kaniko - Build Images In Kubernetes
One of my IBM colleagues mentioned Kaniko todayFrom the site: -kaniko is a tool to build container images from a Dockerfile, inside a container or Kubernetes cluster.kaniko doesn't depend on a Docker...
View ArticleEncrypted container images for container image security at rest
From IBM, we have this: -Ensure the confidentiality of data and code in container imagesThis article addresses a remaining security concern for enterprises about the confidentiality of data and code in...
View ArticleBuilding Docker images for cache
When building a Docker image, it's useful to know that one can avoid the benefit of caching i.e. messages such as this: - ---> 790dcbffd65fStep 2/3 : RUN apt-get update ---> Using cache --->...
View ArticleUpdating Ubuntu - remember to update AND upgrade
I'm putting this here to remind me ... as I'm old and often forget ...... wassat ?So I've been doing lots of stuff with Ubuntu recently, including containers, Virtual Servers AND Virtual Machines...
View ArticleIBM Cloud Vulnerability Advisor - Poking the Endpoint
I've been using the Vulnerability Advisor (VA) tool to automate the testing of my built Docker images, looking for code vulnerabilities, scanning against the IBM X-Force database and known Common...
View ArticleBash and a sufficiency of input parameters
I hit an interesting quirk in Bash earlier today; I'm passing in a list of command-line parameters to a Bash script, using the $1, $2 etc. input parameter method.However, I noticed that the TENTH...
View ArticleDocker Registries and Repositories - Is there a difference ? ( Hint, yes,...
This came up in discussion today, and one of my colleagues pointed me here: -Difference between Docker registry and repositoryDocker registry is a service that is storing your docker images.Docker...
View ArticleBook Review - Left To Our Own Devices, by Margaret E Morris
As mentioned previously, I've been writing a series of book reviews for the British Computer Society (BCS), including: -Book Review - You'll See This Message When It Is Too Late - The Legal and...
View ArticleNow Available - IBM Cloud Hyper Protect Virtual Servers
I'm pleased to see one of the IBM Z offerings upon which my Squad are working is now available in the IBM Cloud Experimental Services section of the IBM Cloud Catalog: -Hyper protect line of virtual...
View ArticleIntro Guide to Dockerfile Best Practices
Not sure how I found this ( it MAY have been Twitter ), but this is rather useful: -Intro Guide to Dockerfile Best Practicesespecially whilst I've been automating the build of Docker images via Jenkins...
View ArticleShelling out - fun with Ubuntu shells
I saw this: --sh: 2: [: -gt: unexpected operator-sh: 29: [: -gt: unexpected operatorwhen logging into an Ubuntu boxen.I was pretty sure that this'd worked before, but wondered whether my shell was...
View ArticleContainers: A Complete Guide
I found this whilst looking for something completely different: -Containers: A Complete GuideThis guide looks at the importance of containers in cloud computing, highlighting the benefits and showing...
View ArticleMore Good (Best) Practices for Writing Dockerfiles
Following my earlier post: -Intro Guide to Dockerfile Best PracticesI've been looking at this further, and found this: -Best practices for writing Dockerfileson the Docker site itself.Enjoy!
View ArticleJenkins and the Case of the Missing Body
I was repeatedly seeing this: -java.lang.IllegalStateException: There is no body to invokewith a Jenkins Pipeline that I was executing; this Pipeline executes whenever one commits new code into a...
View ArticleIBM WebSphere Liberty Profile and IBM DB2 and Docker - An approach
One of my IBM colleagues asked me about an approach for "versioning" DB2 JDBC drivers within a Docker image that's using those drivers to connect to a DB2 database.He was looking at options for ensure...
View ArticlePython - Yet another way to learn ... Edublocks
I heard about this on this week's Digital Planet podcast, and it struck a chord, in part because I've struggled with Python in the past: -Tech4GoodAwardsJoshua Lowe– EduBlocksFinalist category: BT...
View ArticleLogging into Docker Hub, or similar container registries, with "special"...
Note to self, if your password contains a special character such as dollar ( $ ), ensure that you escape if IF you're putting your password into a Bash environment variable, or passing it as a...
View ArticleSynology NAS and SSH Ciphers
I've seen this before: -ssh -i ~/.ssh/id_rsa admin@diskstationUnable to negotiate with 10.0.0.43 port 22: no matching cipher found. Their offer: aes128-cbc,3des-cbc,aes192-cbc,aes256-cbcbut had...
View ArticleSSH - Tinkering with the Known Hosts file
From the department of "I Did Not Know This" ....Having been doing a LOT with SSH client/server connectivity this past few weeks, I'd seen a lot of this:...
View ArticleDown the rabbit hole with Docker and Kubernetes security
One of the many many fine podcasts to which I listen is The Kubernetes Podcast from Google.A recent episode, Attacking and Defending Kubernetes, with Ian Coldwater, covered a lot of ground with regard...
View Article