Jamal MahmoudiinStackademicHow to monitor multi Kubernetes cluster from an external Prometheus serverThe goal of this article is to explore the best method for running Prometheus outside the monitored Kubernetes (k8s) cluster, or to…Jul 291Jul 291
Jamal MahmoudiinStackademicKubernetes certificate expiration “X509”If you’re operating Kubernetes within your infrastructure, it’s imperative to grasp the fundamentals of certificate management to uphold…May 61May 61
Jamal MahmoudiinStackademicAnsible Semaphore Web UI for Ansible Playbooks“Important note”Nov 25, 2023Nov 25, 2023
Jamal MahmoudiinStackademicConvert Docker Compose File to Kubernetes with KomposeDocker and Docker Compose has been a perfect choice for developers and sysadmins to define and manage multi-container applications. It…Nov 15, 2023Nov 15, 2023
Jamal MahmoudiinStackademicIntegrating Keycloak with Django1-Introduction keycloak application 2-Django authentication 3- Keycloak with Django Rest Framework (DRF) 4- Django Authentication and…Nov 12, 20232Nov 12, 20232
Jamal MahmoudiinStackademic12 fundamental steps for secure Kubernetes clusterKubernetes Security principles 2. Security policies 3. Role-Based Access Control (RBAC) 4. Network policies 5. Securing Kubernetes…Oct 16, 2023Oct 16, 2023
Jamal MahmoudiinStackademicCentralize Logs Kubernetes Cluster into Graylog Server with Fluent Bit Log CollectorAs a DevOps engineer, I manage Kubernetes clusters and docker swarms cluster that run different applications with different languages. I…Sep 27, 20232Sep 27, 20232