Blog

Ansible: Roles Using Jinja2 (REST-API) Templating

Ansible: Roles Using Jinja2 (REST-API) Templating

Ansible: Roles Using Jinja2 (REST-API) Templating Everything You Need to Know Table of Contents * Overview * Core Components * Prerequisites * Configuration * Validation * Troubleshooting * Conclusion Overview: Jinja2 Templating

Chase Woodard 19 min read
F5 (FIPS) Federal Information Processing Standards

F5 (FIPS) Federal Information Processing Standards

F5 (FIPS) Federal Information Processing Standards Everything You Need to Know Table of Contents * Overview * Core Components * Prerequisites * Configuration * Validation * Troubleshooting * Implementation Risk Overview: What

Chase Woodard 7 min read
F5 (C3D) Client Certificate Constrained Delegation

F5 (C3D) Client Certificate Constrained Delegation

F5 (C3D) Client Certificate Constrained Delegation Everything You Need to Know Table of Contents: * Overview * Core Components * Prerequisites * Configuration * Validation * Troubleshooting * Conclusion This feature allows

Chase Woodard 8 min read
Git: Commit Code to Repo

Git: Commit Code to Repo

Committing New Code to Existing Repo Everything you need to know Table of Contents: * Why Version Control Matters * The Basic Git Workflow * Common Git Commands

Chase Woodard 4 min read
Declarative VS Imperative

Declarative VS Imperative

Differences Focus: * Declarative programming focuses on describing the desired result or logic, without specifying the control flow or implementation details. * Imperative programming focuses on explicitly

Chase Woodard 1 min read
F5 LTM Pools

F5 LTM Pools

Guide to F5 LTM Pools Everything you need to know Table of Contents: * Create LTM Nodes * Create LTM Pools * View Existing Pools * View Pool Health

Chase Woodard 6 min read
Fortigate IKEv2 IPsec VPN CLI Templates

Fortigate IKEv2 IPsec VPN CLI Templates

IKEv2 (Internet Key Exchange version 2) is the latest protocol for establishing IPsec VPN tunnels, offering improved performance, reliability and security over IKEv1. This blog

Chase Woodard 6 min read
Fortigate IKEv1 IPsec VPN CLI Templates

Fortigate IKEv1 IPsec VPN CLI Templates

IKEv1 (Internet Key Exchange version 1) is a widely used protocol for establishing IPsec VPN tunnels. This blog post provides a comprehensive guide to configuring

Chase Woodard 6 min read