Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

linux Intermediate

Configure Linux system logging with rsyslog and journald for centralized log management

Set up comprehensive Linux logging infrastructure using rsyslog for traditional syslog handling and journald for systemd service logs. Configure remote logging, log rotation, filtering rules, and troubleshoot common logging performance issues.

25 min 6 distros 258 views
devops Advanced

Implement Kubernetes cluster autoscaling with Helm charts and KEDA for dynamic workload scaling

Configure comprehensive Kubernetes autoscaling with cluster autoscaler for node management, KEDA for event-driven pod scaling, and vertical pod autoscaler for resource optimization. This tutorial covers production-grade deployment using Helm charts with monitoring and optimization strategies.

45 min 4 distros 134 views
devops Intermediate

Integrate SonarQube with Kubernetes and Helm charts for automated code quality scanning

Deploy SonarQube on Kubernetes using Helm charts with PostgreSQL database, configure automated code scanning workflows, and implement persistent storage for comprehensive code quality analysis in your CI/CD pipeline.

45 min 4 distros 190 views
devops Intermediate

Implement Kubernetes monitoring with Prometheus and Helm charts for comprehensive cluster observability

Deploy a production-ready Prometheus monitoring stack on Kubernetes using Helm charts with ServiceMonitors, alerting rules, and comprehensive cluster observability for metrics collection and monitoring.

45 min 4 distros 98 views
monitoring Intermediate

Monitor Docker containers with Prometheus and Grafana using cAdvisor for comprehensive metrics collection

Set up comprehensive Docker container monitoring with Prometheus, Grafana, and cAdvisor to track resource usage, performance metrics, and container health in production environments.

45 min 4 distros 225 views
devops Advanced

Integrate SonarQube with Kubernetes security scanning workflows for continuous code quality analysis

Set up SonarQube scanner in Kubernetes pods with admission controllers for automated security scanning. Configure CI/CD pipeline integration and security reporting for continuous code quality analysis in containerized environments.

45 min 4 distros 153 views
devops Advanced

Configure Ansible AWX 24.6 for enterprise automation with RBAC and inventory management

Deploy Ansible AWX 24.6 with Docker Compose, PostgreSQL backend, and enterprise-grade RBAC. Set up dynamic inventory management with multiple sources and implement automated job workflows with notifications for production environments.

45 min 4 distros 160 views
networking Advanced

Configure Envoy proxy rate limiting and circuit breakers for microservices resilience

Learn to implement production-grade Envoy proxy with global and local rate limiting, circuit breakers, and health checks to build resilient microservices architecture that can handle traffic spikes and service failures gracefully.

45 min 4 distros 217 views
devops Advanced

Implement Kubernetes admission controllers with OPA Gatekeeper for policy enforcement

Set up OPA Gatekeeper admission controllers to enforce security policies, resource governance, and compliance rules across your Kubernetes cluster with custom constraint templates.

45 min 4 distros 333 views
monitoring Intermediate

Monitor Istio service mesh with Prometheus and Grafana dashboards

Configure comprehensive monitoring for your Istio service mesh using Prometheus for metrics collection and Grafana for visualization. Set up observability dashboards to track traffic flow, security policies, and service performance with production-ready alerting rules.

45 min 4 distros 179 views
security Intermediate

Secure Podman containers with SELinux and AppArmor mandatory access controls

Implement mandatory access controls for Podman containers using SELinux on Red Hat-based systems and AppArmor on Debian-based systems. Learn to configure security policies, monitor violations, and harden container security with production-grade controls.

45 min 4 distros 182 views
security Advanced

Implement Cilium Tetragon runtime security for Kubernetes with eBPF monitoring and threat detection

Deploy Cilium Tetragon for advanced runtime security monitoring in Kubernetes clusters using eBPF technology. Configure security policies, threat detection rules, and real-time monitoring with Grafana dashboards for comprehensive container protection.

45 min 4 distros 230 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer