Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

devops Intermediate

Configure SonarQube quality gates and custom rules for automated code quality enforcement

Set up SonarQube quality gates with custom conditions, create language-specific rules, and integrate automated quality enforcement into CI/CD pipelines for continuous code quality monitoring.

45 min 4 distros 11 views
security Intermediate

Configure Keycloak custom themes and branding with SSL integration and production deployment

Set up custom Keycloak themes with your organization's branding, implement SSL certificates, and deploy to production with hot reload development workflow and performance optimization.

45 min 4 distros 26 views
security Advanced

Configure advanced iptables firewall rules with logging, port knocking, and DDoS protection

Build a production-grade iptables firewall with connection tracking, rate limiting, and port knocking. Includes automated DDoS protection, detailed logging, and security hardening for enterprise environments.

45 min 4 distros 24 views
security Intermediate

Configure Nexus Repository Manager LDAP authentication for enterprise user management

Set up LDAP authentication for Nexus Repository Manager to enable centralized enterprise user management and seamless integration with Active Directory for secure artifact repository access.

25 min 4 distros 17 views
security Advanced

Setup Keycloak SAML integration for enterprise single sign-on with identity providers

Configure Keycloak as a SAML identity provider for enterprise SSO, integrate with external identity providers, and implement secure SAML service provider connections with attribute mapping.

45 min 4 distros 39 views
security Intermediate

Configure Keycloak OAuth2 integration with web applications using OIDC and JWT tokens

Set up Keycloak as an OAuth2 identity provider with OIDC authentication flows. Configure client applications, implement JWT token validation, and secure NGINX reverse proxy with lua-resty-openidc for production web applications.

45 min 4 distros 35 views
security Intermediate

Configure Grafana LDAP authentication and role-based access control with Active Directory integration

Set up Grafana with LDAP authentication to connect with Active Directory, configure role-based access control for teams, and implement production-ready security policies for enterprise environments.

25 min 4 distros 69 views
monitoring Intermediate

Configure Loki with S3 storage backend for scalable centralized logging

Set up Grafana Loki with S3-compatible object storage for scalable log aggregation. Configure retention policies, schema management, and monitoring for production-ready centralized logging infrastructure.

45 min 4 distros 27 views
devops Intermediate

Deploy Consul Template for dynamic configuration management with systemd integration

Set up Consul Template to automatically generate configuration files from Consul key-value pairs and service discovery data. This tutorial covers installation, template creation, systemd service configuration, and monitoring setup for production environments.

25 min 4 distros 34 views
security Intermediate

Secure Grafana with OAuth authentication and RBAC integration

Configure Grafana with OAuth SSO authentication, implement role-based access control (RBAC), and harden security with SSL certificates for enterprise-grade monitoring dashboard access.

45 min 4 distros 26 views
monitoring Intermediate

Set up Prometheus Alertmanager webhook notifications for Loki log alerts with Grafana integration

Configure Prometheus Alertmanager to send webhook notifications for Loki log-based alerts with proper routing, templating, and Grafana dashboard integration for comprehensive monitoring.

45 min 4 distros 17 views
security Intermediate

Implement two-factor authentication for SSH with Google Authenticator and TOTP

Secure your SSH connections by adding TOTP-based two-factor authentication using Google Authenticator and PAM modules for an additional layer of protection beyond passwords and keys.

25 min 4 distros 31 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer