// BLOG
Blog — Linux, Kubernetes,
DevOps & Security
Nmap from Scratch — Complete Guide to Network Scanning
Nmap is the fundamental tool of every pentester and network administrator. This article covers dozens of practical examples — from simple host discovery, through service and OS detection, to advanced NSE scripts.
KubernetesKubernetes from Scratch: First Steps with a Local Cluster (kubeadm)
Step by step we set up a local Kubernetes cluster using kubeadm. From installation through network configuration to the first application deployment.
CI/CDGitLab CI/CD Pipeline for a Docker Application — Step by Step
Building a complete CI/CD pipeline in GitLab — from unit tests through Docker image building to automatic deployment.
AzureMigrating Applications to Azure AKS — What You Need to Know Before You Start
An overview of migration strategies, pitfalls and best practices before moving your application to Azure Kubernetes Service.
PentestingKubernetes Cluster Audit with CIS Benchmark and Trivy
How to conduct a Kubernetes cluster security audit step by step — tools, methodology and results interpretation.
Linux & ShellSELinux from Scratch — Why It Matters and How to Configure It
We explain what SELinux is, how it works and how to configure it on RHEL/Rocky Linux without breaking your applications.
DevSecOpsTrivy in CI/CD Pipeline — Automatic Docker Image Scanning
Integrating Trivy with GitLab CI and GitHub Actions — automatic vulnerability scanning of container images before every deployment.