Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Install and configure CockroachDB cluster with high availability and distributed SQL
databasesInstall and configure ArgoCD for GitOps continuous deployment with RBAC and SSL
devopsInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesInstall and configure WireGuard VPN server with client management
networkingInstall and configure Loki for centralized log aggregation with Grafana integration
monitoringRecently published
Configure SSL encryption and authentication for ClamAV cluster with high availability scanning
securityImplement MinIO security hardening with IAM policies and audit logging
securitySetup Elasticsearch monitoring with Metricbeat and Kibana dashboards
monitoringConfigure Vault auto-unseal with AWS KMS for high availability secrets management
securityImplement MariaDB connection pooling with ProxySQL for high availability
databasesIntegrate Consul with Kubernetes service discovery and automatic configuration
Set up Consul for dynamic service discovery in Kubernetes clusters with automatic service registration, health checks, and configuration management for microservices orchestration.
Configure Istio security policies with mutual TLS and authorization for Kubernetes service mesh
Configure mutual TLS authentication and authorization policies in Istio service mesh for secure microservices communication. This tutorial covers PeerAuthentication, AuthorizationPolicy, and RBAC configuration for production Kubernetes environments.
Monitor Kubernetes clusters with Prometheus and Grafana for container orchestration insights
Set up comprehensive Kubernetes monitoring using the Prometheus Operator and Grafana with persistent storage, RBAC, ServiceMonitors, and custom dashboards for complete cluster observability.
Set up Istio multi-cluster service mesh with cross-cluster communication
Deploy and configure Istio across multiple Kubernetes clusters with secure cross-cluster communication, shared service discovery, and unified traffic management for distributed microservices architecture.
Configure Kubernetes network policies with Calico CNI for microsegmentation and security enforcement
Learn to implement advanced network security in Kubernetes using Calico CNI. Configure namespace-based microsegmentation, application-level policies, and comprehensive monitoring for enterprise-grade cluster protection.
Implement Jaeger security with TLS encryption and authentication for distributed tracing
Secure your Jaeger distributed tracing infrastructure with TLS encryption, JWT-based authentication, and RBAC policies. This tutorial covers certificate generation, collector/query service encryption, and UI authentication through reverse proxy integration.
Implement Istio security policies with authorization and authentication for Kubernetes service mesh
Configure Istio service mesh security with mTLS authentication, JWT validation, and RBAC authorization policies. This tutorial covers implementing comprehensive security controls for microservices communication in production Kubernetes environments.
Configure Istio traffic management with virtual services and destination rules
Configure advanced Istio traffic management using virtual services for intelligent request routing and destination rules for load balancing and service subsets in production Kubernetes environments.
Implement Kubernetes monitoring with Prometheus and Helm charts for comprehensive cluster observability
Deploy a production-ready Prometheus monitoring stack on Kubernetes using Helm charts with ServiceMonitors, alerting rules, and comprehensive cluster observability for metrics collection and monitoring.
Configure Envoy proxy rate limiting and circuit breakers for microservices resilience
Learn to implement production-grade Envoy proxy with global and local rate limiting, circuit breakers, and health checks to build resilient microservices architecture that can handle traffic spikes and service failures gracefully.
Configure Grafana dashboards for InfluxDB collectd metrics with advanced visualization and alerting
Build comprehensive Grafana dashboards to visualize collectd system metrics stored in InfluxDB with custom panels, advanced queries, and automated alerting rules for production monitoring.
Implement Kubernetes admission controllers with OPA Gatekeeper for policy enforcement
Set up OPA Gatekeeper admission controllers to enforce security policies, resource governance, and compliance rules across your Kubernetes cluster with custom constraint templates.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer