Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Intermediate

Set up Node.js application security with Helmet and rate limiting

Secure your Node.js Express applications against common vulnerabilities with Helmet.js middleware and implement rate limiting to prevent abuse and DDoS attacks.

25 min 4 distros 930 views
security Intermediate

Configure GitLab SAML authentication with Keycloak for enterprise SSO

Set up single sign-on (SSO) authentication between GitLab and Keycloak using SAML 2.0 protocol. This enables centralized user management and secure authentication for your GitLab instance through your existing identity provider infrastructure.

45 min 4 distros 381 views
security Advanced

Setup Elasticsearch 8 SSL/TLS encryption and advanced security hardening with authentication and access control

Secure your Elasticsearch 8 cluster with comprehensive SSL/TLS encryption, user authentication, role-based access control, and network hardening. This tutorial covers production-grade security configuration to protect your search infrastructure.

45 min 4 distros 602 views
monitoring Intermediate

Implement Airflow DAG monitoring with DataDog integration for production workflows

Set up comprehensive monitoring for Apache Airflow DAGs using DataDog integration. This tutorial covers DataDog agent installation, metrics collection configuration, custom dashboard creation, and alerting rules for production workflow observability.

45 min 4 distros 416 views
security Intermediate

Configure Linux audit logging for security compliance and monitoring

Set up comprehensive audit logging with auditd daemon to track file system changes, process execution, and network connections for security compliance and forensic analysis.

35 min 4 distros 540 views
security Beginner

Configure Linux file encryption with LUKS and cryptsetup for data protection

Learn how to encrypt files and partitions using LUKS encryption with cryptsetup tools. This tutorial covers creating encrypted volumes, managing encryption keys, and automating mount operations for secure data protection.

45 min 6 distros 668 views
security Beginner

Configure Linux audit system with auditd for security compliance and file monitoring

Set up the Linux audit system with auditd to monitor file access, user activities, and system calls for security compliance. Learn to create audit rules, analyze logs, and track privilege escalations.

25 min 6 distros 903 views
linux Beginner

Configure Linux user and group management with useradd, usermod and advanced account security

Learn to manage Linux users and groups with useradd, usermod, and groupadd commands. This tutorial covers creating accounts, setting permissions, configuring password policies, and implementing security best practices for production systems.

25 min 6 distros 576 views
networking Intermediate

Configure network traffic shaping with tc and HTB for bandwidth management and QoS

Set up hierarchical token bucket (HTB) traffic shaping with tc to control bandwidth allocation, prioritize network traffic, and implement quality of service policies for optimal network performance.

45 min 6 distros 773 views
security Intermediate

Configure AppArmor security profiles for web servers and databases with custom policy enforcement

Set up mandatory access control for Nginx, Apache, MySQL, and PostgreSQL using AppArmor security profiles. Learn to create custom policies, debug profile violations, and implement advanced enforcement for production web servers and databases.

45 min 6 distros 745 views
networking Intermediate

Configure Tailscale mesh VPN with subnet routing and ACL policies for secure network access

Set up a zero-trust mesh VPN network with Tailscale that includes subnet routing for local network access, granular ACL policies for security, and exit nodes for secure internet access.

25 min 6 distros 620 views
devops Advanced

Implement Kubernetes admission controllers with OPA Gatekeeper for policy enforcement

Set up OPA Gatekeeper admission controllers to enforce security policies, resource governance, and compliance rules across your Kubernetes cluster with custom constraint templates.

45 min 4 distros 854 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer