Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

devops Advanced

Implement Kubernetes workload rightsizing with VPA recommendations and cost analysis

Set up Vertical Pod Autoscaler to automatically optimize resource requests and limits for your Kubernetes workloads. Create cost analysis dashboards to track resource utilization and identify opportunities for rightsizing containers in production clusters.

45 min 4 distros 59 views
devops Advanced

Integrate OPA Gatekeeper with ArgoCD for GitOps policy management

Set up Open Policy Agent Gatekeeper with ArgoCD to enforce Kubernetes admission policies through GitOps workflows. This tutorial covers installation, policy template creation, and automated policy enforcement with monitoring.

45 min 4 distros 29 views
monitoring Intermediate

Monitor Kubernetes cluster with Prometheus Operator for comprehensive observability

Set up complete cluster monitoring using Prometheus Operator with automated metrics collection, custom dashboards, and intelligent alerting for production Kubernetes environments.

45 min 4 distros 34 views
security Intermediate

Implement two-factor authentication for SSH with Google Authenticator and TOTP

Secure your SSH connections by adding TOTP-based two-factor authentication using Google Authenticator and PAM modules for an additional layer of protection beyond passwords and keys.

25 min 4 distros 57 views
security Intermediate

Set up SSH bastion host with jump server configuration for secure network access

Configure an SSH bastion host to secure access to private networks, implementing jump server functionality with key-based authentication and access controls for enhanced security.

25 min 4 distros 79 views
linux Beginner

Fix SSH sign_and_send_pubkey: signing failed: agent refused operation

Resolve SSH authentication errors when the SSH agent refuses to sign public keys. This tutorial covers checking agent status, fixing key permissions, restarting the agent, and troubleshooting SSH client configuration.

20 min 6 distros 215 views
security Intermediate

Configure SSH port forwarding and tunneling for secure connections

Learn to configure SSH port forwarding, remote tunnels, and SOCKS proxy for secure network connections. Set up local, remote, and dynamic port forwarding with automated monitoring and security hardening.

35 min 4 distros 111 views
monitoring Intermediate

Monitor Kubernetes clusters with Prometheus and Grafana for container orchestration insights

Set up comprehensive Kubernetes monitoring using the Prometheus Operator and Grafana with persistent storage, RBAC, ServiceMonitors, and custom dashboards for complete cluster observability.

45 min 4 distros 281 views
security Intermediate

Implement network security with iptables connection tracking and stateful packet filtering

Configure iptables with connection tracking modules to implement stateful packet filtering, advanced NAT rules, and comprehensive network security monitoring. Build robust firewall rules that track connection states and provide granular control over network traffic.

45 min 4 distros 280 views
networking Advanced

Set up nftables IPv6 NAT and dual-stack networking with firewall rules and traffic forwarding

Configure nftables with IPv6 NAT masquerading, dual-stack IPv4/IPv6 forwarding, and comprehensive firewall rules for secure network routing and traffic management on modern Linux systems.

45 min 4 distros 440 views
networking Intermediate

Configure nftables NAT and port forwarding for home lab environments

Learn how to configure nftables for NAT and port forwarding in home lab environments. This tutorial covers basic NAT masquerading, port forwarding rules, and advanced networking scenarios for virtual machines and containers.

25 min 4 distros 558 views
security Beginner

Configure SSH key authentication and disable password login for secure server access

Set up SSH public key authentication on Linux servers and disable password-based logins to prevent brute force attacks and improve security. This tutorial covers key generation, server configuration, and troubleshooting common authentication issues.

20 min 6 distros 440 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer