Joel TeoStep functions for granting JIT privileges.As part of reducing attack surface, there are situations where admin access should only be deployed when there is a need (Some examples…Mar 20Mar 20
Joel TeoGitOps with ArgoCD and Microk8s:The goal of this tutorial is to prepare and perform updates to a cluster with ArgoCD. This would be useful for pushing new changes or…Mar 12Mar 12
Joel TeoKubernetes and CICD for EKSToday’s goal is quite simple: Create a kubernetes pipeline and add a CICD pipeline to automatically push changes in yaml configs to the…Mar 21, 2022Mar 21, 2022
Joel TeoMemory scanning in Frida / Frida and Flutter appsI was following the following tutorial at Intercepting Flutter traffic on Android (ARMv8) — NVISO Labs, where I was looking for a method…Feb 13, 2022Feb 13, 2022
Joel TeoUsing Azure AD SSO for AWS Client VPN Endpoint AuthenticationFor a project, there was a Client VPN connected by the client, but it used a RADIUS proxy in order to pass through authentication to the…Jan 23, 2022Jan 23, 2022
Joel TeoUnderstanding PodSecurity in KubernetesWhen going through and configuring Cluster Security, this question came up:Dec 22, 2021Dec 22, 2021
Joel TeoCreating and using a machine learning model with AWS SagemakerI’m currently studying for the AWS Certified Machine Learning — Specialty (amazon.com) examination, and I needed a side project to drill…Nov 25, 20211Nov 25, 20211