Recent Posts

Setting Up Site-to-Site VPN between My Homelab and AWS

References Simulating Site-to-Site VPN Customer Gateways Using strongSwan AWS Site-to-Site VPN with IPSec VPN (Strongwan) and BGP (FRRouting) Building a Scalable and Secure Multi-VPC AWS Network Infrastructure

Convert Any Image Into Pixel Art Using Gimp

If you like to add some vintage like retro game feeling to your website, try use pixel art images might be a good idea. Here’s a quick howto.

Differences Between AWS Route 53 Failover and AWS ELB LB

This post provides clarity over the differences between AWS R3 failover and ELB LB.

Differences between On-Prem Networking and Cloud Networking

This post discusses some of the major differences between on-prem data center networking and cloud networking.

Create VMs on Proxmox With Terraform

Create new VMs on Proxmox by using API and cloning from existing VM template. All code is in Terraform. Sample code is provided on github repo.

k8s Security

Over the past few months I’ve collected a few good resources regarding Kubernetes security. I will add more as I learn. Reference Securing a Cluster This document covers topics related to protecting a cluster from accidental or malicious access and provides recommendations on overall security.

CASB Deployment

Cloud Access Security Broker (CASB) is considered a common solution to mitigate “shadow IT” and data exfiltration risks on many organization’s journey to cloud.

What Is Zero Trust

This is the first post of a series that attempts to discuss Zero Trust in security from a conceptual and implementation perspective.

Explain Border Gateway Protocol in 5 Minutes

This post attempts to explain the Border Gateway Protocol in plain English: what it is; how it works at a high level and some of the threats from a security perspective.

IoT Security

IoT security is a relatively new area that presents its own unique challenges. This post discusses some of the security risks and possible solutions.