Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

devops Advanced

Set up Consul multi-datacenter replication with ACL token replication

Configure Consul WAN federation across multiple datacenters with secure ACL token replication. Enable automatic token synchronization, gossip encryption, and cross-datacenter service discovery for distributed infrastructure.

45 min 4 distros 9 views
devops Advanced

Integrate AWX 24.6 with HashiCorp Vault for dynamic secrets management and secure automation workflows

Configure AWX to securely retrieve database credentials and API keys from HashiCorp Vault using dynamic secrets that automatically rotate. Set up credential types, database engines, and secure playbook execution with centralized secrets management.

45 min 4 distros 52 views
security Advanced

Implement Envoy proxy JWT authentication with OAuth2 integration

Configure Envoy proxy with JWT authentication filters integrated with Keycloak OAuth2 provider for secure microservices communication and advanced rate limiting policies.

45 min 4 distros 6 views
security Advanced

Implement Podman pod security with network policies and microsegmentation

Secure Podman pods with custom network policies, traffic filtering, and microsegmentation using CNI plugins and netavark. Implement zero-trust networking with firewall rules and container isolation.

45 min 4 distros 44 views
devops Advanced

Configure Consul Connect with Kubernetes integration for secure service mesh communication

Set up Consul Connect as a service mesh on Kubernetes with Helm, enabling automatic mTLS encryption, service discovery, and traffic routing between microservices for secure inter-service communication.

45 min 4 distros 42 views
security Advanced

Configure Apache Airflow DAG security and secrets management with RBAC policies and encryption

Implement comprehensive security for Apache Airflow DAGs using role-based access control, HashiCorp Vault integration, and encrypted secrets management. Configure granular permissions, audit logging, and isolation policies for production workflows.

45 min 4 distros 10 views
security Intermediate

Configure Falco runtime security for Kubernetes threat detection with eBPF monitoring

Set up Falco with eBPF monitoring to detect runtime security threats in Kubernetes clusters. Configure custom rules, integrate Prometheus metrics, and establish comprehensive threat detection for container workloads.

45 min 4 distros 29 views
security Advanced

Implement Consul Connect mTLS with Vault PKI backend for secure service mesh communication

Set up mutual TLS authentication for Consul Connect using HashiCorp Vault's PKI backend to secure service-to-service communication with automatic certificate management and rotation.

45 min 4 distros 38 views
devops Advanced

Configure Podman secrets management with HashiCorp Vault integration

Set up secure container secrets management by integrating Podman with HashiCorp Vault. Configure dynamic secret injection, automated rotation, and production-ready monitoring for containerized applications.

45 min 4 distros 44 views
devops Advanced

Implement Ansible AWX Tower for enterprise automation workflows with RBAC and inventory management

Deploy Ansible AWX with Docker Compose for centralized automation management. Configure enterprise RBAC, dynamic inventory sources, and workflow templates for scalable infrastructure orchestration across multiple environments.

45 min 4 distros 30 views
devops Intermediate

Configure Ansible Vault for secret management and encryption with playbook automation

Set up Ansible Vault to encrypt sensitive data like passwords, API keys, and certificates in your playbooks. Learn to create encrypted variables, manage vault passwords, and integrate secure secret handling into automated deployments.

25 min 4 distros 29 views
security Advanced

Set up Apache Airflow DAG security policies and data governance with RBAC and audit logging

Configure comprehensive security for Apache Airflow with role-based access control, DAG-level permissions, data lineage tracking, and audit logging for compliance monitoring in production environments.

45 min 4 distros 32 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer