Home
Chirpy
Cancel

Bypassing netflix's paywall BS

Introduction I’ve received a notice recently from my streaming provider that upset me quite a bit. I’ve been a loyal netflix customer since 5 years only to get locked out of my account like a crim...

3 node k8s on hetzner's bare metal machines

Introduction This is the third one in the series. We looked at how to install, configure kubernetes and deploy a web app with it. Now we’ll take setup to another level with 3 control planes and 3 ...

haproxy part 3 the Virtual Router Redundancy Protocol

Introduction This will be a short one today and I wanted to go over a very simple question. What if the proxmox node running haproxy goes down? We’ve setup a load balancer in our previous article ...

haproxy part 2 the dataplaneapi

Introduction So let’s say you are getting a lot of incoming requests to your new web app and that one docker container thread isn’t cutting it. You’ll be happy to know that there is a reliable way...

k8s part 2 deploying a web app

Introduction Last week we looked at how to install and configure kubernetes, this time we’ll see how to deploy a web app with it. There are a lot of concepts to go through and I’m quite new in thi...

k8s part 1 a primer on kubernetes

Introduction I’ve been administrating kubernetes clusters but I never got the chance to actually build one from scratch until recently. There are multiple kubernetes distribution out there and mu...

haproxy part 1 load balancing a webserver

Introduction The setup is running on a single machine as a proof of concept. We can move those docker instances into individual virtual machines once we are happy with the results and actually nee...

Protect against a DDOS

How to protect against a DDOS In order to block a distributed denial of service DDOS attack you have several ways to go about it. 1) Block the requests at the reverse proxy level You can stop a ...

Network boot with pxe and ipxe

Introduction Network boot has existed since the 1980s and I never really found it important enough to ever bother. Perhaps boredom played a role here but looking back I’m glad I gave it a shot. Fi...

SSO part 3 Wireless network Access Control and VLANs

Introduction We previously set up a single sign on system with the windows active directory, unifi switches, unifi access points, authentik as the OIDC provider and freeradius. I was able to get w...