Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

databases Intermediate

Implement automated ClickHouse backups with S3 storage and monitoring

Set up automated backup solutions for ClickHouse databases with S3 storage, retention policies, and monitoring alerts. This tutorial covers backup tool installation, S3 configuration, scheduling with systemd timers, and health monitoring.

45 min 4 distros 33 views
security Intermediate

Implement encryption for Consul backups using GPG with automated snapshots and secure storage

Learn to create encrypted Consul backups using GPG encryption with automated snapshot scripts, secure key management, and remote storage integration for production disaster recovery.

45 min 4 distros 101 views
performance Advanced

Configure Varnish cache invalidation with automated purging strategies for high-performance web acceleration

Learn to configure advanced Varnish VCL for cache invalidation, implement PURGE and BAN strategies, and set up automated cache tagging for optimal performance. Master selective invalidation techniques and monitoring for production-grade web acceleration.

45 min 4 distros 124 views
security Intermediate

Implement HAProxy rate limiting and DDoS protection with advanced security rules

Configure HAProxy with comprehensive rate limiting, connection throttling, and DDoS protection using stick tables, ACLs, and advanced security rules to protect your applications from malicious traffic and ensure service availability.

45 min 4 distros 112 views
monitoring Intermediate

Monitor Consul with Prometheus and Grafana for service discovery observability

Set up comprehensive monitoring for HashiCorp Consul using Prometheus metrics collection and Grafana dashboards. Configure telemetry export, alerting rules, and visualization for service discovery health and performance.

35 min 4 distros 101 views
security Advanced

Implement Consul ACL security and encryption for production deployments

Configure Consul's Access Control List (ACL) system with bootstrap tokens, implement TLS encryption for client-server communication, and enable gossip encryption to secure your Consul cluster for production environments with comprehensive authentication and authorization.

45 min 4 distros 139 views
networking Intermediate

Setup Caddy with Consul service discovery for dynamic load balancing

Configure Caddy web server to automatically discover backend services through Consul, enabling dynamic load balancing without manual configuration updates. This setup provides high availability and automatic failover for microservices architectures.

45 min 4 distros 85 views
devops Advanced

Configure Consul backup and disaster recovery with automated snapshots and restoration

Set up automated Consul snapshots with verification, implement disaster recovery procedures, and configure monitoring for production-grade backup strategies that ensure service discovery data protection.

45 min 4 distros 246 views
monitoring Beginner

Monitor system resources with Netdata real-time performance dashboard

Set up Netdata for comprehensive real-time monitoring of CPU, memory, disk, and network resources with a web-based dashboard, email alerts, and customizable thresholds.

25 min 6 distros 187 views
security Beginner

Configure Linux file permissions and access control with umask and chmod best practices

Learn how to configure secure Linux file permissions using chmod, set default permissions with umask, and implement proper access control to prevent security vulnerabilities while fixing permission denied errors.

25 min 6 distros 151 views
networking Intermediate

Configure network bridge interfaces for VM networking and container communication

Set up Linux network bridges to enable communication between virtual machines, containers, and physical networks. Configure bridge interfaces using netplan, bridge utilities, and implement security policies for production environments.

45 min 6 distros 149 views
networking Intermediate

Configure Tailscale mesh VPN with subnet routing and ACL policies for secure network access

Set up a zero-trust mesh VPN network with Tailscale that includes subnet routing for local network access, granular ACL policies for security, and exit nodes for secure internet access.

25 min 6 distros 150 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer