Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

devops Intermediate

Configure Kubernetes Pod Security Standards with admission controllers for policy enforcement

Learn how to implement Kubernetes Pod Security Standards using built-in admission controllers and OPA Gatekeeper for comprehensive policy enforcement, security compliance, and workload protection in production clusters.

25 min 4 distros 37 views
security Intermediate

Configure Falco runtime security for Kubernetes threat detection with eBPF monitoring

Set up Falco with eBPF monitoring to detect runtime security threats in Kubernetes clusters. Configure custom rules, integrate Prometheus metrics, and establish comprehensive threat detection for container workloads.

45 min 4 distros 32 views
devops Advanced

Integrate Jaeger with Kubernetes and Istio service mesh for distributed tracing

Deploy Jaeger operator on Kubernetes with Istio telemetry integration for comprehensive distributed tracing across microservices. Configure Elasticsearch backend for production-grade trace storage and implement automated service discovery.

45 min 4 distros 13 views
monitoring Intermediate

Configure Fluentd with Kubernetes DaemonSet and log routing for centralized collection

Deploy Fluentd as a DaemonSet on Kubernetes for centralized log collection with multi-format parsing, routing to multiple outputs, and RBAC security. Includes configuration for Elasticsearch, S3, and custom log sources.

45 min 4 distros 16 views
devops Intermediate

Install and configure ArgoCD Image Updater for automatic Kubernetes deployments with GitOps automation

Set up ArgoCD Image Updater to automatically monitor container registries and update Kubernetes deployments when new image versions are available. Configure GitOps workflows with automated Git commits and Prometheus monitoring for seamless CI/CD integration.

25 min 4 distros 30 views
devops Advanced

Implement Istio circuit breaker and retry policies for microservices resilience and fault tolerance

Configure Istio destination rules with circuit breaker patterns, implement retry policies with exponential backoff, and set up comprehensive fault injection testing for microservices resilience in Kubernetes service mesh environments.

45 min 4 distros 46 views
devops Intermediate

Setup Kubernetes ingress controller with cert-manager and Helm for automated SSL certificate management

Deploy NGINX Ingress Controller and cert-manager using Helm to automatically provision and manage SSL certificates for your Kubernetes applications with Let's Encrypt integration.

25 min 4 distros 31 views
monitoring Intermediate

Configure Zabbix 7 API automation with Python scripts for monitoring and alerting

Automate Zabbix 7 monitoring tasks with Python scripts using the API. Set up host discovery, template assignment, custom monitoring scripts, and alerting automation for streamlined infrastructure management.

45 min 4 distros 21 views
security Advanced

Configure advanced iptables firewall rules with logging, port knocking, and DDoS protection

Build a production-grade iptables firewall with connection tracking, rate limiting, and port knocking. Includes automated DDoS protection, detailed logging, and security hardening for enterprise environments.

45 min 4 distros 47 views
security Advanced

Setup Keycloak SAML integration for enterprise single sign-on with identity providers

Configure Keycloak as a SAML identity provider for enterprise SSO, integrate with external identity providers, and implement secure SAML service provider connections with attribute mapping.

45 min 4 distros 65 views
devops Intermediate

Deploy applications to Kubernetes with Helm charts and production best practices

Learn how to create production-ready Helm charts for Kubernetes deployments with proper templating, values management, security configurations, and environment-specific customizations for scalable application orchestration.

45 min 4 distros 59 views
security Intermediate

Implement two-factor authentication for SSH with Google Authenticator and TOTP

Secure your SSH connections by adding TOTP-based two-factor authentication using Google Authenticator and PAM modules for an additional layer of protection beyond passwords and keys.

25 min 4 distros 57 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer