Monthly Archives: October 2015

AWS – Private Registry Authentication

The Amazon ECS container agent can authenticate with private registries, including Docker Hub, using basic authentication. When you enable private registry authentication, you can use private Docker images in your task definitions. The agent looks for two environment variables when it launches: ECS_ENGINE_AUTH_TYPE, which specifies the type of authentication data that is being sent, and… Read More »

Docker Registry

Docker Registry What it is The Registry is a stateless, highly scalable server side application that stores and lets you distribute Docker images. The Registry is open-source, under the permissiveApache license. Why use it You should use the Registry if you want to: tightly control where your images are being stored fully own your images… Read More »

Docker Understanding the Registry

Understanding the Registry A registry is a storage and content delivery system, holding named Docker images, available in different tagged versions. Example: the image distribution/registry, with tags 2.0 and 2.1. Users interact with a registry by using docker push and pull commands. Example: docker pull Storage itself is delegated to drivers. The default storage… Read More »

docker Authenticating proxy with nginx

Authenticating proxy with nginx With this method, you implement basic authentication in a reverse proxy that sits in front of your registry. While this model gives you the ability to use whatever authentication backend you want through a secondary authentication mechanism implemented inside your proxy, it also requires that you move TLS termination from the… Read More »

Deploying a registry server

Running on localhost Start your registry: docker run -d -p 5000:5000 –restart=always –name registry registry:2 You can now use it with docker. Get any image from the hub and tag it to point to your registry: docker pull ubuntu && docker tag ubuntu localhost:5000/ubuntu … then push it to your registry: docker push localhost:5000/ubuntu …… Read More »

EdgeMAX – Automatic WAN Failover

Overview Readers will learn how to enable WAN failover on the EdgeRouter. EdgeMAX can handle multiple WANs with failover. For a more recent article that shows this implementation with automatic failover, visit here. My interface setup is as follows: eth0 – WAN – IP: / Gateway eth1 – LAN – IP: eth2… Read More »

A tcpdump Primer with Examples

A tcpdump Primer with Examples   tcpdump is the premier network analysis tool for information securityprofessionals. Having a solid grasp of this über-powerful application is mandatory for anyone desiring a thorough understanding of TCP/IP. Many prefer to use higher level analysis tools such as EtherealWireshark, but I believe this to usually be a mistake. In… Read More »

AWS public ip pool   Syntax The syntax of ip-ranges.json is as follows. { “syncToken”: “0123456789”, “createDate”: “yyyy-mm-dd-hh-mm-ss”, “prefixes”: [ { “ip_prefix”: “cidr”, “region”: “region”, “service”: “subset” } ] } syncToken The publication time, in Unix epoch time format. Type: String Example: “syncToken”: “1416435608” createDate The publication date and time. Type: String Example: “createDate”: “2014-11-19-23-29-02” prefixes The IP… Read More »