Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

monitoring Intermediate

Configure Gunicorn performance monitoring with Prometheus metrics and Grafana dashboards

Set up comprehensive performance monitoring for Gunicorn WSGI servers using Prometheus metrics collection and Grafana visualization. Monitor request rates, response times, worker processes, memory usage, and implement automated alerting for production Python applications.

45 min 4 distros 52 views
databases Advanced

Configure PostgreSQL 17 streaming replication for high availability with automatic failover

Set up PostgreSQL 17 streaming replication between primary and replica servers with pg_auto_failover for automated high availability. This tutorial covers complete configuration from authentication to monitoring and maintenance procedures.

45 min 4 distros 71 views
security Intermediate

Implement HAProxy rate limiting and DDoS protection with advanced security rules

Configure HAProxy with comprehensive rate limiting, connection throttling, and DDoS protection using stick tables, ACLs, and advanced security rules to protect your applications from malicious traffic and ensure service availability.

45 min 4 distros 107 views
monitoring Intermediate

Monitor Consul with Prometheus and Grafana for service discovery observability

Set up comprehensive monitoring for HashiCorp Consul using Prometheus metrics collection and Grafana dashboards. Configure telemetry export, alerting rules, and visualization for service discovery health and performance.

35 min 4 distros 98 views
devops Advanced

Configure Kubernetes network policies with Calico CNI for microsegmentation and security enforcement

Learn to implement advanced network security in Kubernetes using Calico CNI. Configure namespace-based microsegmentation, application-level policies, and comprehensive monitoring for enterprise-grade cluster protection.

45 min 4 distros 85 views
security Advanced

Implement Jaeger security with TLS encryption and authentication for distributed tracing

Secure your Jaeger distributed tracing infrastructure with TLS encryption, JWT-based authentication, and RBAC policies. This tutorial covers certificate generation, collector/query service encryption, and UI authentication through reverse proxy integration.

45 min 4 distros 109 views
databases Intermediate

Configure Deno database connections to PostgreSQL and Redis with connection pooling

Set up production-ready database connections in Deno applications with PostgreSQL and Redis, including SSL configuration, connection pooling, authentication, and comprehensive error handling for high-performance TypeScript applications.

45 min 4 distros 39 views
devops Advanced

Implement Kubernetes Pod Security Standards and admission controllers for policy enforcement

Configure Pod Security Standards with baseline and restricted profiles, deploy OPA Gatekeeper admission controller with custom policies, and implement ValidatingAdmissionWebhooks for comprehensive security enforcement in production Kubernetes clusters.

45 min 4 distros 96 views
databases Intermediate

Configure ScyllaDB backup and restore with automation

Set up automated daily backups for ScyllaDB with monitoring, restore procedures, and retention policies. Includes snapshot management, S3 storage integration, and comprehensive alerting for production NoSQL environments.

45 min 4 distros 78 views
monitoring Intermediate

Configure Jaeger data retention policies and automated archiving with Elasticsearch backend

Learn to configure Jaeger data retention policies with Elasticsearch backend for automated trace archiving. This tutorial covers index lifecycle management, storage optimization, and performance monitoring to prevent disk space issues while maintaining observability requirements.

45 min 4 distros 45 views
databases Intermediate

Configure MinIO backup and disaster recovery with automated snapshots and replication

Configure comprehensive backup and disaster recovery for MinIO object storage with automated snapshots, cross-site replication, and encryption. Implement production-ready backup strategies to protect critical data and ensure business continuity.

45 min 4 distros 142 views
security Advanced

Implement Consul ACL security and encryption for production deployments

Configure Consul's Access Control List (ACL) system with bootstrap tokens, implement TLS encryption for client-server communication, and enable gossip encryption to secure your Consul cluster for production environments with comprehensive authentication and authorization.

45 min 4 distros 138 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer