Introduction I’ve received a notice recently from my streaming provider that upset me quite a bit. I’ve been a loyal netflix customer since 5 years only to get locked out of my account like a crim...
3 node k8s on hetzner's bare metal machines
Introduction This is the third one in the series. We looked at how to install, configure kubernetes and deploy a web app with it. Now we’ll take setup to another level with 3 control planes and 3 ...
haproxy part 3 the Virtual Router Redundancy Protocol
Introduction This will be a short one today and I wanted to go over a very simple question. What if the proxmox node running haproxy goes down? We’ve setup a load balancer in our previous article ...
haproxy part 2 the dataplaneapi
Introduction So let’s say you are getting a lot of incoming requests to your new web app and that one docker container thread isn’t cutting it. You’ll be happy to know that there is a reliable way...
k8s part 2 deploying a web app
Introduction Last week we looked at how to install and configure kubernetes, this time we’ll see how to deploy a web app with it. There are a lot of concepts to go through and I’m quite new in thi...
k8s part 1 a primer on kubernetes
Introduction I’ve been administrating kubernetes clusters but I never got the chance to actually build one from scratch until recently. There are multiple kubernetes distribution out there and mu...
haproxy part 1 load balancing a webserver
Introduction The setup is running on a single machine as a proof of concept. We can move those docker instances into individual virtual machines once we are happy with the results and actually nee...
Protect against a DDOS
How to protect against a DDOS In order to block a distributed denial of service DDOS attack you have several ways to go about it. 1) Block the requests at the reverse proxy level You can stop a ...
Network boot with pxe and ipxe
Introduction Network boot has existed since the 1980s and I never really found it important enough to ever bother. Perhaps boredom played a role here but looking back I’m glad I gave it a shot. Fi...
SSO part 3 Wireless network Access Control and VLANs
Introduction We previously set up a single sign on system with the windows active directory, unifi switches, unifi access points, authentik as the OIDC provider and freeradius. I was able to get w...