Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

monitoring Intermediate

Configure Loki with S3 storage backend for scalable centralized logging

Set up Grafana Loki with S3-compatible object storage for scalable log aggregation. Configure retention policies, schema management, and monitoring for production-ready centralized logging infrastructure.

45 min 4 distros 175 views
devops Intermediate

Deploy Consul Template for dynamic configuration management with systemd integration

Set up Consul Template to automatically generate configuration files from Consul key-value pairs and service discovery data. This tutorial covers installation, template creation, systemd service configuration, and monitoring setup for production environments.

25 min 4 distros 158 views
security Intermediate

Secure Grafana with OAuth authentication and RBAC integration

Configure Grafana with OAuth SSO authentication, implement role-based access control (RBAC), and harden security with SSL certificates for enterprise-grade monitoring dashboard access.

45 min 4 distros 180 views
devops Intermediate

Implement Kafka Streams processing applications with Java and Scala for real-time data analytics

Build production-ready Kafka Streams applications using Java and Scala for real-time data processing, including stateless transformations, stateful aggregations, windowing, and stream joins with exactly-once semantics.

45 min 4 distros 171 views
devops Advanced

Setup Kafka Schema Registry with Avro serialization for data processing

Configure Confluent Schema Registry with Avro serialization for production Kafka deployments. Includes schema evolution, producer/consumer integration, and SSL security configuration.

45 min 4 distros 179 views
security Intermediate

Set up Vault as a PKI certificate authority with SSL automation and intermediate CA

Build a production-grade PKI infrastructure using HashiCorp Vault with root and intermediate certificate authorities. Enable automated SSL certificate generation and renewal for your applications with RBAC policies.

45 min 4 distros 169 views
networking Intermediate

Configure WireGuard site-to-site VPN connections with advanced routing and security

Set up secure network-to-network VPN tunnels using WireGuard with advanced routing, firewall rules, and monitoring for connecting multiple office locations or data centers.

45 min 4 distros 176 views
databases Intermediate

Install and configure PgBouncer for PostgreSQL connection pooling with performance optimization

Set up PgBouncer to efficiently manage PostgreSQL connections, reduce database load, and improve application performance with proper authentication and monitoring.

25 min 4 distros 192 views
monitoring Intermediate

Set up Prometheus Blackbox Exporter for uptime monitoring with SSL and alerting

Configure Prometheus Blackbox Exporter to monitor website availability, SSL certificate expiry, and HTTP response times with comprehensive Grafana dashboards and alert rules.

45 min 4 distros 176 views
devops Intermediate

Configure Traefik with Consul service discovery for dynamic load balancing

Set up Traefik 3.1 reverse proxy with Consul service discovery to automatically route traffic to services without manual configuration. Learn dynamic routing, SSL automation, health checks, and monitoring setup for production environments.

25 min 4 distros 179 views
linux Intermediate

Automate backup and restore for Ollama models with systemd timers and shell scripts

Set up automated backup and restore procedures for Ollama AI models using systemd timers, shell scripts, and compression. Includes disaster recovery strategies and monitoring integration for production environments.

45 min 4 distros 225 views
security Intermediate

Set up SSH bastion host with jump server configuration for secure network access

Configure an SSH bastion host to secure access to private networks, implementing jump server functionality with key-based authentication and access controls for enhanced security.

25 min 4 distros 168 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer