Year: 2022
-
Re-purpose Cloud Key Gen2 Plus for Pi-Hole
Read more: Re-purpose Cloud Key Gen2 Plus for Pi-HoleI have upgraded cloud key with UDMPro. UDMPro don’t have a DNS. I plan to use Cloud Key as DNS and wanted to install PI-HOLE…
-
Scan docker containers for log4j/Log4Shell exploit
Read more: Scan docker containers for log4j/Log4Shell exploitIf you are running docker container on Unraid, follow these steps to scan containers; Open up a terminal window in unraid and copy/paste the following…
-
Setup wireguard on Unraid
Read more: Setup wireguard on UnraidRefer to this article; https://engineerworkshop.com/blog/how-to-set-up-wireguard-on-unraid/
RECENT POSTS
-
Why the Cloud & Integration Engineer Role Is AI-Resilient
-
Azure Tenant vs Subscription vs Landing Zone (Plain English Guide)
-
Building a FinOps Cost Intelligence Dashboard on Azure: From Raw Data to Operational Insight
-
The Microservices Trap
-
Most people still confuse AI Agents, Automations, and Chatbots
Categories
Tags
ADO ai angular asian asp.net asp.net core azure ACA azure administration azure app services Azure Cloud Architect Azure Key Vault Azure Storage Blazor WebAssembly BLOB bootstrap c# css datatables design pattern docker excel framework Git HTML JavaScript jQuery json knockout lab LINQ linux power bi powershell REST API smart home SQL Agent SQL server SSIS SSL SVG Icon typescript visual studio Web API window os wordpress
ARCHIVE
DISCLAIMER
The information on this weblog is provided “as is,” without warranties of any kind, and confers no rights. The content reflects my personal views and does not represent the thoughts, intentions, plans, or strategies of any organization with which I am affiliated. Discussion and differing viewpoints are welcome; however, I reserve the right to moderate or remove comments that are abusive, profane, rude, or anonymous. Please keep the conversation respectful and constructive.
