Complete Guide: How to Remove a Node from a Proxmox Cluster

Sometimes you need to remove a node from a Proxmox cluster, whether it’s to reassign it to another use, resolve configuration issues, or simply reorganize your infrastructure. Here’s how to proceed properly. I tested this procedure on Proxmox VE 7.x and 8.x. It allows you to remove a specific node from the cluster without affecting … Read more

Practical Guide: How to Format and Mount a Disk in Linux

Whether you’re a beginner or experienced system administrator, knowing how to format and mount a new disk in Linux is an essential skill. This tutorial will guide you step by step through the complete process, from disk identification to permanent mounting. I tested this tutorial on a Debian virtual machine and encountered no particular issues. … Read more

How to Unban an IP from Fail2Ban: Step-by-Step Guide

Sometimes, it may be necessary to unban an IP from Fail2Ban. Here is a tutorial explaining the procedure to follow. After a brief review of the logs, you will see which event banned the client’s address. First, we will list the jails: My Haproxy logs showed an SSL attack. To confirm that the client’s address … Read more

Implementing Wildcard SSL/TLS Certificates with OVH and Let’s Encrypt

In today’s digital ecosystem, website security is paramount. The use of SSL/TLS certificates encrypts communications between users and servers, ensuring the confidentiality and integrity of exchanged data. A wildcard certificate, in particular, provides the flexibility to secure a primary domain and all its subdomains, making it indispensable for businesses with extensive and diversified web presence. … Read more

HTTPS-HaProxy

When you make a certificate request via certbot, you can declare multiple subdomains for the same certificate. Once your certificate is generated, you will need to merge the certificate and the key.

How to configure HTTPS on Apache2

An important step when deploying an Apache2 server is the transition from the HTTP protocol to HTTPS. This allows for the encryption of data between the client and the server to protect its content from being transmitted in plain text over the internet.

Read more