Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Intermediate

Configure SonarQube LDAP authentication with Active Directory and user group management

Set up SonarQube to authenticate users against Active Directory using LDAP. Configure automatic user provisioning, group synchronization, and role-based access control for enterprise environments with centralized authentication.

25 min 4 distros 145 views
security Intermediate

Configure SonarQube LDAP authentication and user management with Active Directory integration

Set up enterprise user authentication for SonarQube using LDAP and Active Directory. Configure group mapping, role-based access control, and automated user provisioning for centralized identity management.

45 min 4 distros 167 views
security Advanced

Configure advanced Consul ACL policies for production security hardening

Set up comprehensive Consul Access Control Lists with bootstrap tokens, role-based permissions, and secure inter-node communication for production environments. This tutorial covers ACL system initialization, policy creation, and agent token configuration.

35 min 4 distros 212 views
security Advanced

Configure Kibana 8 advanced security with field-level restrictions and role-based access control

Implement comprehensive security controls in Kibana 8 with field-level restrictions, document-level security, and role-based access control for production Elasticsearch deployments.

45 min 4 distros 163 views
security Advanced

Implement MinIO security hardening with IAM policies and audit logging

Secure your MinIO object storage with comprehensive IAM policies, role-based access control, and audit logging for compliance monitoring. This tutorial covers user management, policy creation, and security validation for production environments.

45 min 4 distros 278 views
devops Advanced

Configure Istio security policies with mutual TLS and authorization for Kubernetes service mesh

Configure mutual TLS authentication and authorization policies in Istio service mesh for secure microservices communication. This tutorial covers PeerAuthentication, AuthorizationPolicy, and RBAC configuration for production Kubernetes environments.

45 min 4 distros 190 views
security Advanced

Configure SELinux policies for web applications and databases with custom rules and security hardening

Learn how to implement mandatory access controls with SELinux for web servers and databases. Configure custom security contexts, create application-specific policies, and harden your infrastructure with advanced SELinux rules.

45 min 4 distros 145 views
networking Advanced

Set up automated network topology discovery with SNMP and LLDP for infrastructure mapping

Build an automated network discovery system that uses SNMP and LLDP protocols to map your infrastructure topology, detect device relationships, and create visual network diagrams with real-time monitoring integration.

45 min 4 distros 258 views
security Intermediate

Configure Linux user and group management with sudo access control

Learn to create and manage Linux users and groups with proper sudo access control, security hardening, and monitoring. This comprehensive guide covers account creation, group membership management, sudo configuration, and security best practices for production environments.

45 min 4 distros 226 views
security Advanced

Configure ClickHouse users and RBAC for production environments with authentication and access control

Secure your ClickHouse deployment with proper user authentication, role-based access control, and production-grade security policies. Learn to create users, manage roles, implement quota systems, and monitor access patterns for enterprise environments.

45 min 4 distros 304 views
security Intermediate

Implement Deno JWT authentication with OAuth2 integration for secure API development

Set up production-grade JWT authentication middleware in Deno with OAuth2 provider integration and role-based access control. Learn to secure API endpoints with proper token validation, user management, and enterprise-ready authentication flows.

45 min 4 distros 368 views
performance Advanced

Configure Varnish cache invalidation with automated purging strategies for high-performance web acceleration

Learn to configure advanced Varnish VCL for cache invalidation, implement PURGE and BAN strategies, and set up automated cache tagging for optimal performance. Master selective invalidation techniques and monitoring for production-grade web acceleration.

45 min 4 distros 373 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer