Complete Cloud, Monitoring, Terraform, and SIEM Tutorials for Linux Admins
Learn AWS SysOps, Terraform, Prometheus, Grafana, ELK Stack, and SIEM (Splunk/QRadar) with detailed explanations and real admin examples to advance your Linux/DevOps skills.
1. AWS SysOps Basics (Linux Admin-Oriented)
AWS SysOps focuses on deploying, managing, monitoring, and optimizing cloud infrastructure.
1.1 EC2 Monitoring Commands
Check CPU metrics using AWS CLI
1.2 Manage EBS Volumes
List Volumes
Extend EBS Volume
Then extend filesystem:
1.3 S3 Lifecycle Policies
Automatic archival to Glacier:
JSON Example
Apply using:
1.4 CloudWatch Alarms
Create CPU Alarm
2. Terraform Basics
Terraform is Infrastructure as Code (IaC) used to create AWS resources via code.
2.1 Install Terraform
2.2 Terraform Workflow
- Write code (.tf files)
- Initialize
- Plan
- Apply
- Destroy
2.3 Basic Terraform Example – Launch EC2
main.tf
Run the Terraform Commands
2.4 Variables Example
variables.tf
Use variable:
3. Monitoring Tools
3.1 Prometheus (Metrics Collection)
Prometheus is used to collect server and application-level metrics.
3.1 Install Prometheus (Linux)
Download Prometheus:
3.2 prometheus.yml Example
3.3 Install Node Exporter
Prometheus automatically collects:
- CPU
- RAM
- Disk usage
- Load average
- Network metrics
3.2 Grafana (Dashboard Visualization)
Grafana is used to visualize metrics from Prometheus, Loki, Elastic, MySQL, etc.
Install Grafana
Access UI:
Create Dashboard Example
- Add Data Source → Prometheus
- Create Dashboard → Add New Panel
- Query:
You can:
- Monitor CPU usage
- Track memory usage
- Monitor system load
- Create custom alerts
3.3 ELK Stack (Elasticsearch, Logstash, Kibana)
ELK is widely used for log aggregation and analysis.
ELK Architecture
| ComponentRole | |
| Elasticsearch | Stores logs |
| Logstash | Ingest, transform logs |
| Kibana | Visualize logs |
Install Filebeat (Send Logs to ELK)
Enable system logs module:
Start service:
Logstash Pipeline Example
/etc/logstash/conf.d/syslog.conf
4. SIEM Basics (Security Monitoring)
SIEM = Security Information & Event Management
Used for:
- Log correlation
- Incident detection
- Security monitoring
- Alerting
4.1 Splunk Basics
Install Splunk
Add Log Source
Search Query Example (SPL)
Search SSH login failures:
Count per user:
4.2 IBM QRadar Basics
QRadar is used for advanced threat detection.
Add a Linux Log Source
Configure:
Add:
Restart:
Basic QRadar Query (AQL)
Search failed SSH: