Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

databases Intermediate

Implement Redis backup automation with compression and encryption

Set up automated Redis backups with compression and GPG encryption for production environments. Create systemd timers for scheduled backups and implement secure remote storage for Redis data protection.

25 min 4 distros 234 views
monitoring Advanced

Configure advanced Grafana dashboards and alerting with Prometheus integration

Learn to build production-grade Grafana dashboards with advanced templating, custom Prometheus queries, sophisticated alerting rules, and automated provisioning for scalable monitoring infrastructure.

45 min 4 distros 338 views
security Advanced

Configure Airflow DAG security and isolation with RBAC policies

Set up comprehensive security for Apache Airflow with role-based access control, DAG-level permissions, and resource isolation. Configure user authentication, implement fine-grained security policies, and establish monitoring for production-grade workflow orchestration.

45 min 4 distros 274 views
security Intermediate

Set up OSSEC agent deployment and centralized management with automated configuration

Deploy and manage OSSEC Host-based Intrusion Detection System (HIDS) across multiple servers with centralized monitoring, automated agent configuration, and real-time security event processing for enterprise-scale infrastructure protection.

45 min 4 distros 267 views
databases Intermediate

Implement MinIO data lifecycle management and automated archival with S3 retention policies

Configure MinIO lifecycle policies to automatically transition and expire objects based on age and storage class. Set up intelligent tiering and automated archival to optimize storage costs and compliance with data retention requirements.

35 min 4 distros 474 views
security Advanced

Configure Kibana 8 advanced security with field-level restrictions and role-based access control

Implement comprehensive security controls in Kibana 8 with field-level restrictions, document-level security, and role-based access control for production Elasticsearch deployments.

45 min 4 distros 242 views
security Advanced

Implement MinIO security hardening with IAM policies and audit logging

Secure your MinIO object storage with comprehensive IAM policies, role-based access control, and audit logging for compliance monitoring. This tutorial covers user management, policy creation, and security validation for production environments.

45 min 4 distros 353 views
security Advanced

Configure SELinux policies for web applications and databases with custom rules and security hardening

Learn how to implement mandatory access controls with SELinux for web servers and databases. Configure custom security contexts, create application-specific policies, and harden your infrastructure with advanced SELinux rules.

45 min 4 distros 220 views
security Intermediate

Configure Linux user and group management with sudo access control

Learn to create and manage Linux users and groups with proper sudo access control, security hardening, and monitoring. This comprehensive guide covers account creation, group membership management, sudo configuration, and security best practices for production environments.

45 min 4 distros 306 views
devops Advanced

Implement Kubernetes Pod Security Standards and admission controllers for policy enforcement

Configure Pod Security Standards with baseline and restricted profiles, deploy OPA Gatekeeper admission controller with custom policies, and implement ValidatingAdmissionWebhooks for comprehensive security enforcement in production Kubernetes clusters.

45 min 4 distros 520 views
monitoring Intermediate

Configure Jaeger data retention policies and automated archiving with Elasticsearch backend

Learn to configure Jaeger data retention policies with Elasticsearch backend for automated trace archiving. This tutorial covers index lifecycle management, storage optimization, and performance monitoring to prevent disk space issues while maintaining observability requirements.

45 min 4 distros 367 views
networking Intermediate

Configure NTP server with chrony and security hardening for precise time synchronization

Set up a production-grade NTP server using chrony with client access controls, firewall rules, and security hardening. Learn to configure upstream time sources, implement monitoring, and troubleshoot common synchronization issues.

35 min 4 distros 682 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer