[Home] Karl N. Redman:

network

featured.png

Private Network + Traefik + Keycloak + Gatekeeper Overview (diagram)

A high level network overview of Traefik, Keycloak, and Gatekeeper working together This is yet another artifact [although ugly] from a project I’m working on. This diagram depicts a basic lab infrastructure with Traefik, Keyclaok, and Keycloak Gatekeeper working together behind a local DNS (dnsmasq). Details for how all of this actually fits together are forthcomming. For now, hopefully, it will be helpful for those who are wondering what the layout looks like when configuring these various components to work together.

Resolve docker hostnames from host with DNS Proxy Server

This article is a continuation of my previous HowTo: Dnsmasq + NetworkManager + Private Network Setup. With just a few configuration changes we will add the capability to interact with docker containers by their respective hostnames. Even though the dns-proxy-server project affords us this new functionality I recommend that dns-proxy-server only be used for development purposes. While it’s awesome to have the ability to reference individual containers by hostname during development efforts the concept doesn’t scale well.

Dnsmasq + NetworkManager + Private Network Setup

This is a howto/method for minimal configuration which provides a local private network that will be available to the local host for both online and offline (internet/DHCP) connectivity. The goal is to provide a scalable and network switchable development environment for virtual machines and bare metal application systems. This method intends to provide the developer the ability to roam (via laptop, et al) and maintain a consistent network development environment.