Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

devops Intermediate

Setup Elasticsearch 8 index lifecycle management for automated log retention and storage optimization

Configure Elasticsearch 8 ILM policies to automatically manage log data through hot-warm-cold phases, optimize storage costs, and enforce retention policies for production workloads.

25 min 4 distros 11 views
linux Intermediate

Configure automated system maintenance with advanced cron scheduling and shell scripts

Set up comprehensive automated system maintenance using advanced cron scheduling patterns, custom shell scripts, and monitoring alerts to ensure optimal server performance and reliability.

45 min 4 distros 19 views
monitoring Intermediate

Configure advanced network monitoring with SmokePing for detailed latency analysis

Set up SmokePing for detailed network latency monitoring with visual graphs, multi-target analysis, and advanced alerting. Perfect for tracking network performance trends and identifying connectivity issues across multiple hosts.

45 min 4 distros 26 views
security Intermediate

Configure automated compliance scanning with OpenSCAP and audit reporting

Set up OpenSCAP security compliance scanning with automated systemd timers, generate HTML and XML audit reports, and configure SCAP security profiles for continuous compliance monitoring.

25 min 4 distros 35 views
security Advanced

Configure encrypted network storage with LUKS and NFS for secure file sharing

Set up enterprise-grade encrypted network storage by combining LUKS disk encryption with NFS file sharing. This advanced configuration provides secure, centralized file access across multiple systems while maintaining data protection at rest.

45 min 4 distros 51 views
security Intermediate

Set up LUKS full disk encryption during Linux installation

Configure full disk encryption with LUKS during OS installation to secure your data at rest. Includes post-installation key management, performance optimization, and troubleshooting for production systems.

45 min 4 distros 95 views
security Advanced

Configure auditd with Elasticsearch and Kibana for compliance reporting

Set up comprehensive Linux audit logging with auditd, integrate with Elasticsearch 8 and Kibana 8 for centralized analysis, and create compliance dashboards for PCI DSS, HIPAA, and SOX reporting requirements.

45 min 4 distros 56 views
linux Intermediate

Configure network-attached storage backup with NFS and encryption

Set up an encrypted NFS backup server with automated backup scripts and performance monitoring. Configure LUKS encryption, NFS exports, and centralized backup management for secure enterprise storage.

45 min 4 distros 76 views
security Intermediate

Configure Nagios Core 4.5 SSL certificates and security hardening with authentication controls

Secure your Nagios monitoring with SSL certificates, advanced authentication, and comprehensive access controls. This guide covers Let's Encrypt integration, web interface hardening, and security monitoring setup.

45 min 4 distros 57 views
security Intermediate

Configure SELinux mandatory access controls for enhanced security

Set up SELinux on Ubuntu and Debian systems, configure security modes and policies, create custom application rules, and implement comprehensive monitoring for enhanced Linux security hardening.

45 min 4 distros 43 views
databases Advanced

Configure ScyllaDB SSL encryption and authentication with certificate management and security hardening

Secure your ScyllaDB cluster with comprehensive SSL/TLS encryption for client connections and inter-node communication. This tutorial covers certificate generation, authentication setup, and production security hardening.

45 min 4 distros 78 views
security Advanced

Configure SSH certificate authentication with CA signing for secure server access

Set up SSH certificate-based authentication using a Certificate Authority to eliminate individual key management. Create signed user certificates that provide secure, scalable access control for multiple servers and users.

45 min 4 distros 71 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer