Quantcast
Channel: A Portal to a Portal
Browsing all 1850 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

kaniko - Build Images In Kubernetes

One of my IBM colleagues mentioned Kaniko todayFrom the site: -kaniko is a tool to build container images from a Dockerfile, inside a container or Kubernetes cluster.kaniko doesn't depend on a Docker...

View Article


Encrypted container images for container image security at rest

From IBM, we have this: -Ensure the confidentiality of data and code in container imagesThis article addresses a remaining security concern for enterprises about the confidentiality of data and code in...

View Article


Building Docker images for cache

When building a Docker image, it's useful to know that one can avoid the benefit of caching i.e. messages such as this: - ---> 790dcbffd65fStep 2/3 : RUN apt-get update ---> Using cache --->...

View Article

Updating Ubuntu - remember to update AND upgrade

I'm putting this here to remind me ... as I'm old and often forget ...... wassat ?So I've been doing lots of stuff with Ubuntu recently, including containers, Virtual Servers AND Virtual Machines...

View Article

IBM Cloud Vulnerability Advisor - Poking the Endpoint

I've been using the Vulnerability Advisor (VA) tool to automate the testing of my built Docker images, looking for code vulnerabilities, scanning against the IBM X-Force database and known Common...

View Article


Bash and a sufficiency of input parameters

I hit an interesting quirk in Bash earlier today; I'm passing in a list of command-line parameters to a Bash script, using the $1, $2 etc. input parameter method.However, I noticed that the TENTH...

View Article

Image may be NSFW.
Clik here to view.

Docker Registries and Repositories - Is there a difference ? ( Hint, yes,...

This came up in discussion today, and one of my colleagues pointed me here: -Difference between Docker registry and repositoryDocker registry is a service that is storing your docker images.Docker...

View Article

Book Review - Left To Our Own Devices, by Margaret E Morris

As mentioned previously, I've been writing a series of book reviews for the British Computer Society (BCS), including: -Book Review - You'll See This Message When It Is Too Late - The Legal and...

View Article


Image may be NSFW.
Clik here to view.

Now Available - IBM Cloud Hyper Protect Virtual Servers

I'm pleased to see one of the IBM Z offerings upon which my Squad are working is now available in the IBM Cloud Experimental Services section of the IBM Cloud Catalog: -Hyper protect line of virtual...

View Article


Intro Guide to Dockerfile Best Practices

Not sure how I found this ( it MAY have been Twitter ), but this is rather useful: -Intro Guide to Dockerfile Best Practicesespecially whilst I've been automating the build of Docker images via Jenkins...

View Article

Shelling out - fun with Ubuntu shells

I saw this: --sh: 2: [: -gt: unexpected operator-sh: 29: [: -gt: unexpected operatorwhen logging into an Ubuntu boxen.I was pretty sure that this'd worked before, but wondered whether my shell was...

View Article

Containers: A Complete Guide

I found this whilst looking for something completely different: -Containers: A Complete GuideThis guide looks at the importance of containers in cloud computing, highlighting the benefits and showing...

View Article

More Good (Best) Practices for Writing Dockerfiles

Following my earlier post: -Intro Guide to Dockerfile Best PracticesI've been looking at this further, and found this: -Best practices for writing Dockerfileson the Docker site itself.Enjoy!

View Article


Jenkins and the Case of the Missing Body

I was repeatedly seeing this: -java.lang.IllegalStateException: There is no body to invokewith a Jenkins Pipeline that I was executing; this Pipeline executes whenever one commits new code into a...

View Article

IBM WebSphere Liberty Profile and IBM DB2 and Docker - An approach

One of my IBM colleagues asked me about an approach for "versioning" DB2 JDBC drivers within a Docker image that's using those drivers to connect to a DB2 database.He was looking at options for ensure...

View Article


Python - Yet another way to learn ... Edublocks

I heard about this on this week's Digital Planet podcast, and it struck a chord, in part because I've struggled with Python in the past: -Tech4GoodAwardsJoshua Lowe– EduBlocksFinalist category: BT...

View Article

Logging into Docker Hub, or similar container registries, with "special"...

Note to self, if your password contains a special character such as dollar ( $ ), ensure that you escape if IF you're putting your password into a Bash environment variable, or passing it as a...

View Article


Synology NAS and SSH Ciphers

I've seen this before: -ssh -i ~/.ssh/id_rsa admin@diskstationUnable to negotiate with 10.0.0.43 port 22: no matching cipher found. Their offer: aes128-cbc,3des-cbc,aes192-cbc,aes256-cbcbut had...

View Article

SSH - Tinkering with the Known Hosts file

From the department of "I Did Not Know This" ....Having been doing a LOT with SSH client/server connectivity this past few weeks, I'd seen a lot of this:...

View Article

Down the rabbit hole with Docker and Kubernetes security

One of the many many fine podcasts to which I listen is The Kubernetes Podcast from Google.A recent episode, Attacking and Defending Kubernetes, with Ian Coldwater, covered a lot of ground with regard...

View Article
Browsing all 1850 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>