Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Intermediate

Set up audit log analysis dashboard with Grafana and Prometheus for security monitoring

Build a comprehensive security monitoring dashboard that collects Linux audit logs through auditd, exports metrics to Prometheus, and visualizes security events in Grafana with automated alerting for suspicious activities.

45 min 4 distros 14 views
devops Advanced

Set up Kubernetes persistent volume snapshots and backup automation

Configure CSI snapshot controllers, create persistent volume snapshots, and implement automated backup strategies with Velero for production Kubernetes environments.

45 min 4 distros 33 views
monitoring Intermediate

Set up Alertmanager with email and Slack notifications for monitoring alerts

Configure Prometheus Alertmanager with email SMTP and Slack webhook integrations for comprehensive monitoring notifications. Set up alert routing rules and test notification delivery.

25 min 4 distros 30 views
devops Advanced

Configure Consul multi-datacenter WAN federation for geographic redundancy

Set up Consul WAN federation to connect multiple datacenters for global service discovery and failover. This tutorial covers primary and secondary datacenter configuration with ACL token replication and cross-datacenter networking.

45 min 4 distros 48 views
monitoring Intermediate

Monitor cron jobs and systemd timers with Prometheus and Grafana alerting

Set up comprehensive monitoring for scheduled tasks using Prometheus node_exporter and custom metrics collection. Configure Grafana dashboards and alerting rules to track job success, failures, and missed executions across your infrastructure.

45 min 4 distros 113 views
security Advanced

Implement Tailscale OAuth integration with identity providers for enterprise authentication

Configure Tailscale with enterprise identity providers including SAML and OIDC authentication, implement access control policies, and manage users across distributed teams for secure zero-trust networking.

45 min 4 distros 858 views
monitoring Intermediate

Configure Prometheus alerting rules for cgroup metrics monitoring and container resource alerts

Set up comprehensive Prometheus alerting rules for monitoring cgroup resource usage with automated threshold alerts for CPU, memory, and I/O limits. Configure Alertmanager notifications for container resource exhaustion and system health monitoring.

45 min 4 distros 134 views
devops Advanced

Implement Kubernetes workload rightsizing with VPA recommendations and cost analysis

Set up Vertical Pod Autoscaler to automatically optimize resource requests and limits for your Kubernetes workloads. Create cost analysis dashboards to track resource utilization and identify opportunities for rightsizing containers in production clusters.

45 min 4 distros 135 views
devops Advanced

Set up Consul multi-datacenter replication with ACL token replication

Configure Consul WAN federation across multiple datacenters with secure ACL token replication. Enable automatic token synchronization, gossip encryption, and cross-datacenter service discovery for distributed infrastructure.

45 min 4 distros 116 views
networking Advanced

Configure advanced gRPC load balancing with Envoy Proxy health checks and circuit breakers

Set up Envoy Proxy with intelligent gRPC load balancing, health checks, and circuit breakers for production microservices. Includes SSL termination, monitoring integration, and security hardening.

45 min 4 distros 116 views
devops Advanced

Configure Consul Connect with Kubernetes integration for secure service mesh communication

Set up Consul Connect as a service mesh on Kubernetes with Helm, enabling automatic mTLS encryption, service discovery, and traffic routing between microservices for secure inter-service communication.

45 min 4 distros 133 views
security Advanced

Setup Keycloak SAML integration for enterprise single sign-on with identity providers

Configure Keycloak as a SAML identity provider for enterprise SSO, integrate with external identity providers, and implement secure SAML service provider connections with attribute mapping.

45 min 4 distros 206 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer