Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

monitoring Intermediate

Implement Apache log analysis with GoAccess and ELK stack for real-time monitoring

Set up comprehensive Apache log monitoring with GoAccess for real-time analysis and ELK stack for centralized log processing, creating powerful Kibana dashboards for web server insights and automated alerting.

45 min 4 distros 20 views
hosting Intermediate

Configure Apache reverse proxy and load balancing for high availability

Set up Apache as a reverse proxy with load balancing across multiple backend servers. Configure health checks, SSL termination, and failover for production high availability deployments.

45 min 4 distros 19 views
monitoring Intermediate

Configure ELK stack for centralized logging with Elasticsearch 8, Logstash 8, and Kibana 8

Set up a production-grade ELK stack with Elasticsearch 8, Logstash 8, and Kibana 8 for centralized log management. Configure authentication, SSL encryption, and log processing pipelines across multiple data sources.

45 min 4 distros 33 views
databases Advanced

Configure Elasticsearch 8 cross-cluster replication for disaster recovery

Set up cross-cluster replication between Elasticsearch 8 clusters to ensure data resilience and business continuity. This advanced configuration creates automatic data synchronization across geographically distributed clusters for disaster recovery scenarios.

45 min 4 distros 90 views
security Intermediate

Implement Airflow DAG security scanning with Bandit and safety checks

Set up automated security scanning for Apache Airflow DAGs using Bandit for Python code analysis and Safety for vulnerability detection. Configure pre-commit hooks and CI/CD integration for continuous security monitoring.

45 min 4 distros 22 views
devops Intermediate

Configure Kubernetes OpenTelemetry auto-instrumentation for microservices observability

Set up OpenTelemetry Operator in Kubernetes to automatically instrument microservices with distributed tracing. Enable seamless observability across your application stack without modifying application code.

45 min 4 distros 44 views
monitoring Intermediate

Set up ELK stack alerting with Watcher and email notifications for monitoring and incident response

Configure Elasticsearch Watcher to monitor log data and automatically send email alerts when critical system events occur. Create sophisticated alert conditions, manage email notification templates, and set up automated incident response workflows.

45 min 4 distros 99 views
security Intermediate

Implement container security monitoring with Falco runtime detection

Set up Falco for real-time container security monitoring with runtime threat detection, Kubernetes integration, and automated alerting through Grafana dashboards.

45 min 4 distros 141 views
security Intermediate

Configure NGINX rate limiting and advanced security rules for DDoS protection

Configure NGINX with comprehensive rate limiting, connection throttling, and advanced security headers to protect your web applications from DDoS attacks and malicious traffic. Learn to implement zone-based rate limiting, geographic blocking, and real-time monitoring for production environments.

25 min 4 distros 158 views
monitoring Intermediate

Set up OpenTelemetry custom instrumentation and metrics collection with Prometheus integration

Configure OpenTelemetry Collector with custom metrics exporters and processors, set up application instrumentation with SDKs, and integrate with Prometheus and Grafana for comprehensive distributed system monitoring and observability.

45 min 4 distros 194 views
security Advanced

Configure Airflow DAG security and isolation with RBAC policies

Set up comprehensive security for Apache Airflow with role-based access control, DAG-level permissions, and resource isolation. Configure user authentication, implement fine-grained security policies, and establish monitoring for production-grade workflow orchestration.

45 min 4 distros 182 views
security Intermediate

Set up OSSEC agent deployment and centralized management with automated configuration

Deploy and manage OSSEC Host-based Intrusion Detection System (HIDS) across multiple servers with centralized monitoring, automated agent configuration, and real-time security event processing for enterprise-scale infrastructure protection.

45 min 4 distros 188 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer