Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxInstall and configure CockroachDB cluster with high availability and distributed SQL
databasesConfigure network interface monitoring with ICMP ping and connectivity testing
networkingInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesInstall and configure ArgoCD for GitOps continuous deployment with RBAC and SSL
devopsRecently published
Implement Podman pod security with network policies and microsegmentation
securityConfigure Apache Airflow high availability with CeleryExecutor and Redis clustering for production deployments
devopsConfigure advanced gRPC load balancing with Envoy Proxy health checks and circuit breakers
networkingConfigure custom Grafana plugins for specialized monitoring requirements
monitoringConfigure NGINX monitoring with Prometheus and Grafana dashboards for real-time web server performance metrics
monitoringAdvanced Nomad job templates and deployment strategies with rolling updates and canary deployments
Master production-grade Nomad job templates with HCL syntax, implement rolling updates with health checks, and deploy advanced blue-green and canary deployment patterns for resilient containerized workloads.
Configure advanced Consul ACL policies for production security hardening
Set up comprehensive Consul Access Control Lists with bootstrap tokens, role-based permissions, and secure inter-node communication for production environments. This tutorial covers ACL system initialization, policy creation, and agent token configuration.
Configure Vault auto-unseal with AWS KMS for high availability secrets management
Set up HashiCorp Vault with AWS KMS auto-unseal to eliminate manual unsealing processes and enable high availability deployments with automatic recovery.
Integrate Consul with Kubernetes service discovery and automatic configuration
Set up Consul for dynamic service discovery in Kubernetes clusters with automatic service registration, health checks, and configuration management for microservices orchestration.
Configure Istio security policies with mutual TLS and authorization for Kubernetes service mesh
Configure mutual TLS authentication and authorization policies in Istio service mesh for secure microservices communication. This tutorial covers PeerAuthentication, AuthorizationPolicy, and RBAC configuration for production Kubernetes environments.
Configure Kubernetes horizontal pod autoscaler for dynamic scaling based on resource metrics
Set up HPA with CPU and memory targets for automatic pod scaling. Configure metrics server and Prometheus adapter for custom metrics monitoring. Enable dynamic workload scaling based on resource utilization.
Monitor Kubernetes clusters with Prometheus and Grafana for container orchestration insights
Set up comprehensive Kubernetes monitoring using the Prometheus Operator and Grafana with persistent storage, RBAC, ServiceMonitors, and custom dashboards for complete cluster observability.
Implement encryption for Consul backups using GPG with automated snapshots and secure storage
Learn to create encrypted Consul backups using GPG encryption with automated snapshot scripts, secure key management, and remote storage integration for production disaster recovery.
Setup Apache Airflow cluster with Kubernetes Executor for auto-scaling workflows
Deploy production-grade Apache Airflow with Kubernetes Executor for dynamic workflow scaling. Configure PostgreSQL backend, RBAC authentication, and auto-scaling policies with Prometheus monitoring integration.
Set up Istio multi-cluster service mesh with cross-cluster communication
Deploy and configure Istio across multiple Kubernetes clusters with secure cross-cluster communication, shared service discovery, and unified traffic management for distributed microservices architecture.
Configure Kubernetes network policies with Calico CNI for microsegmentation and security enforcement
Learn to implement advanced network security in Kubernetes using Calico CNI. Configure namespace-based microsegmentation, application-level policies, and comprehensive monitoring for enterprise-grade cluster protection.
Implement Kubernetes Pod Security Standards and admission controllers for policy enforcement
Configure Pod Security Standards with baseline and restricted profiles, deploy OPA Gatekeeper admission controller with custom policies, and implement ValidatingAdmissionWebhooks for comprehensive security enforcement in production Kubernetes clusters.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer