Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

databases Advanced

Set up MongoDB 8.0 sharding cluster for horizontal scaling with replica sets and automated balancing

Configure a production-grade MongoDB 8.0 sharded cluster with replica sets, config servers, and mongos routers for horizontal scaling. This tutorial covers automated chunk balancing, high availability, and enterprise-ready deployment patterns.

45 min 4 distros 201 views
monitoring Intermediate

Monitor Linux system resources with performance alerts and automated responses

Set up comprehensive Linux system monitoring with Prometheus, Node Exporter, and Alertmanager to track CPU, memory, and disk usage with automated alerts and response scripts for proactive system management.

45 min 4 distros 254 views
monitoring Intermediate

Configure network monitoring with SNMP and Grafana dashboards for infrastructure visibility

Set up comprehensive network monitoring using SNMP with Prometheus and Grafana to monitor network devices, collect performance metrics, and create visual dashboards for infrastructure visibility.

45 min 4 distros 317 views
security Intermediate

Configure GitLab SAML authentication with Keycloak for enterprise SSO

Set up single sign-on (SSO) authentication between GitLab and Keycloak using SAML 2.0 protocol. This enables centralized user management and secure authentication for your GitLab instance through your existing identity provider infrastructure.

45 min 4 distros 244 views
security Intermediate

Configure Kibana LDAP authentication and RBAC with Active Directory integration

Set up secure Kibana authentication using Active Directory LDAP with role-based access control to manage user permissions and streamline enterprise login workflows. This tutorial covers Elasticsearch security configuration, LDAP realm setup, and user role mappings.

45 min 4 distros 319 views
security Advanced

Setup Elasticsearch 8 SSL/TLS encryption and advanced security hardening with authentication and access control

Secure your Elasticsearch 8 cluster with comprehensive SSL/TLS encryption, user authentication, role-based access control, and network hardening. This tutorial covers production-grade security configuration to protect your search infrastructure.

45 min 4 distros 436 views
monitoring Intermediate

Integrate SNMP monitoring with InfluxDB and Telegraf for time-series analysis

Learn to set up a comprehensive SNMP monitoring solution using InfluxDB 2.7 for time-series storage and Telegraf for data collection. Configure monitoring for network devices, system metrics, and create visualization dashboards with Grafana.

45 min 4 distros 386 views
security Intermediate

Configure Linux audit logging for security compliance and monitoring

Set up comprehensive audit logging with auditd daemon to track file system changes, process execution, and network connections for security compliance and forensic analysis.

35 min 4 distros 290 views
security Intermediate

Configure backup encryption with GPG and rsync for secure automated backups

Set up automated encrypted backups using GPG 2.4 and rsync with systemd timers. This tutorial covers GPG key management, encrypted backup scripts, and restoration procedures for production environments.

45 min 4 distros 385 views
monitoring Intermediate

Setup OpenResty monitoring with Prometheus and Grafana dashboards for performance analytics

Configure comprehensive monitoring for OpenResty web server using nginx-lua-prometheus module to collect metrics, Prometheus for storage, and Grafana for visualization with custom dashboards and alerting rules.

45 min 4 distros 392 views
security Advanced

Setup Elasticsearch 8 authentication with LDAP and Active Directory integration

Configure Elasticsearch 8 with X-Pack security to authenticate users against LDAP and Active Directory servers. This tutorial covers LDAP realm configuration, role-based access control, and troubleshooting authentication issues.

45 min 4 distros 199 views
security Advanced

Implement OpenResty JWT authentication with OAuth2 integration for secure web applications

Set up secure JWT-based authentication in OpenResty with OAuth2 provider integration using lua-resty-jwt module. Configure token validation, authentication middleware, and security policies for production web applications.

45 min 4 distros 350 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer