Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

monitoring Intermediate

Integrate Elasticsearch 8 with Prometheus monitoring and Grafana dashboards

Set up comprehensive monitoring for Elasticsearch 8 using Prometheus metrics collection and Grafana visualization. This tutorial covers exporter installation, metric configuration, dashboard setup, and alerting rules for production environments.

45 min 4 distros 65 views
hosting Advanced

Configure NGINX reverse proxy with advanced caching and load balancing

Set up NGINX as a high-performance reverse proxy with Redis-backed caching, multiple load balancing algorithms, SSL termination, and comprehensive monitoring for production environments.

45 min 4 distros 31 views
monitoring Advanced

Implement OpenTelemetry distributed context propagation across microservices with automatic instrumentation

Set up comprehensive distributed tracing across microservices using OpenTelemetry with automatic context propagation, trace correlation headers, and framework-specific auto-instrumentation for Python, Java, and Node.js applications.

45 min 4 distros 97 views
networking Advanced

Set up OpenVPN high availability cluster with automatic failover and load balancing

Build a production-ready OpenVPN high availability cluster using keepalived for automatic failover and HAProxy for load balancing across multiple OpenVPN servers.

90 min 4 distros 29 views
security Advanced

Configure ClickHouse users and RBAC for production environments with authentication and access control

Secure your ClickHouse deployment with proper user authentication, role-based access control, and production-grade security policies. Learn to create users, manage roles, implement quota systems, and monitor access patterns for enterprise environments.

45 min 4 distros 34 views
security Intermediate

Implement encryption for Consul backups using GPG with automated snapshots and secure storage

Learn to create encrypted Consul backups using GPG encryption with automated snapshot scripts, secure key management, and remote storage integration for production disaster recovery.

45 min 4 distros 101 views
databases Advanced

Backup and restore Redis Sentinel cluster data with automated strategies and monitoring

Learn to implement production-grade backup and restore procedures for Redis Sentinel clusters with automated scheduling, point-in-time recovery, and comprehensive monitoring to ensure data durability and business continuity.

45 min 4 distros 66 views
databases Advanced

Set up MariaDB Galera Cluster 11.6 for multi-master replication with automatic failover

Configure a production-ready MariaDB Galera cluster with three nodes for multi-master replication, automatic failover, and SSL encryption. Includes HAProxy load balancing and comprehensive monitoring for high availability database operations.

45 min 4 distros 156 views
monitoring Intermediate

Set up Kibana alerting and monitoring with Elasticsearch Watcher for automated threat detection

Configure Kibana alerting rules and Elasticsearch Watcher to automatically detect security threats and send notifications via email or Slack. Set up monitoring dashboards with automated responses for production security monitoring.

45 min 4 distros 93 views
networking Intermediate

Implement HAProxy SSL termination with Let's Encrypt certificates for secure load balancing

Configure HAProxy to handle SSL termination with automated Let's Encrypt certificates, enabling secure HTTPS load balancing across multiple backend servers. This setup reduces CPU load on backend servers while providing centralized SSL certificate management.

45 min 4 distros 133 views
devops Advanced

Set up Istio multi-cluster service mesh with cross-cluster communication

Deploy and configure Istio across multiple Kubernetes clusters with secure cross-cluster communication, shared service discovery, and unified traffic management for distributed microservices architecture.

45 min 4 distros 94 views
security Intermediate

Implement HAProxy rate limiting and DDoS protection with advanced security rules

Configure HAProxy with comprehensive rate limiting, connection throttling, and DDoS protection using stick tables, ACLs, and advanced security rules to protect your applications from malicious traffic and ensure service availability.

45 min 4 distros 106 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer