Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

databases Advanced

Configure PostgreSQL 17 streaming replication for high availability with automatic failover

Set up PostgreSQL 17 streaming replication between primary and replica servers with pg_auto_failover for automated high availability. This tutorial covers complete configuration from authentication to monitoring and maintenance procedures.

45 min 4 distros 71 views
security Intermediate

Implement HAProxy rate limiting and DDoS protection with advanced security rules

Configure HAProxy with comprehensive rate limiting, connection throttling, and DDoS protection using stick tables, ACLs, and advanced security rules to protect your applications from malicious traffic and ensure service availability.

45 min 4 distros 99 views
monitoring Intermediate

Monitor Consul with Prometheus and Grafana for service discovery observability

Set up comprehensive monitoring for HashiCorp Consul using Prometheus metrics collection and Grafana dashboards. Configure telemetry export, alerting rules, and visualization for service discovery health and performance.

35 min 4 distros 72 views
devops Advanced

Configure Kubernetes network policies with Calico CNI for microsegmentation and security enforcement

Learn to implement advanced network security in Kubernetes using Calico CNI. Configure namespace-based microsegmentation, application-level policies, and comprehensive monitoring for enterprise-grade cluster protection.

45 min 4 distros 69 views
databases Intermediate

Configure Deno database connections to PostgreSQL and Redis with connection pooling

Set up production-ready database connections in Deno applications with PostgreSQL and Redis, including SSL configuration, connection pooling, authentication, and comprehensive error handling for high-performance TypeScript applications.

45 min 4 distros 25 views
devops Advanced

Implement Kubernetes Pod Security Standards and admission controllers for policy enforcement

Configure Pod Security Standards with baseline and restricted profiles, deploy OPA Gatekeeper admission controller with custom policies, and implement ValidatingAdmissionWebhooks for comprehensive security enforcement in production Kubernetes clusters.

45 min 4 distros 81 views
monitoring Intermediate

Configure OpenTelemetry sampling strategies for high-traffic applications

Learn how to implement probabilistic, deterministic, and adaptive sampling strategies in OpenTelemetry to optimize distributed tracing performance and reduce storage costs in high-traffic production environments.

25 min 4 distros 68 views
databases Intermediate

Configure ScyllaDB backup and restore with automation

Set up automated daily backups for ScyllaDB with monitoring, restore procedures, and retention policies. Includes snapshot management, S3 storage integration, and comprehensive alerting for production NoSQL environments.

45 min 4 distros 65 views
performance Advanced

Implement NGINX Lua scripting for advanced caching logic with OpenResty

Configure OpenResty with Lua scripting for advanced caching strategies including dynamic cache keys, intelligent TTL management, and conditional cache invalidation based on business logic.

45 min 4 distros 232 views
databases Intermediate

Configure MinIO backup and disaster recovery with automated snapshots and replication

Configure comprehensive backup and disaster recovery for MinIO object storage with automated snapshots, cross-site replication, and encryption. Implement production-ready backup strategies to protect critical data and ensure business continuity.

45 min 4 distros 142 views
hosting Intermediate

Configure Apache HTTP/2 with performance optimization and modern security headers

Enable HTTP/2 protocol in Apache with SSL/TLS encryption, implement advanced performance optimization settings including compression and caching, and configure modern security headers for production deployments.

25 min 4 distros 92 views
security Advanced

Implement Consul ACL security and encryption for production deployments

Configure Consul's Access Control List (ACL) system with bootstrap tokens, implement TLS encryption for client-server communication, and enable gossip encryption to secure your Consul cluster for production environments with comprehensive authentication and authorization.

45 min 4 distros 133 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer