Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Intermediate

Configure Keycloak OAuth2 integration with web applications using OIDC and JWT tokens

Set up Keycloak as an OAuth2 identity provider with OIDC authentication flows. Configure client applications, implement JWT token validation, and secure NGINX reverse proxy with lua-resty-openidc for production web applications.

45 min 4 distros 107 views
security Intermediate

Configure Grafana LDAP authentication and role-based access control with Active Directory integration

Set up Grafana with LDAP authentication to connect with Active Directory, configure role-based access control for teams, and implement production-ready security policies for enterprise environments.

25 min 4 distros 129 views
security Intermediate

Secure Grafana with OAuth authentication and RBAC integration

Configure Grafana with OAuth SSO authentication, implement role-based access control (RBAC), and harden security with SSL certificates for enterprise-grade monitoring dashboard access.

45 min 4 distros 75 views
devops Advanced

Setup Kafka Schema Registry with Avro serialization for data processing

Configure Confluent Schema Registry with Avro serialization for production Kafka deployments. Includes schema evolution, producer/consumer integration, and SSL security configuration.

45 min 4 distros 85 views
devops Advanced

Integrate HashiCorp Vault with Kubernetes secrets management for secure container orchestration

Configure HashiCorp Vault integration with Kubernetes using the Vault CSI driver and Secrets Operator for automated secret injection and synchronization. This setup enables secure secret management for containerized applications with dynamic secret rotation and policy-based access controls.

45 min 4 distros 79 views
security Advanced

Secure Docker containers with Traefik reverse proxy and Authelia authentication

Set up a production-grade security stack using Traefik v3 reverse proxy with SSL automation and Authelia for multi-factor authentication. This tutorial covers Docker hardening, LDAP integration, and container security monitoring.

45 min 4 distros 87 views
networking Advanced

Configure HAProxy advanced routing with ACLs and maps for intelligent traffic management

Set up sophisticated traffic routing in HAProxy using Access Control Lists (ACLs) and map files for dynamic backend selection, SSL SNI routing, and intelligent request distribution based on headers, paths, and custom conditions.

45 min 4 distros 101 views
databases Intermediate

Install and configure PgBouncer for PostgreSQL connection pooling with performance optimization

Set up PgBouncer to efficiently manage PostgreSQL connections, reduce database load, and improve application performance with proper authentication and monitoring.

25 min 4 distros 74 views
devops Intermediate

Deploy Podman containers with Kubernetes YAML manifests and kubectl integration

Learn how to deploy and manage Podman containers using Kubernetes YAML manifests with kubectl integration. This tutorial covers systemd user services, YAML generation, pod networking, and volume management.

25 min 4 distros 84 views
hosting Intermediate

Configure nginx reverse proxy for Podman containers with SSL and load balancing

Set up nginx as a reverse proxy for Podman containers with SSL termination, health checks, and load balancing. Includes automated SSL certificate management with Let's Encrypt and container integration.

45 min 4 distros 118 views
security Intermediate

Set up SSH bastion host with jump server configuration for secure network access

Configure an SSH bastion host to secure access to private networks, implementing jump server functionality with key-based authentication and access controls for enhanced security.

25 min 4 distros 100 views
security Advanced

Configure OpenVPN LDAP authentication and user management with Active Directory integration

Set up OpenVPN with LDAP authentication to integrate with Active Directory for centralized user management. Configure group-based access control and combine certificate-based authentication with LDAP for enterprise security.

45 min 4 distros 85 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer