Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

linux Beginner

Configure shell aliases and functions for development productivity

Set up custom shell aliases and functions to streamline your development workflow, reduce typing, and boost terminal productivity with reusable commands and automation shortcuts.

20 min 4 distros 163 views
linux Intermediate

Implement Linux resource quotas with systemd and automated enforcement

Configure systemd resource control and cgroups v2 to implement CPU, memory, and I/O quotas with automated enforcement. Set up monitoring and alerts for resource violations across production workloads.

45 min 4 distros 323 views
security Advanced

Configure Keycloak OAuth2 integration with OpenResty for enterprise SSO

Set up enterprise single sign-on by integrating Keycloak OAuth2 authentication with OpenResty using lua-resty-openidc. Configure secure authentication flows, JWT token validation, and session management for production web applications.

45 min 4 distros 208 views
devops Intermediate

Configure Kubernetes External DNS for automatic DNS record management with cloud providers

Set up External DNS controller to automatically create and manage DNS records for your Kubernetes services and ingresses. This tutorial covers installation, cloud provider integration, and security configuration for production-ready DNS automation.

25 min 4 distros 221 views
databases Intermediate

Set up automated MySQL database backups with compression and rotation

Configure automated MySQL database backups with compression, encryption, and rotation using systemd timers. Includes monitoring and alerting for backup failures.

45 min 4 distros 201 views
security Intermediate

Configure NGINX rate limiting and advanced security rules for DDoS protection

Configure NGINX with comprehensive rate limiting, connection throttling, and advanced security headers to protect your web applications from DDoS attacks and malicious traffic. Learn to implement zone-based rate limiting, geographic blocking, and real-time monitoring for production environments.

25 min 4 distros 260 views
databases Intermediate

Implement Redis backup automation with compression and encryption

Set up automated Redis backups with compression and GPG encryption for production environments. Create systemd timers for scheduled backups and implement secure remote storage for Redis data protection.

25 min 4 distros 221 views
monitoring Intermediate

Implement SNMP trap monitoring and alerting system for proactive network management

Set up comprehensive SNMP trap monitoring with snmptrapd, automated alerting via email and webhooks, and integration with monitoring platforms like Nagios and Zabbix for proactive network management and real-time issue detection.

45 min 4 distros 212 views
security Intermediate

Configure Redis backup encryption with GPG for secure automated backups

Set up encrypted Redis backups using GPG keys with automated scheduling through systemd timers. This tutorial covers GPG key management, backup script creation, and secure restoration procedures for production Redis environments.

45 min 4 distros 301 views
security Advanced

Configure Airflow DAG security and isolation with RBAC policies

Set up comprehensive security for Apache Airflow with role-based access control, DAG-level permissions, and resource isolation. Configure user authentication, implement fine-grained security policies, and establish monitoring for production-grade workflow orchestration.

45 min 4 distros 263 views
security Intermediate

Set up OSSEC agent deployment and centralized management with automated configuration

Deploy and manage OSSEC Host-based Intrusion Detection System (HIDS) across multiple servers with centralized monitoring, automated agent configuration, and real-time security event processing for enterprise-scale infrastructure protection.

45 min 4 distros 254 views
security Advanced

Implement HAProxy WAF integration with ModSecurity 3 for advanced threat protection

Configure HAProxy with ModSecurity 3 using SPOE protocol to create a high-performance web application firewall that protects against OWASP Top 10 threats while maintaining load balancing capabilities.

45 min 4 distros 256 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer