Quantcast
Channel: A Portal to a Portal
Browsing all 1850 articles
Browse latest View live

IBM Cloud Hyper Protect Virtual Servers

This is, in part, upon what I've been working this past six months or so ....Glad to see a useful rundown of the services and it's capabilities : -IBM Cloud Hyper Protect Virtual Servers Gain complete...

View Article


"WARNING:root:could not open file '/etc/apt/sources.list'"

We saw this: -WARNING:root:could not open file '/etc/apt/sources.list'during a complex series of Docker builds.After a LOT of investigation, we concluded that it was a combination of a slightly...

View Article


This just in - RHEL 8.1: A minor release with major new container capabilities

This on the Red Hat Blog: -The release of Red Hat Enterprise Linux 8.1 is a minor update to RHEL, but a major step forward with containers. The container-tools:rhel8 application stream has been updated...

View Article

Now we are live - IBM Cloud Hyper Protect Virtual Server

As mentioned before, this is an adjunct to some work that my team and I are doing right now .....IBM Cloud Hyper Protect Virtual ServerSummaryCreate and run virtual servers on IBM LinuxONE, the...

View Article

Kubernetes - Now the learning really really begins ...

As we hasten towards the end of 2019, my ongoing voyage of discovery that is Kubernetes really really kicks into gear ....To that end, I've followed a number of useful sources, including: -Kubernetes...

View Article


Istio Explained - Getting Started with Service Mesh

This popped up on Twitter a short while ago: -Istio Explained - Getting Started with Service MeshMicroservices can be complicated and difficult to manage, but with this practical guide, you'll learn...

View Article

Getting back to basics ... using kubectl to explain ... (almost) everything

Found this in a deck related to K8s security: - The Path Less Traveled: Abusing Kubernetes Defaultskubectl explain podsKIND:     PodVERSION:  v1DESCRIPTION:     Pod is a collection of containers that...

View Article

More on Kubernetes - Security

Right now, I'm focused upon Kubernetes security, and these are *some* of my reading / listening materials: -The Path Less Traveled: Abusing Kubernetes Defaults - Ian Coldwater and Duffie CooleyK8s Root...

View Article


Jenkins CI - Reminder how to manage my password

I was struggling to find the place where I can change the password for my Jenkins CI account, for sites such as:...

View Article


Image may be NSFW.
Clik here to view.

More from Julia Evans - Your Linux Toolbox

I've mentioned Julia Evans several times before, but she's again wowed me with another rather useful set of enablement materials: -Your Linux Toolboxwhich is available as hard and soft copy.At time of...

View Article

Red Hat OpenShift, IBM Cloud Paks and more facilitate digital transformation.

This is, in part, upon which I've been working this past year or soRed Hat OpenShift, IBM Cloud Paks and more facilitate digital transformationDefinitely worth a read, especially to provide context...

View Article

Book Review - Penetration Testing - A guide for business and IT managers

Another book review on behalf of the British Computer Society, who kindly provided me with a hard-copy of this book: -Penetration Testing - A guide for business and IT managersThis book is written as a...

View Article

docker create - or ... one learns something every day ....

I was looking for a simple way to "peer" inside a newly-built Docker image, without actually starting a container from that image ...Specifically, I wanted to look at the content of a configuration...

View Article


Run Linux on IBM Z Docker Containers Inside z/OS

Whilst this isn't upon which I'm currently working, it's definitely of interest and relevance: - Everybody knows that Linux* runs on IBM Z*, but what if you could build a hybrid workload consisting of...

View Article

Image may be NSFW.
Clik here to view.

Sigh, Jenkins, I was holding it wrong ...

I've created a Jenkins Pipeline that clones a GitHub repository and ... SHOULD ... execute a bunch o' instructions in a Jenkinsfile in the top-level of the repo ....SHOULD being the operative word...

View Article


What's been eating my disk ?

I'm sure I've posted this before, but repetition is the most sincere form of .... something deep and meaningful.Want to see what's eating your disk in a particular file-system ?Try: -du -hs * | sort...

View Article

Just Announced - IBM Hyper Protect Virtual Servers

This is upon what my team and I have been working for the past few months, and I'm proud that we've announced it today: - IBM Hyper Protect Virtual Servers is a software solution that is designed to...

View Article


WebSphere User Group Spring Roadshow - 24 April 2020 @ IBM South Bank

From the department of my old team/job/love in IBM Cloud, we have: -WebSphere User Group Spring RoadshowWe know that real-world applications are complicated, and that a "Hello World" example just...

View Article

PAM says "No"

I saw this yesterday: -Mar  2 11:19:32 korath sudo: pam_tally2(sudo:auth): user bloggsj (12024) tally 51, deny 5Mar  2 11:19:32 korath sudo: pam_unix(sudo:auth): auth could not identify password for...

View Article

Hmmm, cURL, why did you stop responding ?

So, a few weeks back, I was working on a Bash script that uses cURL to drive a set of REST APIs, and parses the responses, separating out the HTTP response code e.g. 200, 201, 301, 403 etc. from the...

View Article
Browsing all 1850 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>