Most of us have heard about the ingress controller at least once when Kubernetes was the topic of the talk and I aim to demystify a fundamental understanding of the ingress controller in this post ...
Setup your own Kubernetes Cluster
The best way to deepen your understanding is to build, break, and fix it—at least, this is how my learning works. After delving into videos, sifting through documentation, and scouring online posts...
What is a self-signed certificate, and why does one need it?
One may have heard at least heard once about the self-signed certificate working in the computer science domain. In short, a self-signed certificate is a digital certificate that is not signed by a...
DNS Record Types | Hands on DNS authoritative server configuration
Before we jump into the dns record types, there are few terminology to be familiar with: Resource Records (RR) A resource record (RR) is a data structure in DNS that contains information about a s...
Introduction to DNS | How it works
This would be a series of DNS service to provide a holistic view of DNS working, configuration practices, security threats, and mitigation. As one should be aware, DNS has been a really engaging to...
F5 BIG-IP ASM – L7 DDoS attack Protection
The type of malicious behavior builds to emphasize on the application layer of the OSI model with an intent to disrupt – mainly the availability of the features of the target web application. F5 BI...
Integration of AS3 and TS extension of F5 BIG-IP with Azure Sentinel
One can leverage the usage of Azure Sentinel to collect and display the data using the Telemetry streaming extension on the F5 BIG-IP device. Azure Sentinel is able to collect the logs from the F5 ...
Automate the backup of F5 BIG-IP – UCS, SCF and SSL
One of the most tedious jobs for the F5 Administrator is the periodic backup of the F5 BIG-IP system. F5 BIG-IQ does solve the problem but, this guide is for someone who wants the workaround for th...
Configuration of Remote High-Speed Logging in F5 BIG-IP
The scope of efficient logging systems provides a holistic view of the implemented systems and the logs generated by the WAF, especially the illegal and blocked requests help to discover the thre...
Get Microsoft Certified AZ-900 (Free-of-Cost)
If someone is really interested in getting into cloud computing, there is a way to get free verification from a well-recognized cloud vendor. Microsoft Certified: Azure Fundamentals can be a good ...