Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

devops Advanced

Set up Consul multi-datacenter replication with ACL token replication

Configure Consul WAN federation across multiple datacenters with secure ACL token replication. Enable automatic token synchronization, gossip encryption, and cross-datacenter service discovery for distributed infrastructure.

45 min 4 distros 26 views
devops Intermediate

Implement Consul backup and disaster recovery with automated snapshots and restoration

Set up automated Consul snapshots with GPG encryption, systemd timers, and complete disaster recovery procedures. Includes monitoring integration with Prometheus and automated restoration workflows for production environments.

45 min 4 distros 66 views
devops Advanced

Deploy Envoy-based service mesh in Kubernetes production environment with SSL and observability

Set up a production-ready Envoy service mesh in Kubernetes with mutual TLS authentication, SSL certificate management, and comprehensive observability through Prometheus monitoring and distributed tracing.

45 min 4 distros 11 views
security Advanced

Implement Envoy proxy JWT authentication with OAuth2 integration

Configure Envoy proxy with JWT authentication filters integrated with Keycloak OAuth2 provider for secure microservices communication and advanced rate limiting policies.

45 min 4 distros 13 views
networking Advanced

Configure advanced gRPC load balancing with Envoy Proxy health checks and circuit breakers

Set up Envoy Proxy with intelligent gRPC load balancing, health checks, and circuit breakers for production microservices. Includes SSL termination, monitoring integration, and security hardening.

45 min 4 distros 22 views
devops Advanced

Configure Istio distributed tracing with Jaeger and Zipkin for comprehensive microservices observability

Set up comprehensive distributed tracing in your Istio service mesh using both Jaeger and Zipkin backends. Configure telemetry collection, trace sampling, and monitoring dashboards for full microservices observability.

45 min 4 distros 69 views
security Advanced

Implement Consul Connect mTLS with Vault PKI backend for secure service mesh communication

Set up mutual TLS authentication for Consul Connect using HashiCorp Vault's PKI backend to secure service-to-service communication with automatic certificate management and rotation.

45 min 4 distros 59 views
networking Advanced

Configure Cilium BGP peering with MetalLB integration for Kubernetes load balancing

Set up Cilium CNI with BGP routing capabilities and integrate with MetalLB speaker components for bare-metal Kubernetes load balancing. This configuration enables external traffic routing and service discovery in on-premises environments.

45 min 4 distros 34 views
devops Advanced

Implement Istio circuit breaker and retry policies for microservices resilience and fault tolerance

Configure Istio destination rules with circuit breaker patterns, implement retry policies with exponential backoff, and set up comprehensive fault injection testing for microservices resilience in Kubernetes service mesh environments.

45 min 4 distros 57 views
devops Advanced

Integrate Jaeger with Kubernetes service mesh for comprehensive distributed tracing

Set up production-grade distributed tracing in Kubernetes using Jaeger with Istio service mesh integration. Configure OpenTelemetry instrumentation, Elasticsearch storage backend, and comprehensive observability for microservices.

45 min 4 distros 95 views
devops Advanced

Configure Istio security policies with mutual TLS and authorization for Kubernetes service mesh

Configure mutual TLS authentication and authorization policies in Istio service mesh for secure microservices communication. This tutorial covers PeerAuthentication, AuthorizationPolicy, and RBAC configuration for production Kubernetes environments.

45 min 4 distros 188 views
security Advanced

Implement Consul ACL security and encryption for production deployments

Configure Consul's Access Control List (ACL) system with bootstrap tokens, implement TLS encryption for client-server communication, and enable gossip encryption to secure your Consul cluster for production environments with comprehensive authentication and authorization.

45 min 4 distros 435 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer