Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

databases Advanced

Configure Elasticsearch 8 cluster with multiple nodes for high availability and scalability

Set up a production-ready Elasticsearch 8 cluster with dedicated master, data, and coordinating nodes for high availability, fault tolerance, and horizontal scalability across multiple servers.

45 min 4 distros 440 views
hosting Intermediate

Setup nginx reverse proxy with SSL certificates and security hardening

Configure nginx as a secure reverse proxy with Let's Encrypt SSL certificates, security headers, and DDoS protection. Learn to proxy backend applications, implement rate limiting, and harden your web server configuration.

35 min 4 distros 245 views
monitoring Advanced

Set up Zabbix 7 high availability cluster with PostgreSQL replication and automated failover

Build a production-grade Zabbix 7 high availability cluster with PostgreSQL streaming replication, HAProxy load balancing, and automated failover capabilities for enterprise monitoring.

90 min 4 distros 411 views
devops Intermediate

Configure GitLab container registry with SSL certificates and security hardening

Set up GitLab's integrated Docker registry with SSL/TLS encryption, security headers, and production-ready hardening for secure container image storage and distribution.

45 min 4 distros 212 views
security Intermediate

Configure GitLab LDAP authentication and user management with Active Directory integration

Set up GitLab LDAP authentication with Active Directory to centralize user management, enable automatic user provisioning, and implement group-based access control for your GitLab instance.

45 min 4 distros 260 views
networking Advanced

Configure Envoy proxy rate limiting and circuit breakers for microservices resilience

Learn to implement production-grade Envoy proxy with global and local rate limiting, circuit breakers, and health checks to build resilient microservices architecture that can handle traffic spikes and service failures gracefully.

45 min 4 distros 377 views
devops Advanced

Implement Kubernetes admission controllers with OPA Gatekeeper for policy enforcement

Set up OPA Gatekeeper admission controllers to enforce security policies, resource governance, and compliance rules across your Kubernetes cluster with custom constraint templates.

45 min 4 distros 503 views
devops Advanced

Configure Consul Connect service mesh with Envoy proxy for secure microservices communication

Set up Consul Connect service mesh with Envoy sidecar proxies to enable secure, encrypted service-to-service communication with mutual TLS authentication, traffic policies, and observability for your microservices architecture.

45 min 4 distros 318 views
security Advanced

Implement Cilium Tetragon runtime security for Kubernetes with eBPF monitoring and threat detection

Deploy Cilium Tetragon for advanced runtime security monitoring in Kubernetes clusters using eBPF technology. Configure security policies, threat detection rules, and real-time monitoring with Grafana dashboards for comprehensive container protection.

45 min 4 distros 401 views
monitoring Intermediate

Set up Prometheus and Grafana monitoring stack with Docker compose

Deploy a complete Prometheus and Grafana monitoring stack using Docker Compose with persistent storage, custom dashboards, and alerting rules for production monitoring.

25 min 4 distros 435 views
databases Advanced

Configure ZooKeeper for ClickHouse replication with multi-node cluster setup

Set up a production-ready ZooKeeper ensemble to enable ClickHouse replication across multiple nodes. This tutorial covers ZooKeeper cluster configuration, ClickHouse integration, security hardening, and failover testing.

45 min 4 distros 297 views
security Advanced

Configure Apache Airflow LDAP authentication and RBAC with Active Directory integration

Configure Apache Airflow with LDAP authentication against Active Directory, implement role-based access control (RBAC), and set up secure user group management for enterprise environments.

45 min 4 distros 334 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer