Continue Reading — How do I set up a Target Tracking Scaling Policy for my Auto Scaling group?
Unix, Linux, DevOps , Cloud computing and BigData Knowledge-Base
My journey through eyaml, the Sensitive data type, and node_encrypt to better secured secrets in Puppet… turns out it’s easier than I thought. Continue Reading — My journey to securing sensitive data in Puppet code
Continue Reading — How to Automate the Configuration and Deployment of Jenkins and CI-CD Pipelines on OpenShift
LinuxSecurity.com: A security update is now available for Red Hat JBoss Enterprise Application Platform from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring Sy… Continue Reading — RedHat: RHSA-2018-2425:01 Important: Red...
LinuxSecurity.com: Several security issues were fixed in the Linux kernel. Continue Reading — Ubuntu 3742-2: Linux kernel (Trusty HWE) vulnerabilities
LinuxSecurity.com: Several security issues were fixed in the Linux kernel. Continue Reading — Ubuntu 3741-2: Linux kernel (Xenial HWE) vulnerabilities
As part of SUSE Hackweek 17 I decided to work on a fully fledged docker registry mirror. You might wonder why this is needed, after all it’s already possible to run a docker distribution (aka registry) instance as a pull-through cache. While that’s true, this solution...