Tutorials Security

Security

Firewalls, hardening, encryption, access control

security Advanced

Configure ClamAV cluster scanning for high availability and enterprise threat detection

Build a production-grade ClamAV cluster with HAProxy load balancing, shared virus definitions, and comprehensive monitoring for enterprise-scale threat detection and high availability.

45 min 4 distros 572 views
security Advanced

Setup Elasticsearch 8 SSL/TLS encryption and advanced security hardening with authentication and access control

Secure your Elasticsearch 8 cluster with comprehensive SSL/TLS encryption, user authentication, role-based access control, and network hardening. This tutorial covers production-grade security configuration to protect your search infrastructure.

45 min 4 distros 591 views
security Advanced

Setup Elasticsearch 8 authentication with LDAP and Active Directory integration

Configure Elasticsearch 8 with X-Pack security to authenticate users against LDAP and Active Directory servers. This tutorial covers LDAP realm configuration, role-based access control, and troubleshooting authentication issues.

45 min 4 distros 416 views
security Advanced

Implement OpenResty JWT authentication with OAuth2 integration for secure web applications

Set up secure JWT-based authentication in OpenResty with OAuth2 provider integration using lua-resty-jwt module. Configure token validation, authentication middleware, and security policies for production web applications.

45 min 4 distros 572 views
security Advanced

Configure Redis Sentinel with SSL/TLS encryption and authentication for high availability

Set up a production-grade Redis Sentinel cluster with SSL/TLS encryption, authentication, and automatic failover for high availability. This tutorial covers certificate generation, security configuration, and monitoring setup.

45 min 4 distros 440 views
security Advanced

Implement Cilium Tetragon runtime security for Kubernetes with eBPF monitoring and threat detection

Deploy Cilium Tetragon for advanced runtime security monitoring in Kubernetes clusters using eBPF technology. Configure security policies, threat detection rules, and real-time monitoring with Grafana dashboards for comprehensive container protection.

45 min 4 distros 751 views
security Advanced

Configure Apache Airflow LDAP authentication and RBAC with Active Directory integration

Configure Apache Airflow with LDAP authentication against Active Directory, implement role-based access control (RBAC), and set up secure user group management for enterprise environments.

45 min 4 distros 637 views