Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

networking Intermediate

Setup Tailscale site-to-site VPN with multiple exit nodes for redundancy

Configure a resilient Tailscale mesh VPN with multiple exit nodes for high availability site-to-site connectivity. Set up subnet routing, automatic failover, and monitoring across distributed networks.

45 min 4 distros 126 views
security Advanced

Implement Tailscale OAuth integration with identity providers for enterprise authentication

Configure Tailscale with enterprise identity providers including SAML and OIDC authentication, implement access control policies, and manage users across distributed teams for secure zero-trust networking.

45 min 4 distros 179 views
devops Intermediate

Configure Kubernetes network policies with Calico CNI for container security and microsegmentation

Set up Calico CNI in Kubernetes to implement network policies for pod-to-pod traffic control, create ingress and egress rules for microsegmentation, and test policy enforcement to secure container communication at the network layer.

35 min 4 distros 106 views
security Advanced

Implement Podman pod security with network policies and microsegmentation

Secure Podman pods with custom network policies, traffic filtering, and microsegmentation using CNI plugins and netavark. Implement zero-trust networking with firewall rules and container isolation.

45 min 4 distros 148 views
networking Advanced

Implement Kubernetes network policies with Calico for microsegmentation

Configure Calico CNI to enforce network policies for pod-to-pod traffic control and namespace isolation. This tutorial covers advanced microsegmentation patterns, ingress/egress rules, and policy monitoring for production Kubernetes security.

45 min 4 distros 256 views
devops Advanced

Configure Istio security policies with mutual TLS and authorization for Kubernetes service mesh

Configure mutual TLS authentication and authorization policies in Istio service mesh for secure microservices communication. This tutorial covers PeerAuthentication, AuthorizationPolicy, and RBAC configuration for production Kubernetes environments.

45 min 4 distros 263 views
devops Advanced

Configure Kubernetes network policies with Calico CNI for microsegmentation and security enforcement

Learn to implement advanced network security in Kubernetes using Calico CNI. Configure namespace-based microsegmentation, application-level policies, and comprehensive monitoring for enterprise-grade cluster protection.

45 min 4 distros 359 views
networking Intermediate

Configure Tailscale mesh VPN with subnet routing and ACL policies for secure network access

Set up a zero-trust mesh VPN network with Tailscale that includes subnet routing for local network access, granular ACL policies for security, and exit nodes for secure internet access.

25 min 6 distros 620 views
devops Intermediate

Install and configure Istio service mesh for Kubernetes with security policies and observability

Learn to deploy Istio service mesh on Kubernetes with mTLS security, traffic management, and comprehensive observability using Kiali and Jaeger for production microservices.

45 min 6 distros 637 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer