Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

devops Advanced

Configure Podman secrets management with HashiCorp Vault integration

Set up secure container secrets management by integrating Podman with HashiCorp Vault. Configure dynamic secret injection, automated rotation, and production-ready monitoring for containerized applications.

45 min 4 distros 23 views
devops Advanced

Implement Ansible AWX Tower for enterprise automation workflows with RBAC and inventory management

Deploy Ansible AWX with Docker Compose for centralized automation management. Configure enterprise RBAC, dynamic inventory sources, and workflow templates for scalable infrastructure orchestration across multiple environments.

45 min 4 distros 27 views
devops Intermediate

Configure Ansible Vault for secret management and encryption with playbook automation

Set up Ansible Vault to encrypt sensitive data like passwords, API keys, and certificates in your playbooks. Learn to create encrypted variables, manage vault passwords, and integrate secure secret handling into automated deployments.

25 min 4 distros 25 views
security Advanced

Set up Apache Airflow DAG security policies and data governance with RBAC and audit logging

Configure comprehensive security for Apache Airflow with role-based access control, DAG-level permissions, data lineage tracking, and audit logging for compliance monitoring in production environments.

45 min 4 distros 23 views
devops Advanced

Set up Nomad multi-node cluster with TLS encryption and Consul integration

Deploy a production-ready HashiCorp Nomad cluster with server and client nodes, TLS encryption, and Consul integration for service discovery. Includes workload deployment and monitoring configuration.

45 min 4 distros 11 views
devops Intermediate

Configure Kubernetes secrets management with Sealed Secrets for secure Helm values

Learn to implement Sealed Secrets controller for encrypting Kubernetes secrets in Git repositories, enabling secure GitOps workflows with encrypted Helm values and automated secret management.

45 min 4 distros 7 views
devops Intermediate

Deploy applications to Kubernetes with Helm charts and production best practices

Learn how to create production-ready Helm charts for Kubernetes deployments with proper templating, values management, security configurations, and environment-specific customizations for scalable application orchestration.

45 min 4 distros 10 views
devops Advanced

Integrate GitLab with Kubernetes for automated deployments using CI/CD pipelines and runners

Set up GitLab CI/CD pipelines with Kubernetes runners for automated application deployments. Configure RBAC, implement rolling updates, and establish production-grade deployment strategies.

45 min 4 distros 8 views
devops Advanced

Integrate HashiCorp Vault with Kubernetes secrets management for secure container orchestration

Configure HashiCorp Vault integration with Kubernetes using the Vault CSI driver and Secrets Operator for automated secret injection and synchronization. This setup enables secure secret management for containerized applications with dynamic secret rotation and policy-based access controls.

45 min 4 distros 27 views
security Intermediate

Configure Vault dynamic secrets for databases with PostgreSQL and MySQL integration

Set up HashiCorp Vault's database secrets engine to automatically generate short-lived credentials for PostgreSQL and MySQL databases, improving security by eliminating static passwords and enabling automated credential rotation.

45 min 4 distros 25 views
security Intermediate

Set up Vault as a PKI certificate authority with SSL automation and intermediate CA

Build a production-grade PKI infrastructure using HashiCorp Vault with root and intermediate certificate authorities. Enable automated SSL certificate generation and renewal for your applications with RBAC policies.

45 min 4 distros 16 views
security Advanced

Secure Docker containers with Traefik reverse proxy and Authelia authentication

Set up a production-grade security stack using Traefik v3 reverse proxy with SSL automation and Authelia for multi-factor authentication. This tutorial covers Docker hardening, LDAP integration, and container security monitoring.

45 min 4 distros 32 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer