Projects with this topic
-
Jitsi logs web observer
Updated -
🐳 Moodle 4.5 desplegado con Docker sobre Windows. Entorno educativo replicable para pruebas, formación y desarrollo, basado en un proyecto Docker para desplegar Moodle 4.5 en sistemas Windows.Incluye servicios separados (Moodle, MySQL y cron), persistencia de datos y una configuración pensada para uso educativo, pruebas locales y Formación Profesional (DAW / DAM).
Updated -
Automated WordPress deployment using GitLab CI/CD. Configured a pipeline to download, unzip, and deploy WordPress in an Alpine Linux container. Demonstrates practical skills in DevOps, CI/CD pipelines, containerized deployment, and automation on AlmaLinux 9.6.
Updated -
Editor de wiki full-stack para documentação técnica. Blocos editáveis de código com 14 linguagens, tabelas dinâmicas, mídia integrada, drag-and-drop e sincronização automática com backend PHP.
Updated -
Updated
-
-
Stock control supervisor. A list of Free Software network services and web applications which can be hosted on your own servers
dataset CSV Python JavaScript Java Docker HTML CSS Linux React C++ TypeScript Android Go GitLab API C website web Django Angular Kubernetes Windows machine lear... plugin JSON WordPress REST API app Terraform cli Kotlin MySQL Laravel Node.js Git PostgreSQL Amazon Web S... Flutter template devops documentation iOS MarkdownUpdated -
Example of DevOps process every MR has it's own image/testing enviroment Project includes also staging and production enviroment
Updated -
-
This project made for alerant zrt but you can reuse it.
Updated -
-
Another example of a full app CI/CD using Gitlab + K8s
Updated -
Tugas kelompok 5 softland modul pembelajaran devops bisa ai batch 3
Updated -
A demo blog API written in Laravel for demo purposes of containerization, CI/CD, and microservices implementation.
Updated -
Auto-deployment the Unix-way : Generic Ansible-based and sudo-friendly automation webhook handler.
Updated -
-
La función de implantación de un sistema de despliegue seguro incluye aspectos como la monitorización de aplicaciones y dispositivos para detectar los vectores de ataque más comunes.
Updated -
Updated