Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Advanced

Configure ClickHouse users and RBAC for production environments with authentication and access control

Secure your ClickHouse deployment with proper user authentication, role-based access control, and production-grade security policies. Learn to create users, manage roles, implement quota systems, and monitor access patterns for enterprise environments.

45 min 4 distros 503 views
security Intermediate

Implement Apache web application firewall with ModSecurity 3 and OWASP Core Rule Set

Deploy ModSecurity 3 as an Apache module with OWASP Core Rule Set to protect web applications from common attacks. Configure real-time logging, custom rules, and automated threat detection for production environments.

45 min 4 distros 528 views
devops Advanced

Implement Kubernetes Pod Security Standards and admission controllers for policy enforcement

Configure Pod Security Standards with baseline and restricted profiles, deploy OPA Gatekeeper admission controller with custom policies, and implement ValidatingAdmissionWebhooks for comprehensive security enforcement in production Kubernetes clusters.

45 min 4 distros 510 views
databases Intermediate

Configure MinIO backup and disaster recovery with automated snapshots and replication

Configure comprehensive backup and disaster recovery for MinIO object storage with automated snapshots, cross-site replication, and encryption. Implement production-ready backup strategies to protect critical data and ensure business continuity.

45 min 4 distros 419 views
security Advanced

Configure advanced iptables rules for bridge network security and container isolation

Implement comprehensive bridge network security using advanced iptables rules to isolate containers, control traffic flow, and prevent lateral movement in virtualized environments.

45 min 4 distros 589 views
security Advanced

Implement Istio security policies with authorization and authentication for Kubernetes service mesh

Configure Istio service mesh security with mTLS authentication, JWT validation, and RBAC authorization policies. This tutorial covers implementing comprehensive security controls for microservices communication in production Kubernetes environments.

45 min 4 distros 403 views
networking Intermediate

Configure NTP server with chrony and security hardening for precise time synchronization

Set up a production-grade NTP server using chrony with client access controls, firewall rules, and security hardening. Learn to configure upstream time sources, implement monitoring, and troubleshoot common synchronization issues.

35 min 4 distros 659 views
security Intermediate

Configure Apache rate limiting and DDoS protection with mod_security and mod_evasive

Set up comprehensive Apache protection against DDoS attacks and malicious traffic using mod_evasive for rate limiting, mod_security with OWASP rules for web application firewall capabilities, and fail2ban integration for automated IP blocking.

25 min 4 distros 452 views
devops Advanced

Implement Kubernetes network policies with Calico CNI and OPA Gatekeeper for security enforcement

Secure your Kubernetes cluster with Calico CNI network policies and OPA Gatekeeper admission control. This tutorial shows you how to implement pod isolation, policy enforcement, and admission validation for production-grade security.

45 min 4 distros 430 views
security Intermediate

Configure Kibana LDAP authentication and RBAC with Active Directory integration

Set up secure Kibana authentication using Active Directory LDAP with role-based access control to manage user permissions and streamline enterprise login workflows. This tutorial covers Elasticsearch security configuration, LDAP realm setup, and user role mappings.

45 min 4 distros 520 views
security Advanced

Setup Elasticsearch 8 SSL/TLS encryption and advanced security hardening with authentication and access control

Secure your Elasticsearch 8 cluster with comprehensive SSL/TLS encryption, user authentication, role-based access control, and network hardening. This tutorial covers production-grade security configuration to protect your search infrastructure.

45 min 4 distros 596 views
security Intermediate

Configure Linux audit logging for security compliance and monitoring

Set up comprehensive audit logging with auditd daemon to track file system changes, process execution, and network connections for security compliance and forensic analysis.

35 min 4 distros 533 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer