Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Intermediate

Implement Deno JWT authentication with OAuth2 integration for secure API development

Set up production-grade JWT authentication middleware in Deno with OAuth2 provider integration and role-based access control. Learn to secure API endpoints with proper token validation, user management, and enterprise-ready authentication flows.

45 min 4 distros 105 views
performance Advanced

Implement NGINX Lua scripting for advanced caching logic with OpenResty

Configure OpenResty with Lua scripting for advanced caching strategies including dynamic cache keys, intelligent TTL management, and conditional cache invalidation based on business logic.

45 min 4 distros 232 views
monitoring Intermediate

Configure Jaeger data retention policies and automated archiving with Elasticsearch backend

Learn to configure Jaeger data retention policies with Elasticsearch backend for automated trace archiving. This tutorial covers index lifecycle management, storage optimization, and performance monitoring to prevent disk space issues while maintaining observability requirements.

45 min 4 distros 45 views
security Advanced

Implement Istio security policies with authorization and authentication for Kubernetes service mesh

Configure Istio service mesh security with mTLS authentication, JWT validation, and RBAC authorization policies. This tutorial covers implementing comprehensive security controls for microservices communication in production Kubernetes environments.

45 min 4 distros 90 views
devops Intermediate

Deploy Deno applications with Docker containers and production optimization

Learn how to containerize Deno applications with Docker using multi-stage builds, security hardening, and production-ready configuration. This tutorial covers creating optimized Dockerfiles, implementing proper caching strategies, and deploying with Docker Compose for scalable web applications.

35 min 4 distros 79 views
security Intermediate

Implement FastAPI authentication with JWT and OAuth2 for secure API development

Build secure FastAPI applications with JWT token authentication and OAuth2 password bearer flows. Learn to implement role-based access control and protect API endpoints with production-ready security patterns.

45 min 4 distros 270 views
monitoring Intermediate

Setup OpenResty monitoring with Prometheus and Grafana dashboards for performance analytics

Configure comprehensive monitoring for OpenResty web server using nginx-lua-prometheus module to collect metrics, Prometheus for storage, and Grafana for visualization with custom dashboards and alerting rules.

45 min 4 distros 206 views
security Advanced

Implement OpenResty JWT authentication with OAuth2 integration for secure web applications

Set up secure JWT-based authentication in OpenResty with OAuth2 provider integration using lua-resty-jwt module. Configure token validation, authentication middleware, and security policies for production web applications.

45 min 4 distros 186 views
hosting Intermediate

Install and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications

Deploy production-ready FastAPI applications using Uvicorn ASGI server with systemd process management and Nginx reverse proxy. Configure SSL termination, load balancing, and comprehensive monitoring for high-performance Python web applications.

25 min 6 distros 287 views
hosting Intermediate

Install and configure OpenResty web server with Lua scripting and performance optimization

Set up OpenResty as a high-performance web server and API gateway with embedded Lua scripting capabilities, SSL certificates, and advanced caching optimization for production workloads.

45 min 6 distros 140 views
networking Advanced

Configure Envoy proxy rate limiting and circuit breakers for microservices resilience

Learn to implement production-grade Envoy proxy with global and local rate limiting, circuit breakers, and health checks to build resilient microservices architecture that can handle traffic spikes and service failures gracefully.

45 min 4 distros 198 views
security Intermediate

Install and configure Keycloak for enterprise authentication with clustering

Set up Keycloak as an enterprise identity provider with PostgreSQL backend, SSL encryption, and high availability clustering for OAuth2, OpenID Connect, and SAML authentication across your organization.

45 min 6 distros 162 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer