Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

devops Advanced

Configure Kafka Streams state stores and RocksDB optimization for high-performance streaming applications

Configure Kafka Streams state stores with RocksDB optimization for high-performance streaming applications. Learn custom state store configurations, RocksDB tuning parameters, and monitoring techniques for production-grade stream processing.

45 min 4 distros 21 views
performance Intermediate

Configure Django Redis caching and session storage for high-performance web applications

Set up Redis as both cache backend and session storage for Django applications. Improve page load times and user experience with proper Redis configuration and Django integration.

25 min 4 distros 31 views
devops Intermediate

Set up Kafka Streams testing framework with TopologyTestDriver for automated stream processing validation

Configure a complete testing framework for Kafka Streams applications using TopologyTestDriver to validate stream processing logic with automated tests and mock data pipelines.

45 min 4 distros 18 views
monitoring Intermediate

Set up PHP application performance monitoring with APM tools and real-time metrics collection

Monitor PHP application performance with New Relic APM and Elastic APM, implement custom metrics collection, and set up comprehensive Grafana dashboards for real-time application observability and performance optimization.

35 min 4 distros 20 views
databases Intermediate

Setup DuckDB with Apache Airflow for automated data pipelines

Configure DuckDB as a high-performance analytical database backend for Apache Airflow workflows. Build automated data pipelines that process files, APIs, and databases using DuckDB's columnar engine.

45 min 4 distros 50 views
security Advanced

Configure auditd with Elasticsearch and Kibana for compliance reporting

Set up comprehensive Linux audit logging with auditd, integrate with Elasticsearch 8 and Kibana 8 for centralized analysis, and create compliance dashboards for PCI DSS, HIPAA, and SOX reporting requirements.

45 min 4 distros 56 views
security Intermediate

Configure LDAP authentication for centralized user management with OpenLDAP and SSSD

Set up centralized user authentication using OpenLDAP server with SSSD client integration. Configure PAM and NSS for seamless login across multiple Linux systems with directory-based user management.

45 min 4 distros 65 views
hosting Intermediate

Configure Cherokee web server with MySQL database optimization and performance tuning

Set up Cherokee web server with optimized MySQL database connections, FastCGI configuration, and performance tuning for high-traffic web applications on Linux systems.

45 min 4 distros 52 views
linux Intermediate

Configure systemd service resource limits and security isolation

Configure cgroups v2 resource limits and security isolation for systemd services to prevent resource exhaustion and improve system security. This tutorial covers memory, CPU, and I/O limits with monitoring and troubleshooting.

35 min 4 distros 105 views
performance Advanced

Configure NGINX HTTP/2 server push and connection multiplexing

Configure NGINX HTTP/2 server push and connection multiplexing to reduce page load times by up to 50% through proactive resource delivery and efficient connection reuse for high-performance web applications.

25 min 4 distros 97 views
security Advanced

Integrate ModSecurity 3 with SOAR platforms for automated incident response and threat detection

Set up ModSecurity 3 with structured logging, webhook notifications, and API integrations to automatically feed security events into SOAR platforms for real-time threat detection and incident response workflows.

45 min 4 distros 57 views
security Intermediate

Set up ELK Stack for centralized ModSecurity log analysis and monitoring

Configure Elasticsearch 8, Logstash 8, and Kibana 8 to collect, parse, and visualize ModSecurity web application firewall logs from multiple servers for centralized security monitoring and threat detection.

45 min 4 distros 57 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer