Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Advanced

Configure Keycloak OAuth2 integration with OpenResty for enterprise SSO

Set up enterprise single sign-on by integrating Keycloak OAuth2 authentication with OpenResty using lua-resty-openidc. Configure secure authentication flows, JWT token validation, and session management for production web applications.

45 min 4 distros 12 views
security Intermediate

Configure intrusion detection with OSSEC and Wazuh for real-time security monitoring

Set up comprehensive host-based intrusion detection with OSSEC HIDS and Wazuh manager for real-time security monitoring, file integrity checking, and automated threat response across your infrastructure.

45 min 4 distros 12 views
databases Intermediate

Configure MongoDB 8.0 replica set with automatic failover for high availability

Set up a MongoDB 8.0 replica set with multiple nodes and automatic failover to ensure high availability and data redundancy. This configuration provides seamless database operations even when primary nodes fail.

45 min 4 distros 7 views
linux Intermediate

Implement Linux memory cgroups for container workload isolation

Configure cgroups v2 memory subsystem to isolate container workloads with precise memory limits, monitoring, and automated enforcement for production environments.

45 min 4 distros 12 views
devops Intermediate

Configure Kubernetes External DNS for automatic DNS record management with cloud providers

Set up External DNS controller to automatically create and manage DNS records for your Kubernetes services and ingresses. This tutorial covers installation, cloud provider integration, and security configuration for production-ready DNS automation.

25 min 4 distros 15 views
monitoring Intermediate

Monitor Django applications with Prometheus and Grafana for comprehensive performance insights

Set up comprehensive Django application monitoring using Prometheus metrics collection and Grafana dashboards. Configure django-prometheus middleware to track request metrics, database queries, and application performance with real-time alerting.

45 min 4 distros 37 views
linux Intermediate

Configure Linux user session limits with systemd and pam_limits for resource management

Learn to set up comprehensive user session resource limits using both traditional pam_limits.conf and modern systemd user slices. This tutorial covers memory, CPU, and process limits to prevent resource exhaustion on multi-user systems.

25 min 4 distros 8 views
monitoring Advanced

Install and configure Graylog 5 for centralized log management with MongoDB and Elasticsearch

Set up Graylog 5 with MongoDB 8.0 and Elasticsearch 8 for centralized log collection, analysis, and alerting. Learn to configure secure inputs, data streams, and monitoring for production environments.

45 min 4 distros 9 views
databases Intermediate

Set up automated MySQL database backups with compression and rotation

Configure automated MySQL database backups with compression, encryption, and rotation using systemd timers. Includes monitoring and alerting for backup failures.

45 min 4 distros 40 views
networking Intermediate

Configure Tailscale with Kubernetes cluster networking integration

Set up Tailscale mesh VPN with Kubernetes cluster integration for secure pod-to-pod communication, subnet routing, and service discovery across distributed nodes.

25 min 4 distros 7 views
security Intermediate

Configure NGINX rate limiting and advanced security rules for DDoS protection

Configure NGINX with comprehensive rate limiting, connection throttling, and advanced security headers to protect your web applications from DDoS attacks and malicious traffic. Learn to implement zone-based rate limiting, geographic blocking, and real-time monitoring for production environments.

25 min 4 distros 29 views
monitoring Advanced

Configure Thanos Receiver clustering for high availability and load distribution

Set up Thanos Receiver clustering with hashring configuration to distribute Prometheus remote write traffic across multiple replicas for high availability and scalability.

45 min 4 distros 45 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer