Posts
Cloufish's Blog
Cancel

Making Rules For IPtables Firewall with UFW

Why UFW? There are at least two (That’s how many I know) ways to configure iptables rules: By iptables command itself By ufw - Uncomplicated Firewall - which is also a commands tool, but it si...

How to Take Better Notes?

Disclaimer This content comes from the Book How to Take Smart Notes and Evergreen If you’re interested in diving deeper into psychological aspects, or you feel unconvinced or just because y...

Blackarch has it's own official docker image!

You can find it HERE That’s amazing news. Having an official and stable container will make it much easier to develop other blackarch containers, and I wish there was one when I was creating my co...

Basics of Kubernetes Part 2

Connecting to the Pod/App. We know from previous blog-post, that because Pods are disappearing, redeployed all the time we can’t directly connect to them via IP - these are changing constantly. W...

Security of Docker Containers

Intro The use of Docker Containers has changed completely on how we deploy our applications, many though think that all the apps running in the container are completely isolated from the host syst...

Basics of Kubernetes (Hands-On Experience)

kubectl A command-line tool to access the K8s API Server Installation Here are the docs to guide you with installation On my host machine, I only run sudo pacman -Syu kubectl Installing Kuber...

Basics of Kubernetes (Without Hands-on Practice)

Intro: What I want you to know already: What are containers - I recommend this course -> freeCodeCamp Docker How to create them in Dockerfiles, for that I recommend blackarch-zsh blog-post ...

Concept of Preventing Insufficient Logging & Monitoring

Intro Security Breaches happen, and also you should be prepared for them to happen, expect them! With this mindset you can minimize the impact of the breach. With logging, we can be better prepare...

Setting up Hashicorp Vault to manage our Github Token

UPDATE: This blog post is about managing secrets to authenticate to GitHub via HTTPS connection. But you can also authenticate via SSH connection and generate your own private key as described h...

Setting up ZAP Scan in CI/CD pipeline

What is CI/CD pipeline? To put it simply, it is a pathway to deployment, in a fast way in respect with Agile manifesto. Every pull request on GitHub should be checked in order to check if it’s work...