Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Install and configure ArgoCD for GitOps continuous deployment with RBAC and SSL
devopsInstall and configure CockroachDB cluster with high availability and distributed SQL
databasesInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesInstall and configure Loki for centralized log aggregation with Grafana integration
monitoringInstall and configure WireGuard VPN server with client management
networkingRecently published
Configure Nagios SNMP monitoring for network devices with automated discovery and templates
monitoringIntegrate Elasticsearch 8 with Prometheus monitoring and Grafana dashboards
monitoringSet up NGINX web application firewall with ModSecurity 3 and OWASP Core Rule Set
securityConfigure NGINX reverse proxy with advanced caching and load balancing
hostingConfigure Netdata alerts with Slack and Microsoft Teams for real-time monitoring notifications
monitoringSet up nftables IPv6 NAT and dual-stack networking with firewall rules and traffic forwarding
Configure nftables with IPv6 NAT masquerading, dual-stack IPv4/IPv6 forwarding, and comprehensive firewall rules for secure network routing and traffic management on modern Linux systems.
Configure advanced iptables rules for bridge network security and container isolation
Implement comprehensive bridge network security using advanced iptables rules to isolate containers, control traffic flow, and prevent lateral movement in virtualized environments.
Configure Linux audit logging for security compliance and monitoring
Set up comprehensive audit logging with auditd daemon to track file system changes, process execution, and network connections for security compliance and forensic analysis.
Configure network bridge interfaces for VM networking and container communication
Set up Linux network bridges to enable communication between virtual machines, containers, and physical networks. Configure bridge interfaces using netplan, bridge utilities, and implement security policies for production environments.
Configure network bonding and VLAN tagging for high availability and network segmentation
Set up network bonding for link aggregation and failover protection while implementing VLAN tagging for network segmentation. This tutorial covers bond configuration with Netplan and NetworkManager across multiple interfaces.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer