Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Install and configure CockroachDB cluster with high availability and distributed SQL
databasesConfigure Linux system time synchronization with chrony and NTP hardening
linuxConfigure network interface monitoring with ICMP ping and connectivity testing
networkingInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesInstall and configure ArgoCD for GitOps continuous deployment with RBAC and SSL
devopsRecently published
Configure TimescaleDB backup and recovery with pgBackRest for automated PostgreSQL protection
databasesConfigure Apache Airflow DAG security and secrets management with RBAC policies and encryption
securityConfigure Falco runtime security for Kubernetes threat detection with eBPF monitoring
securityImplement Consul Connect mTLS with Vault PKI backend for secure service mesh communication
securityConfigure Podman secrets management with HashiCorp Vault integration
devopsImplement Consul Connect mTLS with Vault PKI backend for secure service mesh communication
Set up mutual TLS authentication for Consul Connect using HashiCorp Vault's PKI backend to secure service-to-service communication with automatic certificate management and rotation.
Configure Istio security policies with mutual TLS and authorization for Kubernetes service mesh
Configure mutual TLS authentication and authorization policies in Istio service mesh for secure microservices communication. This tutorial covers PeerAuthentication, AuthorizationPolicy, and RBAC configuration for production Kubernetes environments.
Set up Istio multi-cluster service mesh with cross-cluster communication
Deploy and configure Istio across multiple Kubernetes clusters with secure cross-cluster communication, shared service discovery, and unified traffic management for distributed microservices architecture.
Implement Jaeger security with TLS encryption and authentication for distributed tracing
Secure your Jaeger distributed tracing infrastructure with TLS encryption, JWT-based authentication, and RBAC policies. This tutorial covers certificate generation, collector/query service encryption, and UI authentication through reverse proxy integration.
Implement Istio security policies with authorization and authentication for Kubernetes service mesh
Configure Istio service mesh security with mTLS authentication, JWT validation, and RBAC authorization policies. This tutorial covers implementing comprehensive security controls for microservices communication in production Kubernetes environments.
Configure Consul Connect service mesh with Envoy proxy for secure microservices communication
Set up Consul Connect service mesh with Envoy sidecar proxies to enable secure, encrypted service-to-service communication with mutual TLS authentication, traffic policies, and observability for your microservices architecture.
Install and configure Istio service mesh for Kubernetes with security policies and observability
Learn to deploy Istio service mesh on Kubernetes with mTLS security, traffic management, and comprehensive observability using Kiali and Jaeger for production microservices.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer