Jamal MahmoudiinStackademicKubernetes certificate expiration “X509”If you’re operating Kubernetes within your infrastructure, it’s imperative to grasp the fundamentals of certificate management to uphold…May 6May 6
Jamal MahmoudiinStackademicAnsible Semaphore Web UI for Ansible Playbooks“Important note”Nov 25, 2023Nov 25, 2023
Jamal MahmoudiinStackademicConvert Docker Compose File to Kubernetes with KomposeDocker and Docker Compose has been a perfect choice for developers and sysadmins to define and manage multi-container applications. It…Nov 15, 2023Nov 15, 2023
Jamal MahmoudiinStackademicIntegrating Keycloak with Django1-Introduction keycloak application 2-Django authentication 3- Keycloak with Django Rest Framework (DRF) 4- Django Authentication and…Nov 12, 20232Nov 12, 20232
Jamal MahmoudiinStackademic12 fundamental steps for secure Kubernetes clusterKubernetes Security principles 2. Security policies 3. Role-Based Access Control (RBAC) 4. Network policies 5. Securing Kubernetes…Oct 16, 2023Oct 16, 2023
Jamal MahmoudiinStackademicCentralize Logs Kubernetes Cluster into Graylog Server with Fluent Bit Log CollectorAs a DevOps engineer, I manage Kubernetes clusters and docker swarms cluster that run different applications with different languages. I…Sep 27, 20232Sep 27, 20232