Posts by Year


Configuring Istio with OIDC authentication

5 minute read

In this blog post, we will look at the first part of my ideal setup, which is to secure inbound communication via an authenticating reverse proxy (OAuth2_Pro...

Back to Top ↑


What is Helm-Vault?

1 minute read

Helm-Vault is a new application designed to protect secrets contained in Helm Chart’s values.yaml files.

The Importance of Security Testing

6 minute read

While setting up a new Keycloak client in my lab over the weekend, I discovered something odd, a number of users in my Keycloak database who should not have ...

Back to Top ↑


Back to Top ↑


Backing up FreeNAS to Backblaze B2

6 minute read

If you use FreeNAS, it’s probably because you care about your data. Part of data security is ensuring the availability of your data. To that end, you need to...

Nginx: Reverse Proxy

8 minute read

In this article we will look at what a reverse proxy is, as well as how to set one up on CentOS using Nginx.

Ansible Part 2: Installing Telegraf

4 minute read

In part two of this series, we will look at creating a playbook to deploy and configure Telegraf, the popular devops service for getting your system’s metric...

Back to Top ↑