Blog — Linux, Kubernetes,
DevOps & Security

Pentesting

Nmap from Scratch — Complete Guide to Network Scanning

Nmap is the fundamental tool of every pentester and network administrator. This article covers dozens of practical examples — from simple host discovery, through service and OS detection, to advanced NSE scripts.

Kubernetes

Kubernetes from Scratch: First Steps with a Local Cluster (kubeadm)

Step by step we set up a local Kubernetes cluster using kubeadm. From installation through network configuration to the first application deployment.

CI/CD

GitLab CI/CD Pipeline for a Docker Application — Step by Step

Building a complete CI/CD pipeline in GitLab — from unit tests through Docker image building to automatic deployment.

Azure

Migrating Applications to Azure AKS — What You Need to Know Before You Start

An overview of migration strategies, pitfalls and best practices before moving your application to Azure Kubernetes Service.

Pentesting

Kubernetes Cluster Audit with CIS Benchmark and Trivy

How to conduct a Kubernetes cluster security audit step by step — tools, methodology and results interpretation.

Linux & Shell

SELinux from Scratch — Why It Matters and How to Configure It

We explain what SELinux is, how it works and how to configure it on RHEL/Rocky Linux without breaking your applications.

DevSecOps

Trivy in CI/CD Pipeline — Automatic Docker Image Scanning

Integrating Trivy with GitLab CI and GitHub Actions — automatic vulnerability scanning of container images before every deployment.