Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

devops Advanced

Configure Consul multi-datacenter WAN federation for geographic redundancy

Set up Consul WAN federation to connect multiple datacenters for global service discovery and failover. This tutorial covers primary and secondary datacenter configuration with ACL token replication and cross-datacenter networking.

45 min 4 distros 42 views
hosting Intermediate

Configure Caddy 2 with Docker containers and automatic SSL certificates

Set up Caddy 2 as a reverse proxy using Docker with automatic Let's Encrypt SSL certificates. Deploy containerized web applications behind Caddy with zero-downtime SSL management and built-in load balancing.

45 min 4 distros 90 views
monitoring Intermediate

Implement log-based monitoring and alerting with Grafana and Loki

Set up comprehensive log aggregation with Loki, centralized visualization with Grafana dashboards, and automated alerting rules for proactive incident response across your infrastructure.

45 min 4 distros 103 views
monitoring Intermediate

Configure Loki and Promtail for centralized Docker log aggregation and analysis

Set up Grafana Loki and Promtail to collect, aggregate, and analyze logs from Docker containers. Configure retention policies, integrate with Grafana for visualization, and enable real-time log monitoring across your infrastructure.

25 min 4 distros 140 views
devops Advanced

Set up Consul multi-datacenter replication with ACL token replication

Configure Consul WAN federation across multiple datacenters with secure ACL token replication. Enable automatic token synchronization, gossip encryption, and cross-datacenter service discovery for distributed infrastructure.

45 min 4 distros 102 views
devops Advanced

Deploy Envoy-based service mesh in Kubernetes production environment with SSL and observability

Set up a production-ready Envoy service mesh in Kubernetes with mutual TLS authentication, SSL certificate management, and comprehensive observability through Prometheus monitoring and distributed tracing.

45 min 4 distros 91 views
security Advanced

Implement Envoy proxy JWT authentication with OAuth2 integration

Configure Envoy proxy with JWT authentication filters integrated with Keycloak OAuth2 provider for secure microservices communication and advanced rate limiting policies.

45 min 4 distros 137 views
networking Advanced

Configure advanced gRPC load balancing with Envoy Proxy health checks and circuit breakers

Set up Envoy Proxy with intelligent gRPC load balancing, health checks, and circuit breakers for production microservices. Includes SSL termination, monitoring integration, and security hardening.

45 min 4 distros 108 views
security Intermediate

Configure Falco runtime security for Kubernetes threat detection with eBPF monitoring

Set up Falco with eBPF monitoring to detect runtime security threats in Kubernetes clusters. Configure custom rules, integrate Prometheus metrics, and establish comprehensive threat detection for container workloads.

45 min 4 distros 178 views
security Advanced

Implement Consul Connect mTLS with Vault PKI backend for secure service mesh communication

Set up mutual TLS authentication for Consul Connect using HashiCorp Vault's PKI backend to secure service-to-service communication with automatic certificate management and rotation.

45 min 4 distros 132 views
devops Advanced

Integrate Jaeger with Kubernetes and Istio service mesh for distributed tracing

Deploy Jaeger operator on Kubernetes with Istio telemetry integration for comprehensive distributed tracing across microservices. Configure Elasticsearch backend for production-grade trace storage and implement automated service discovery.

45 min 4 distros 125 views
monitoring Intermediate

Configure Jaeger with NGINX reverse proxy and SSL termination

Set up Jaeger distributed tracing behind an NGINX reverse proxy with SSL termination and authentication. Learn to configure secure access, performance optimization, and production-ready monitoring for your microservices.

45 min 4 distros 146 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer