IBM Cloud Hyper Protect Virtual Servers
This is, in part, upon what I've been working this past six months or so ....Glad to see a useful rundown of the services and it's capabilities : -IBM Cloud Hyper Protect Virtual Servers Gain complete...
View Article"WARNING:root:could not open file '/etc/apt/sources.list'"
We saw this: -WARNING:root:could not open file '/etc/apt/sources.list'during a complex series of Docker builds.After a LOT of investigation, we concluded that it was a combination of a slightly...
View ArticleThis just in - RHEL 8.1: A minor release with major new container capabilities
This on the Red Hat Blog: -The release of Red Hat Enterprise Linux 8.1 is a minor update to RHEL, but a major step forward with containers. The container-tools:rhel8 application stream has been updated...
View ArticleNow we are live - IBM Cloud Hyper Protect Virtual Server
As mentioned before, this is an adjunct to some work that my team and I are doing right now .....IBM Cloud Hyper Protect Virtual ServerSummaryCreate and run virtual servers on IBM LinuxONE, the...
View ArticleKubernetes - Now the learning really really begins ...
As we hasten towards the end of 2019, my ongoing voyage of discovery that is Kubernetes really really kicks into gear ....To that end, I've followed a number of useful sources, including: -Kubernetes...
View ArticleIstio Explained - Getting Started with Service Mesh
This popped up on Twitter a short while ago: -Istio Explained - Getting Started with Service MeshMicroservices can be complicated and difficult to manage, but with this practical guide, you'll learn...
View ArticleGetting back to basics ... using kubectl to explain ... (almost) everything
Found this in a deck related to K8s security: - The Path Less Traveled: Abusing Kubernetes Defaultskubectl explain podsKIND: PodVERSION: v1DESCRIPTION: Pod is a collection of containers that...
View ArticleMore on Kubernetes - Security
Right now, I'm focused upon Kubernetes security, and these are *some* of my reading / listening materials: -The Path Less Traveled: Abusing Kubernetes Defaults - Ian Coldwater and Duffie CooleyK8s Root...
View ArticleJenkins CI - Reminder how to manage my password
I was struggling to find the place where I can change the password for my Jenkins CI account, for sites such as:...
View ArticleMore from Julia Evans - Your Linux Toolbox
I've mentioned Julia Evans several times before, but she's again wowed me with another rather useful set of enablement materials: -Your Linux Toolboxwhich is available as hard and soft copy.At time of...
View ArticleRed Hat OpenShift, IBM Cloud Paks and more facilitate digital transformation.
This is, in part, upon which I've been working this past year or soRed Hat OpenShift, IBM Cloud Paks and more facilitate digital transformationDefinitely worth a read, especially to provide context...
View ArticleBook Review - Penetration Testing - A guide for business and IT managers
Another book review on behalf of the British Computer Society, who kindly provided me with a hard-copy of this book: -Penetration Testing - A guide for business and IT managersThis book is written as a...
View Articledocker create - or ... one learns something every day ....
I was looking for a simple way to "peer" inside a newly-built Docker image, without actually starting a container from that image ...Specifically, I wanted to look at the content of a configuration...
View ArticleRun Linux on IBM Z Docker Containers Inside z/OS
Whilst this isn't upon which I'm currently working, it's definitely of interest and relevance: - Everybody knows that Linux* runs on IBM Z*, but what if you could build a hybrid workload consisting of...
View ArticleSigh, Jenkins, I was holding it wrong ...
I've created a Jenkins Pipeline that clones a GitHub repository and ... SHOULD ... execute a bunch o' instructions in a Jenkinsfile in the top-level of the repo ....SHOULD being the operative word...
View ArticleWhat's been eating my disk ?
I'm sure I've posted this before, but repetition is the most sincere form of .... something deep and meaningful.Want to see what's eating your disk in a particular file-system ?Try: -du -hs * | sort...
View ArticleJust Announced - IBM Hyper Protect Virtual Servers
This is upon what my team and I have been working for the past few months, and I'm proud that we've announced it today: - IBM Hyper Protect Virtual Servers is a software solution that is designed to...
View ArticleWebSphere User Group Spring Roadshow - 24 April 2020 @ IBM South Bank
From the department of my old team/job/love in IBM Cloud, we have: -WebSphere User Group Spring RoadshowWe know that real-world applications are complicated, and that a "Hello World" example just...
View ArticlePAM says "No"
I saw this yesterday: -Mar 2 11:19:32 korath sudo: pam_tally2(sudo:auth): user bloggsj (12024) tally 51, deny 5Mar 2 11:19:32 korath sudo: pam_unix(sudo:auth): auth could not identify password for...
View ArticleHmmm, cURL, why did you stop responding ?
So, a few weeks back, I was working on a Bash script that uses cURL to drive a set of REST APIs, and parses the responses, separating out the HTTP response code e.g. 200, 201, 301, 403 etc. from the...
View Article