Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Intermediate

Implement FastAPI authentication with JWT and OAuth2 for secure API development

Build secure FastAPI applications with JWT token authentication and OAuth2 password bearer flows. Learn to implement role-based access control and protect API endpoints with production-ready security patterns.

45 min 4 distros 973 views
devops Advanced

Implement Kubernetes network policies with Calico CNI and OPA Gatekeeper for security enforcement

Secure your Kubernetes cluster with Calico CNI network policies and OPA Gatekeeper admission control. This tutorial shows you how to implement pod isolation, policy enforcement, and admission validation for production-grade security.

45 min 4 distros 430 views
devops Intermediate

Implement Kubernetes resource quotas and limits for namespace isolation and workload management

Configure namespace resource quotas, container resource limits, and limit ranges to ensure fair resource allocation and prevent resource exhaustion in multi-tenant Kubernetes clusters.

25 min 4 distros 648 views
linux Beginner

Configure Linux environment variables and PATH management for development workflows

Learn how to properly configure Linux environment variables and manage your PATH for development workflows. This guide covers temporary and persistent variables, user vs system-wide configuration, and troubleshooting common issues across Ubuntu, Debian, AlmaLinux, Rocky Linux, and Fedora.

20 min 6 distros 535 views
devops Intermediate

Integrate SonarQube with Kubernetes and Helm charts for automated code quality scanning

Deploy SonarQube on Kubernetes using Helm charts with PostgreSQL database, configure automated code scanning workflows, and implement persistent storage for comprehensive code quality analysis in your CI/CD pipeline.

45 min 4 distros 557 views
devops Advanced

Integrate SonarQube with Kubernetes security scanning workflows for continuous code quality analysis

Set up SonarQube scanner in Kubernetes pods with admission controllers for automated security scanning. Configure CI/CD pipeline integration and security reporting for continuous code quality analysis in containerized environments.

45 min 4 distros 476 views
devops Intermediate

Set up SonarQube branch analysis with pull request decoration for enhanced code quality workflows

Configure SonarQube Developer Edition with branch analysis capabilities and pull request decoration for GitHub and GitLab. Implement automated code quality checks in CI/CD pipelines with comprehensive branch coverage and merge request feedback.

45 min 4 distros 588 views
devops Advanced

Configure Ansible AWX 24.6 for enterprise automation with RBAC and inventory management

Deploy Ansible AWX 24.6 with Docker Compose, PostgreSQL backend, and enterprise-grade RBAC. Set up dynamic inventory management with multiple sources and implement automated job workflows with notifications for production environments.

45 min 4 distros 550 views
security Intermediate

Configure GitLab LDAP authentication and user management with Active Directory integration

Set up GitLab LDAP authentication with Active Directory to centralize user management, enable automatic user provisioning, and implement group-based access control for your GitLab instance.

45 min 4 distros 522 views
devops Intermediate

Setup SonarQube scanner for multiple programming languages with automated code quality analysis

Configure SonarQube Scanner CLI to analyze Java, Python, JavaScript, and C# projects with automated quality gates and CI/CD integration. Streamline code quality analysis across your entire development pipeline with Docker and Jenkins automation.

45 min 4 distros 541 views
security Intermediate

Secure Podman containers with SELinux and AppArmor mandatory access controls

Implement mandatory access controls for Podman containers using SELinux on Red Hat-based systems and AppArmor on Debian-based systems. Learn to configure security policies, monitor violations, and harden container security with production-grade controls.

45 min 4 distros 551 views
security Advanced

Implement Cilium Tetragon runtime security for Kubernetes with eBPF monitoring and threat detection

Deploy Cilium Tetragon for advanced runtime security monitoring in Kubernetes clusters using eBPF technology. Configure security policies, threat detection rules, and real-time monitoring with Grafana dashboards for comprehensive container protection.

45 min 4 distros 756 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer