Why You Can’t Terminate TLS at Traefik for PostgreSQL (and What to Do Instead)Context I had the need to allow Power BI to connect to a PostgreSQL database running in Kubernetes, fronted by Traefik using a TCP entrypoint. At first, I hoped to terminate TLS at Traefik, the same way you’d do for HTTPS traffic. But this turned out...Sep 22, 2025·7 min read
How to Add git-crypt Contributors to Your Encrypted Git RepositoryManaging sensitive information in a Git repository can be challenging, but tools like git-crypt make it easier by encrypting specific files. When adding a new contributor to such a repository, the admin needs to ensure they have the necessary access ...Jan 10, 2025·3 min read
Linux Cheat SheetRemove execution permission to "others" on every regular files inside a directory find directory_name -type f -exec chmod a-x {} ';' # Avoid using 'chmod -R' as the execution permission is interpreted differently on a directory compared to a regular...Jan 22, 2024·2 min read
Dockerizing CDKTF with PythonCloud Development Kit for Terraform (CDKTF) is a framework that allows you to use familiar programming languages to define and provision infrastructure using Terraform. CDKTF supports multiple languages, including Python, which is a popular choice fo...Dec 25, 2023·4 min read
DevOps - 4 practices to reduce your lead timeCreate on-demand environments dynamically triggered by a CI/CD pipeline, so teams don't have to wait weeks. Automate your deployments as much as possible, so any developers can autonomously deploy when needed. Automate your tests and add them to the ...Sep 12, 2022·1 min read
Jenkins As Code With Packer, Ansible, Terraform, and AWSWhat Will We Cover 1) Build an OS image for AWS with a Jenkins ready to use 2) Provision an EC2 instance to host the Jenkins server See all the code for this article here: https://github.com/thecloudprofessional/devops_cicd Using Packer with Ansible ...Feb 7, 2022·2 min read
DynamoDB: 3 ways to use the APIThe way you interact with DynamoDB is usually with AWS SDK, where you can perform: Items-based actions: Anytime you act on a single item - writing, updating, or deleting - you are using an item-based action. You must provide the entire primary key. ...Dec 14, 2021·1 min read