Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

security Intermediate

Configure Kibana LDAP authentication and RBAC with Active Directory integration

Set up secure Kibana authentication using Active Directory LDAP with role-based access control to manage user permissions and streamline enterprise login workflows. This tutorial covers Elasticsearch security configuration, LDAP realm setup, and user role mappings.

45 min 4 distros 425 views
security Advanced

Setup Elasticsearch 8 SSL/TLS encryption and advanced security hardening with authentication and access control

Secure your Elasticsearch 8 cluster with comprehensive SSL/TLS encryption, user authentication, role-based access control, and network hardening. This tutorial covers production-grade security configuration to protect your search infrastructure.

45 min 4 distros 518 views
security Advanced

Setup Elasticsearch 8 authentication with LDAP and Active Directory integration

Configure Elasticsearch 8 with X-Pack security to authenticate users against LDAP and Active Directory servers. This tutorial covers LDAP realm configuration, role-based access control, and troubleshooting authentication issues.

45 min 4 distros 300 views
security Advanced

Implement OpenResty JWT authentication with OAuth2 integration for secure web applications

Set up secure JWT-based authentication in OpenResty with OAuth2 provider integration using lua-resty-jwt module. Configure token validation, authentication middleware, and security policies for production web applications.

45 min 4 distros 486 views
databases Advanced

Set up ClickHouse and Kafka real-time data pipeline with streaming analytics

Build a production-ready real-time data pipeline using ClickHouse for high-performance analytics and Apache Kafka for streaming data ingestion. Configure clustering, replication, and automated data processing workflows.

45 min 4 distros 317 views
linux Beginner

Configure Linux cron jobs and system task scheduling with best practices

Learn to configure cron jobs and systemd timers for automated task scheduling on Linux systems with proper logging, security, and troubleshooting techniques.

25 min 6 distros 606 views
security Beginner

Configure Linux file encryption with LUKS and cryptsetup for data protection

Learn how to encrypt files and partitions using LUKS encryption with cryptsetup tools. This tutorial covers creating encrypted volumes, managing encryption keys, and automating mount operations for secure data protection.

45 min 6 distros 556 views
networking Beginner

Set up network interface monitoring with SNMP and basic traffic analysis

Learn how to install and configure SNMP daemon for network interface monitoring, implement basic traffic analysis with automated alerting, and create monitoring scripts with cron jobs for continuous network performance tracking.

25 min 6 distros 568 views
linux Beginner

Configure Linux file compression and archiving with tar, gzip and backup automation

Learn to create compressed archives with tar and gzip, manage different compression formats, and implement automated backup scripts with rotation for efficient system maintenance and data protection.

25 min 6 distros 501 views
linux Beginner

Configure Linux user and group management with useradd, usermod and advanced account security

Learn to manage Linux users and groups with useradd, usermod, and groupadd commands. This tutorial covers creating accounts, setting permissions, configuring password policies, and implementing security best practices for production systems.

25 min 6 distros 445 views
databases Beginner

Install and configure MariaDB 11.6 with performance optimization and security hardening

Set up MariaDB 11.6 as a high-performance MySQL alternative with InnoDB optimization, SSL encryption, automated backups, and comprehensive security hardening for production environments.

45 min 6 distros 454 views
security Beginner

Configure Linux file permissions and access control with umask and chmod best practices

Learn how to configure secure Linux file permissions using chmod, set default permissions with umask, and implement proper access control to prevent security vulnerabilities while fixing permission denied errors.

25 min 6 distros 483 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer