Pi Docker Swarm

Building a Docker Swarm With Pi's 馃懢 馃懢 馃懢 馃懢

Intro The Raspberry Pi from it鈥檚 first iteration has been a great hit. Adopted by many as the computer of choice for projects, and for very good reason. The Pi is a fully fledged computer that fits in your pocket and the most recent edition has blown fans away with the flagship model boasting an ARM64 CPU and 8GB of RAM. Now one Raspberry Pi 4 8GB is more than powerful enough for most workloads and in some cases totally unnecessary, so you may even get away with a single 4GB model....

December 12, 2021 路 11 min 路 2290 words 路 ahmza
ssh-alt image

Securing SSH 馃

Introduction SSH is a widely used protocol to access remote devices. The problem with SSH is at the authentication stage, Brute force attacks are one of the ways an SSH connection can be compromised. A malicious actor will constantly hammer the remote host with different passwords until it can gain access. With further configuration of SSH we can make the service a lot more secure. Configure SSH Famous last words: Configuring SSH like many things in Linux is as simple as editing a few config files...

December 7, 2021 路 8 min 路 1702 words 路 ahmza
abstracted reverse proxy diagram

Setup an NGINX Reverse Proxy 馃ジ

Introduction In this post we will go over setting up an NGINX reverse proxy to allow different web services to reach the outside world. We will also cover setting up auto renewing SSL certificates. Why not just port forward the services, it does the same thing Right? Reverse proxies are a great way to expose web services to the outside world in a more secure and customisable manner. Some of the features that a reverse proxy provides are as follows:...

December 1, 2021 路 4 min 路 850 words 路 ahmza