Secure Shell (SSH) is a widely used protocol for secure remote access to servers. One way to enhance the security of your servers is by…
Linux cheat sheet
Secure Shell (SSH) is a widely used protocol for secure remote access to servers. One way to enhance the security of your servers is by…
Kubernetes is a powerful container orchestration platform that simplifies the deployment, scaling, and management of containerised applications. MicroK8s, a lightweight Kubernetes distribution, is a popular…
Web Application Firewall is an additional layer of security for your services and now we are going to implement it on practice. Let’s start with…
Open vim /etc/sysctl.conf Add following # Increase size of file handles and inode cache fs.file-max = 2097152 # Do less swapping vm.swappiness = 10 vm.dirty_ratio…
This CronJob runs every day at midnight and executes a shell script that will remove all unused images, containers, and volumes that are older than…
In this guide we will learn how to create ci/cd pipeline in Jenkins, build the image , push to local repository and deploy our app…
If you faced botnet or you have any other suspicious activity on the server, you should take some actions to prevent it as soon as…
A way to get your code deployed to the production server Webhook allows to automatically retrieve the newest code any time a push is performed…
A Site-to-site VPN is a type of VPN connection that is created between two separate locations. It provides the ability to connect geographically separate locations. for example a linux…