29/08/2024 | GoAuthentik from A to Y | “GoAuthentik is a selfhosted service to provide SSO authentication on all applications, let’s see how it works” |
09/07/2024 | Istio from A to Y | Istio is an open-source service mesh that allows you to connect, secure, control, and observe the services of an application. We will see how to install Istio, and how to use it to secure and monitor our services. |
12/05/2024 | Awtrix Ulanzi + Domotic = ❤️ | Review of the Ulanzi TC001 with Awtrix 3 firmware and its integration with Home Assistant. |
24/04/2024 | Falco from A to Y | Learn how to detect intrusions on your servers with Falco, a threat detection engine. We will see how to create our custom rules, deploy them on our machines, and visualize them in a web interface. |
11/04/2024 | Yubikey and GPG: Securing Your Communications | “Let’s discover together how to use GPG to secure your exchanges (files, emails, commits) and how to store your keys on a Yubikey for added security!” |
27/03/2024 | ArgoCD from A to Y | In this article, I provide you with a first definition of what GitOps is and how to implement it with ArgoCD in a Kubernetes environment. |
26/02/2024 | Talos - An Immutable OS for Kubernetes | Talos is an operating system for Kubernetes. It is designed to be lightweight, secure, and easy to use. In this article, I will introduce Talos and its features. |
15/02/2024 | Loki from A to Y | Loki is an open-source log management system designed by Grafana Labs. In this article, we will see how to install all the necessary components to use Loki and Promtail. |
02/02/2024 | Vault from A to Z | Vault is a secret management tool developed by Hashicorp. It allows for secure storage and management of secrets. In this article, we will see how to use Vault to manage your application’s secrets. |