███╗ ██╗ █████╗ ██╗ ██╗███████╗ ██╗ █████╗ ██████╗ ███████╗ ████╗ ██║██╔══██╗╚██╗██╔╝██╔════╝ ██║ ██╔══██╗██╔══██╗██╔════╝ ██╔██╗ ██║███████║ ╚███╔╝ ███████╗ ██║ ███████║██████╔╝███████╗ ██║╚██╗██║██╔══██║ ██╔██╗ ╚════██║ ██║ ██╔══██║██╔══██╗╚════██║ ██║ ╚████║██║ ██║██╔╝ ██╗███████║ ███████╗██║ ██║██████╔╝███████║ ╚═╝ ╚═══╝╚═╝ ╚═╝╚═╝ ╚═╝╚══════╝ ╚══════╝╚═╝ ╚═╝╚═════╝ ╚══════╝
NAXS Labs was originally intended to be a place to document and host my resume. Now it’s evolved into a secondary platform where I document the things I’m currently learning and building.
The content covers real configs, automation scripts, and step-by-step guides from building actual systems. Commands that work, configurations that I’ve tested, and the mistakes I made along the way.
infrastructure = {
“compute”: “Proxmox + Oracle Cloud”,
“orchestration”: “K3s + ArgoCD”,
“secrets”: “HashiCorp Vault”,
“automation”: “Ansible + OpenTofu”
}
The audience is anyone studying network or security engineering. This isn’t a place to learn what the CIA triad is for the three thousandth four hundredth and twenty second time.
You already know the concepts. What you need are examples of how to actually implement them and get away from textbooks that tell you about things but never how to do anything.
Your environment may have different requirements and your outcomes may be slightly different from mine.
