Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

devops Advanced

Set up Consul multi-datacenter replication with ACL token replication

Configure Consul WAN federation across multiple datacenters with secure ACL token replication. Enable automatic token synchronization, gossip encryption, and cross-datacenter service discovery for distributed infrastructure.

45 min 4 distros 49 views
devops Intermediate

Implement Consul backup and disaster recovery with automated snapshots and restoration

Set up automated Consul snapshots with GPG encryption, systemd timers, and complete disaster recovery procedures. Includes monitoring integration with Prometheus and automated restoration workflows for production environments.

45 min 4 distros 92 views
devops Advanced

Deploy Envoy-based service mesh in Kubernetes production environment with SSL and observability

Set up a production-ready Envoy service mesh in Kubernetes with mutual TLS authentication, SSL certificate management, and comprehensive observability through Prometheus monitoring and distributed tracing.

45 min 4 distros 41 views
security Advanced

Implement Envoy proxy JWT authentication with OAuth2 integration

Configure Envoy proxy with JWT authentication filters integrated with Keycloak OAuth2 provider for secure microservices communication and advanced rate limiting policies.

45 min 4 distros 38 views
networking Advanced

Configure advanced gRPC load balancing with Envoy Proxy health checks and circuit breakers

Set up Envoy Proxy with intelligent gRPC load balancing, health checks, and circuit breakers for production microservices. Includes SSL termination, monitoring integration, and security hardening.

45 min 4 distros 50 views
devops Advanced

Configure Istio distributed tracing with Jaeger and Zipkin for comprehensive microservices observability

Set up comprehensive distributed tracing in your Istio service mesh using both Jaeger and Zipkin backends. Configure telemetry collection, trace sampling, and monitoring dashboards for full microservices observability.

45 min 4 distros 87 views
security Advanced

Implement Consul Connect mTLS with Vault PKI backend for secure service mesh communication

Set up mutual TLS authentication for Consul Connect using HashiCorp Vault's PKI backend to secure service-to-service communication with automatic certificate management and rotation.

45 min 4 distros 69 views
networking Advanced

Configure Cilium BGP peering with MetalLB integration for Kubernetes load balancing

Set up Cilium CNI with BGP routing capabilities and integrate with MetalLB speaker components for bare-metal Kubernetes load balancing. This configuration enables external traffic routing and service discovery in on-premises environments.

45 min 4 distros 51 views
devops Advanced

Implement Istio circuit breaker and retry policies for microservices resilience and fault tolerance

Configure Istio destination rules with circuit breaker patterns, implement retry policies with exponential backoff, and set up comprehensive fault injection testing for microservices resilience in Kubernetes service mesh environments.

45 min 4 distros 70 views
devops Advanced

Integrate Jaeger with Kubernetes service mesh for comprehensive distributed tracing

Set up production-grade distributed tracing in Kubernetes using Jaeger with Istio service mesh integration. Configure OpenTelemetry instrumentation, Elasticsearch storage backend, and comprehensive observability for microservices.

45 min 4 distros 107 views
devops Advanced

Configure Istio security policies with mutual TLS and authorization for Kubernetes service mesh

Configure mutual TLS authentication and authorization policies in Istio service mesh for secure microservices communication. This tutorial covers PeerAuthentication, AuthorizationPolicy, and RBAC configuration for production Kubernetes environments.

45 min 4 distros 192 views
security Advanced

Implement Consul ACL security and encryption for production deployments

Configure Consul's Access Control List (ACL) system with bootstrap tokens, implement TLS encryption for client-server communication, and enable gossip encryption to secure your Consul cluster for production environments with comprehensive authentication and authorization.

45 min 4 distros 441 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer