New Path of the Polymath Blog

Second time is the charm... I had to rebuild this site due to my experimenting which messed up the previous setup. Here is the original post introducing my new Blog!
Hello everyone! Welcome to my brand new Blog/Portfolio website, where I'll be posting about my journey while I delve into different topics in IT. I'm excited to have you here for this new chapter in my learning+!
In a quest for growth and documentation purposes, I've decided to revamp my portfolio into a more dynamic blog format. This switch allows me to share my insights on current IT trends, document my learning experiences, and offer updates on my ongoing and upcoming projects. My previous portfolio served its purpose well, but this change allows me to connect with you in a more engaging and interactive way while serving as documentation so I don't keep having to re-learn everything.
To kickstart this change, I've migrated from Google Sites to a self-hosted version of Ghost – a platform tailored for creators. Ghost offers many features I'm eager to explore, and I can't wait to delve deeper after I've settled in and migrated some content from my old portfolio.
Curious about the technical side? I'm excited to share that I've set up a Virtual Machine on my Home Lab server and installed Ubuntu Server. Following some insightful guides, I successfully implemented Ghost within a Portainer stack. Here's a guide I found very helpful for the setup: Self-Host Ghost Guide.
Security is paramount, and I've taken it to the next level. With the guidance of the second tutorial, I've secured access to my site without exposing additional ports, utilizing Cloudflare Tunnels. This topic has me so intrigued that I'm already planning a dedicated post on the subject, as I've employed Cloudflare Tunnels for other applications as well (Kasm Workspaces, Trilium, IT-Tools, and a few others). Check out the guide here: Cloudflare Tunnel and Zero Trust.
Taking security a step further, I've implemented Cloudflare's "Access Applications," which bolsters the built-in authentication layer within Ghost. You can read about it here: Zero-Trust Access Applications.
From building and configuring the virtual machine to fine-tuning the site's settings, the entire process took me just around an hour – much less than I had anticipated. I'll be sharing further insights on server optimization, application security, and other aspects in upcoming posts.
Thank you for joining me on this journey! Keep an eye out for new updates, as I'll be sharing my projects and studies. Wishing you a fantastic day ahead!