Skip to main content

Networking

Secure Homelab, Part 3: Gitops Workflow with ArgoCD
·1063 words·5 mins
Introduction # As I wanted to fully implement GitOps for my homelab, ArgoCD became the cornerstone of my deployment strategy. I quickly realized that managing dozens of individual ArgoCD Application manifests: one for the ingress controller, one for monitoring, one for logging, etc would become a scaling nightmare.
Secure Homelab, Part 2: Building a Multi-Node K8s Cluster with Kind and Cilium
·1661 words·8 mins
Introduction # Now that our homelab is setup, we are going to be running a kubernetes cluster. For our purposes we have a couple of options but we will be going with Kind. If you are curious these are the various ways you can run a kubernetes cluster locally:
Setting Up a Secure Fedora Homelab with Teleport & Cloudflare
·1570 words·8 mins
Introduction # Have you ever wanted your own server at home to run applications, host files, or experiment with new technologies? A homelab is the perfect way to do just that. But what about accessing your homelab securely from anywhere in the world? That’s where things can get complicated.
Homelab: Attacking Splunk+Active Directory Part-2
·1079 words·6 mins
Introduction # In this part, we will attack the Windows 11 machine (target-pc) from our Kali machine and also use Atomic Red Team on the target-pc to simulate various attacks. We’ll then analyze the logs generated in Splunk to see how these attacks appear in the data.
Homelab: Splunk+Active Directory
·2356 words·12 mins
Introduction # In the world of cyber-security, having hands-on experience is invaluable. A home lab setup offers a powerful sandbox to simulate real-world network environments and security incidents. Active Directory (AD) and Splunk are two of the most widely used tools in the industry, forming the backbone of network management and security monitoring in countless organisations.
Deep Dive into Network Monitoring
·1489 words·7 mins
Network monitoring is essential for ensuring the reliability, security, and performance of computer networks. It involves continuously observing network traffic to detect and respond to anomalies, optimize resource allocation, and maintain uptime.