Configuring Apache and HAProxy to Record Clients’ Real IP Addresses

When hosting an Apache server behind an HAProxy, the server receives requests from the WAN through HAProxy. This method can pose a problem because your web server sees the proxy’s IP address for each request, making the logs almost unusable, and any WordPress security plugin might ban the proxy’s local address instead of the attacker’s … Read more

Implementing Wildcard SSL/TLS Certificates with OVH and Let’s Encrypt

In today’s digital ecosystem, website security is paramount. The use of SSL/TLS certificates encrypts communications between users and servers, ensuring the confidentiality and integrity of exchanged data. A wildcard certificate, in particular, provides the flexibility to secure a primary domain and all its subdomains, making it indispensable for businesses with extensive and diversified web presence. … Read more

Demystifying Kubernetes: A Step-by-Step Guide to Setting Up Your Own Cluster

Whether you’re a budding developer or a seasoned system administrator, understanding how to set up a Kubernetes cluster is a valuable skill. This tutorial aims to demystify the installation process and guide you step by step through the necessary steps to create your own Kubernetes environment. Get ready to dive into the fascinating world of … Read more