Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

monitoring Advanced

Configure Thanos Ruler for distributed alerting across multiple Prometheus clusters

Set up Thanos Ruler to create a unified alerting layer across distributed Prometheus instances. This tutorial covers installation, global rule configuration, and cross-cluster alert federation for enterprise monitoring.

45 min 4 distros 59 views
security Advanced

Configure ClickHouse users and RBAC for production environments with authentication and access control

Secure your ClickHouse deployment with proper user authentication, role-based access control, and production-grade security policies. Learn to create users, manage roles, implement quota systems, and monitor access patterns for enterprise environments.

45 min 4 distros 34 views
databases Intermediate

Implement automated ClickHouse backups with S3 storage and monitoring

Set up automated backup solutions for ClickHouse databases with S3 storage, retention policies, and monitoring alerts. This tutorial covers backup tool installation, S3 configuration, scheduling with systemd timers, and health monitoring.

45 min 4 distros 33 views
devops Advanced

Setup Apache Airflow cluster with Kubernetes Executor for auto-scaling workflows

Deploy production-grade Apache Airflow with Kubernetes Executor for dynamic workflow scaling. Configure PostgreSQL backend, RBAC authentication, and auto-scaling policies with Prometheus monitoring integration.

45 min 4 distros 76 views
monitoring Advanced

Set up Thanos Receiver for remote write scalability with Prometheus integration

Configure Thanos Receiver to handle high-volume remote write traffic from multiple Prometheus instances. This tutorial covers installation, multi-tenancy setup, and performance optimization for large-scale metrics ingestion.

45 min 4 distros 134 views
devops Advanced

Implement Kubernetes Pod Security Standards and admission controllers for policy enforcement

Configure Pod Security Standards with baseline and restricted profiles, deploy OPA Gatekeeper admission controller with custom policies, and implement ValidatingAdmissionWebhooks for comprehensive security enforcement in production Kubernetes clusters.

45 min 4 distros 101 views
networking Intermediate

Configure NTP server with chrony and security hardening for precise time synchronization

Set up a production-grade NTP server using chrony with client access controls, firewall rules, and security hardening. Learn to configure upstream time sources, implement monitoring, and troubleshoot common synchronization issues.

35 min 4 distros 249 views
monitoring Advanced

Set up Jaeger high availability clustering with load balancing and failover

Deploy a production-grade Jaeger distributed tracing cluster with Elasticsearch backend, load-balanced collectors, and automatic failover for enterprise-scale microservices monitoring.

45 min 4 distros 183 views
devops Intermediate

Deploy Deno applications with Docker containers and production optimization

Learn how to containerize Deno applications with Docker using multi-stage builds, security hardening, and production-ready configuration. This tutorial covers creating optimized Dockerfiles, implementing proper caching strategies, and deploying with Docker Compose for scalable web applications.

35 min 4 distros 79 views
performance Intermediate

Configure Node.js application clustering with PM2 and load balancing

Set up PM2 clustering to scale Node.js applications across CPU cores with NGINX load balancing. Monitor performance and optimize resource utilization for high-traffic production workloads.

25 min 4 distros 85 views
devops Advanced

Implement Kubernetes network policies with Calico CNI and OPA Gatekeeper for security enforcement

Secure your Kubernetes cluster with Calico CNI network policies and OPA Gatekeeper admission control. This tutorial shows you how to implement pod isolation, policy enforcement, and admission validation for production-grade security.

45 min 4 distros 167 views
security Advanced

Setup Elasticsearch 8 SSL/TLS encryption and advanced security hardening with authentication and access control

Secure your Elasticsearch 8 cluster with comprehensive SSL/TLS encryption, user authentication, role-based access control, and network hardening. This tutorial covers production-grade security configuration to protect your search infrastructure.

45 min 4 distros 276 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer