Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Intermediate

Implement two-factor authentication for SSH with Google Authenticator and TOTP

Secure your SSH connections by adding TOTP-based two-factor authentication using Google Authenticator and PAM modules for an additional layer of protection beyond passwords and keys.

25 min 4 distros 176 views
devops Advanced

Integrate HashiCorp Vault with Kubernetes secrets management for secure container orchestration

Configure HashiCorp Vault integration with Kubernetes using the Vault CSI driver and Secrets Operator for automated secret injection and synchronization. This setup enables secure secret management for containerized applications with dynamic secret rotation and policy-based access controls.

45 min 4 distros 181 views
security Intermediate

Configure Vault dynamic secrets for databases with PostgreSQL and MySQL integration

Set up HashiCorp Vault's database secrets engine to automatically generate short-lived credentials for PostgreSQL and MySQL databases, improving security by eliminating static passwords and enabling automated credential rotation.

45 min 4 distros 154 views
security Intermediate

Set up Vault as a PKI certificate authority with SSL automation and intermediate CA

Build a production-grade PKI infrastructure using HashiCorp Vault with root and intermediate certificate authorities. Enable automated SSL certificate generation and renewal for your applications with RBAC policies.

45 min 4 distros 158 views
devops Intermediate

Integrate MinIO with Kubernetes for persistent storage and object data management

Deploy MinIO on Kubernetes using the operator for scalable object storage. Configure persistent volumes, high availability tenants, and secure ingress with SSL certificates.

45 min 4 distros 158 views
security Intermediate

Set up SSH bastion host with jump server configuration for secure network access

Configure an SSH bastion host to secure access to private networks, implementing jump server functionality with key-based authentication and access controls for enhanced security.

25 min 4 distros 145 views
hosting Advanced

Configure Apache HTTP Server clustering with mod_cluster and JBoss EAP for enterprise load balancing

Set up Apache HTTP Server with mod_cluster module to create an intelligent load balancing cluster with JBoss EAP application servers, featuring automatic node discovery, session clustering, and health monitoring.

45 min 6 distros 257 views
security Intermediate

Implement container security monitoring with Falco runtime detection

Set up Falco for real-time container security monitoring with runtime threat detection, Kubernetes integration, and automated alerting through Grafana dashboards.

45 min 4 distros 194 views
security Intermediate

Configure intrusion detection with OSSEC and Wazuh for real-time security monitoring

Set up comprehensive host-based intrusion detection with OSSEC HIDS and Wazuh manager for real-time security monitoring, file integrity checking, and automated threat response across your infrastructure.

45 min 4 distros 221 views
databases Intermediate

Implement MongoDB 8.0 change streams for real-time data processing and application synchronization

Set up MongoDB 8.0 change streams to monitor database changes in real-time. Configure replica sets, implement Python and Node.js clients, and add filtering and resumability for production applications.

45 min 4 distros 258 views
monitoring Intermediate

Integrate MinIO with Prometheus monitoring for performance metrics and observability

Set up comprehensive monitoring for your MinIO object storage cluster with Prometheus metrics collection, Grafana visualization dashboards, and automated alerting rules for production environments.

35 min 4 distros 248 views
security Advanced

Configure Airflow DAG security and isolation with RBAC policies

Set up comprehensive security for Apache Airflow with role-based access control, DAG-level permissions, and resource isolation. Configure user authentication, implement fine-grained security policies, and establish monitoring for production-grade workflow orchestration.

45 min 4 distros 263 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer