Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

devops Advanced

Implement Kubernetes network policies with Calico CNI and OPA Gatekeeper for security enforcement

Secure your Kubernetes cluster with Calico CNI network policies and OPA Gatekeeper admission control. This tutorial shows you how to implement pod isolation, policy enforcement, and admission validation for production-grade security.

45 min 4 distros 336 views
devops Advanced

Integrate SonarQube with Kubernetes security scanning workflows for continuous code quality analysis

Set up SonarQube scanner in Kubernetes pods with admission controllers for automated security scanning. Configure CI/CD pipeline integration and security reporting for continuous code quality analysis in containerized environments.

45 min 4 distros 322 views
devops Advanced

Implement Kubernetes admission controllers with OPA Gatekeeper for policy enforcement

Set up OPA Gatekeeper admission controllers to enforce security policies, resource governance, and compliance rules across your Kubernetes cluster with custom constraint templates.

45 min 4 distros 498 views
security Advanced

Implement Cilium Tetragon runtime security for Kubernetes with eBPF monitoring and threat detection

Deploy Cilium Tetragon for advanced runtime security monitoring in Kubernetes clusters using eBPF technology. Configure security policies, threat detection rules, and real-time monitoring with Grafana dashboards for comprehensive container protection.

45 min 4 distros 394 views
devops Intermediate

Install and configure Cilium CNI for Kubernetes with eBPF networking and security policies

Set up Cilium as your Kubernetes CNI plugin with advanced eBPF networking, load balancing, and network security policies. Includes Hubble observability for complete network visibility.

25 min 6 distros 364 views
devops Intermediate

Install and configure Kubernetes cluster with kubeadm and security hardening

Set up a production-ready Kubernetes cluster using kubeadm with proper security hardening, RBAC configuration, and CNI networking. Includes worker node setup and verification steps.

45 min 6 distros 368 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer