Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Install and configure CockroachDB cluster with high availability and distributed SQL
databasesConfigure Linux system time synchronization with chrony and NTP hardening
linuxConfigure network interface monitoring with ICMP ping and connectivity testing
networkingInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesInstall and configure ArgoCD for GitOps continuous deployment with RBAC and SSL
devopsRecently published
Configure custom Grafana plugins for specialized monitoring requirements
monitoringConfigure NGINX monitoring with Prometheus and Grafana dashboards for real-time web server performance metrics
monitoringImplement Grafana high availability clustering with PostgreSQL backend and load balancing
monitoringConfigure Spark Kubernetes Operator with MinIO for cloud-native analytics
devopsImplement Airflow DAG security scanning with Bandit and safety checks
securityImplement Kubernetes network policies with Calico CNI and OPA Gatekeeper for security enforcement
Secure your Kubernetes cluster with Calico CNI network policies and OPA Gatekeeper admission control. This tutorial shows you how to implement pod isolation, policy enforcement, and admission validation for production-grade security.
Implement Kubernetes resource quotas and limits for namespace isolation and workload management
Configure namespace resource quotas, container resource limits, and limit ranges to ensure fair resource allocation and prevent resource exhaustion in multi-tenant Kubernetes clusters.
Configure Kubernetes persistent volumes with NFS storage for container data persistence
Set up NFS-backed persistent volumes in Kubernetes to provide shared, durable storage for containerized applications across multiple nodes with automatic failover capabilities.
Integrate SonarQube with Kubernetes security scanning workflows for continuous code quality analysis
Set up SonarQube scanner in Kubernetes pods with admission controllers for automated security scanning. Configure CI/CD pipeline integration and security reporting for continuous code quality analysis in containerized environments.
Implement Kubernetes admission controllers with OPA Gatekeeper for policy enforcement
Set up OPA Gatekeeper admission controllers to enforce security policies, resource governance, and compliance rules across your Kubernetes cluster with custom constraint templates.
Secure Podman containers with SELinux and AppArmor mandatory access controls
Implement mandatory access controls for Podman containers using SELinux on Red Hat-based systems and AppArmor on Debian-based systems. Learn to configure security policies, monitor violations, and harden container security with production-grade controls.
Implement Cilium Tetragon runtime security for Kubernetes with eBPF monitoring and threat detection
Deploy Cilium Tetragon for advanced runtime security monitoring in Kubernetes clusters using eBPF technology. Configure security policies, threat detection rules, and real-time monitoring with Grafana dashboards for comprehensive container protection.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer