Technical
Repository
Structured technical knowledge system with reusable patterns, configurations, and architecture notes.
Identity and Access
Patterns for SSO, MFA, OIDC, LDAP, and identity platform design.
Authentik OIDC for Proxmox
Pattern for integrating Proxmox with Authentik as an OIDC provider on the reference platform.
Authentik Production Deployment Implementation Guide
Step-by-step implementation guide for deploying enterprise identity platforms using Authentik, Docker, and modern DevOps practices including automation, monitoring, and security hardening.
Modern Active Directory: Lessons from 25 Years of Enterprise Deployments
Insights from deploying and managing Active Directory environments from NT 3.51 through Windows Server 2022, including hybrid cloud strategies, security hardening, and architectural evolution.
Network and Security
Firewall, segmentation, VPN, and zero trust network patterns.
Palo Alto PA-220 Reference Policy Layout
High level reference for interface roles, zones, and security policy layout on a PA-220 in the reference platform.
NIST 800-171 Implementation: A Practitioner's Guide
Real-world strategies for implementing NIST 800-171 controls in enterprise environments, from technical architecture through compliance validation and CMMC preparation.
Enterprise IoT Security: Beyond Consumer Smart Bulbs
Scaling IoT security from consumer devices to industrial environments, addressing network segmentation, certificate management, and monitoring strategies for enterprise IoT deployments.
Platforms and Virtualization
Hypervisors, clusters, storage layouts, and platform reference designs.
Data Center Fabric and HCI Architecture
Standardized spine-leaf fabric and HCI block architecture for enterprise environments with zero-trust alignment and multi-site consistency.
Enterprise Application and Database Hosting Architecture
A structured multi-tier application and database hosting model designed for enterprise scale, aligned to zero trust principles, identity aware flows, and multi-site resiliency.
Enterprise Observability Reference Architecture
Complete telemetry, analytics, and operations lifecycle architecture supporting scalable, adaptable, and tool-agnostic approach to end-to-end operational awareness across hybrid environments.
Automation and IaC
Ansible, CI pipelines, container strategies, and repeatable automation patterns.
Palo Alto Firewall Automation Suite
Production-ready Ansible automation suite for baseline configuration and policy management of Palo Alto Networks firewalls using Infrastructure as Code principles.
Palo Alto Firewall Automation: Implementation Deep Dive
Detailed implementation guide covering Ansible playbook structures, variable design patterns, testing methodologies, and real-world code examples for Palo Alto firewall automation.
Resiliency and DR
Backup, disaster recovery, and continuity patterns across platforms.
Enterprise Disaster Recovery Architecture
Reference architecture for enterprise disaster recovery with RTO/RPO tiers, storage replication, and automated failover patterns.
Enterprise Operations, Disaster Recovery, and Resiliency
Operational practices and multi-site resiliency patterns for enterprise platforms including recovery tiers, failover models, and testing strategies.
Resilient Architecture Pattern: Tier 1
Metro pair operating in active-active mode with synchronous replication, plus asynchronous replication to out-of-region warm standby for regional disaster recovery scenarios.
Reference Platform
Patterns and notes specific to the open reference platform that hosts the site.
Enterprise Hybrid HCI Platform Reference Architecture
Multi-region enterprise platform combining on-premises HCI, segmented network domains, and public cloud integration with zero-trust alignment.
Enterprise Multi-Site Hybrid Architecture
Multi-site hybrid enterprise architecture with cloud infrastructure, network security layers, and HCI-based infrastructure across three geographic locations.
Multi-Site Hybrid Core Architecture
Three-site hybrid core architecture with consistent security, routing, and connectivity patterns across primary, disaster recovery, and out-of-region data centers.