom policy enforcement
Set up mandatory access control for Nginx, Apache, MySQL, and PostgreSQL using AppArmor security profiles. Learn to create custom policies, debug profile violations, and implement advanced enforcement for production web servers and databases.
Configure Tailscale mesh VPN with subnet routing and ACL policies for secure network access
Set up a zero-trust mesh VPN network with Tailscale that includes subnet routing for local network access, granular ACL policies for security, and exit nodes for secure internet access.
Configure Linux system logging with rsyslog and journald for centralized log management
Set up comprehensive Linux logging infrastructure using rsyslog for traditional syslog handling and journald for systemd service logs. Configure remote logging, log rotation, filtering rules, and troubleshoot common logging performance issues.
Configure Elasticsearch 8 cluster with multiple nodes for high availability and scalability
Set up a production-ready Elasticsearch 8 cluster with dedicated master, data, and coordinating nodes for high availability, fault tolerance, and horizontal scalability across multiple servers.
Configure GitLab container registry with SSL certificates and security hardening
Set up GitLab's integrated Docker registry with SSL/TLS encryption, security headers, and production-ready hardening for secure container image storage and distribution.
Implement Kubernetes admission controllers with OPA Gatekeeper for policy enforcement
Set up OPA Gatekeeper admission controllers to enforce security policies, resource governance, and compliance rules across your Kubernetes cluster with custom constraint templates.
Secure Podman containers with SELinux and AppArmor mandatory access controls
Implement mandatory access controls for Podman containers using SELinux on Red Hat-based systems and AppArmor on Debian-based systems. Learn to configure security policies, monitor violations, and harden container security with production-grade controls.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer