Getting Started with Cloudflare Workers
I have recently had the need to redirect a few subdomains to another domain, due to old links still being used by public individuals.
I have recently had the need to redirect a few subdomains to another domain, due to old links still being used by public individuals.
In this blog post, we will look at the first part of my ideal setup, which is to secure inbound communication via an authenticating reverse proxy (OAuth2_Pro...
In the first two parts of this series, we looked at setting up a production Kubernetes cluster in our labs. In part three of this series, we are going to dep...
In the first part of the series, we looked at installing a bare bones Kubernetes cluster in some CentOS 7 VMs. In this part, we are going to look at setting ...
When you think about Kubernetes, you probably think AWS or GCP, a nice managed service where you can easily spin up resources and build applications on top o...
Helm-Vault is a new application designed to protect secrets contained in Helm Chart’s values.yaml files.
While setting up a new Keycloak client in my lab over the weekend, I discovered something odd, a number of users in my Keycloak database who should not have ...
In part two of this series, we are going to look at setting up a standalone-ha deployment of Keycloak on two CentOS 7 servers.
In this series, we will take a look at Keycloak, an open-source single sign on solution similar to Microsoft’s ADFS product.
If you use FreeNAS, it’s probably because you care about your data. Part of data security is ensuring the availability of your data. To that end, you need to...
In this article we will look at what a reverse proxy is, as well as how to set one up on CentOS using Nginx.
In part two of this series, we will look at creating a playbook to deploy and configure Telegraf, the popular devops service for getting your system’s metric...
This Post will serve as an introduction to Ansible and give to you a taste of what it can do.