© 2023 Hashnode
#letsencrypt
Introduction: In today's digital landscape, securing websites with SSL (Secure Sockets Layer) certificates has become crucial. Let's Encrypt, a free and open certificate authority, offers a straightfo…
Why would I do that? I asked Bing Chat: "Is it worth it to run Kubernetes yourself?" It gave me the following answer: Whether it’s worth running Kubernetes yourself depends on many factors. Here are s…
Introduction AWS offers services such as AWS Route53 and AWS Certificate Manager to set up domain names with SSL. Which are very easy to use and set up in a matter of minutes to have your website up a…
In line with my previous article regarding external-dns component in a kubernetes cluster : https://yodamad.hashnode.dev/set-up-external-dns-on-a-kubernetes-cluster, here is a quick one explaining how…
The Security Principles The Web’s trustworthiness has become critical to its success Furthermore, confidentiality -- while arguably not always strictly necessary -- is often needed The Web platform should be designed to actively prefer …
Without SSL/TLS, any information transmitted between your website and your visitors' browsers is sent in plain text and can be intercepted by malicious actors. In addition to providing security benefits, using SSL/TLS can also improve the t…
In recent years, website security has become increasingly important. One of the essential components of website security is having a valid SSL/TLS certificate installed on your website. This certifica…
For over a year now, I have provisioned and been maintaining three (3) docker-based Redash instances for different purposes at work. Redash has become a convenient tool for us to manage user access to…
Hey folks! In today's blog, I am going to show you how to install Prometheus and run the Prometheus server as HTTPS that you can share with your friends. In this blog, I am using an AWS EC2 instance(t…
If you're an operator maintaining a footprint of Kubernetes clusters, then you already know that there's more to provisioning and granting access to a cluster. For a cluster to be useful for an end consumer an operator will usually install,…