Blog

Restic: Sleep Soundly, Your Servers Are Backed Up

Learn how I secure my Docker data and databases using Restic, configuring retention and alerts for total peace of mind.

avatar
Benjamin Rabiller

Mastering Traefik v3 as a Reverse Proxy: Docker Configuration and Security

Technical guide detailing the setup of Traefik v3.6 as a Docker Edge Router. Includes a commented walkthrough of a production configuration, ACME certificate management, and …

avatar
Benjamin Rabiller

Taming Your Bookmarks: Why I Chose Self-Hosted KaraKeep

Learn how to install KaraKeep via Docker and configure OpenAI to automatically generate summaries and tags for your bookmarks.

avatar
Benjamin Rabiller

Installing and Configuring Samba on Ubuntu: The Complete Guide

A step-by-step tutorial to install Samba on Ubuntu and restrict its access to a specific network interface (wg0) for enhanced security.

avatar
Benjamin Rabiller

Building Docker Images with Ephemeral Jenkins Slaves on Amazon ECS

Learn how to build Docker images securely without using the Docker socket by leveraging Kaniko and ephemeral Jenkins agents running on Amazon ECS (Fargate/EC2).

avatar
Benjamin Rabiller

Amazon SES Reporting: Analyzing Bounces and Complaints with CloudWatch

Learn how to track email bounces and spam complaints on AWS SES to maintain your sender reputation and prevent account suspension.

avatar
Benjamin Rabiller

Securing Amazon S3: Implementing Encryption (SSE) with Terraform

A complete guide on S3 encryption methods. Learn the differences between SSE-S3 and SSE-KMS, and how to implement them using modern Terraform resources.

avatar
Benjamin Rabiller

HTTP/2 in Practice: Why Server Push Fails on AWS

An analysis of a real-world infrastructure (ALB, Varnish, Nginx) to understand why HTTP/2 Server Push is often unusable in complex cloud architectures.

avatar
Benjamin Rabiller