Author Archives: dave wilson


Follow these instructions to generate a certificate signing request (CSR) for your Apache Web server. When you have completed generating your CSR, cut/copy and paste it into the CSR field on the SSL certificate-request page. To Generate a Certificate Signing Request for Apache 2.x Log in to your server’s terminal (SSH). At the prompt, type… Read More »

AWS resize root partition on HVM (specially centos)

Here the step by step instructions 1. Launch another instance using same AMI to do work on in same AZ as instance with device we want to resize. 2. Shut down instance with device we want to resize 3. Detach device and attach to new instance. 4. sudo parted /dev/xvdf (run parted with the device….NOT… Read More »

How To Create a New User and Grant Permissions in MySQL

How to Create a New User Let’s start by making a new user within the MySQL shell: CREATE USER ‘newuser’@’localhost’ IDENTIFIED BY ‘password’; Sadly, at this point newuser has no permissions to do anything with the databases. In fact, if newuser even tries to login (with the password, password), they will not be able to… Read More »

AWS convert root instance store to EBS backed root

recently needed to convert an AWS instance-store AMI to an EBS backed AMI. Here’s the steps I took in order to fix that. It’s a ext3 file system in this example, but it should work fine with an ext4 as well. Launch your instance-store AMI Create a new EBS in the same availability zone Attach… Read More »

OVH setup failover ips

Explanation You can configure your Virtual Machine in bridge mode. Some changes must be made on the VM to make a working network configuration. In blue are the file names to edit (with vi, nano, pico …) and the content. The configurations, the fields should be replaced, they will be in red. Requirements A dedicated… Read More »

AWS – Private Registry Authentication

The Amazon ECS container agent can authenticate with private registries, including Docker Hub, using basic authentication. When you enable private registry authentication, you can use private Docker images in your task definitions. The agent looks for two environment variables when it launches: ECS_ENGINE_AUTH_TYPE, which specifies the type of authentication data that is being sent, and… Read More »

Docker Registry

Docker Registry What it is The Registry is a stateless, highly scalable server side application that stores and lets you distribute Docker images. The Registry is open-source, under the permissiveApache license. Why use it You should use the Registry if you want to: tightly control where your images are being stored fully own your images… Read More »

Docker Understanding the Registry

Understanding the Registry A registry is a storage and content delivery system, holding named Docker images, available in different tagged versions. Example: the image distribution/registry, with tags 2.0 and 2.1. Users interact with a registry by using docker push and pull commands. Example: docker pull Storage itself is delegated to drivers. The default storage… Read More »

docker Authenticating proxy with nginx

Authenticating proxy with nginx With this method, you implement basic authentication in a reverse proxy that sits in front of your registry. While this model gives you the ability to use whatever authentication backend you want through a secondary authentication mechanism implemented inside your proxy, it also requires that you move TLS termination from the… Read More »

Deploying a registry server

Running on localhost Start your registry: docker run -d -p 5000:5000 –restart=always –name registry registry:2 You can now use it with docker. Get any image from the hub and tag it to point to your registry: docker pull ubuntu && docker tag ubuntu localhost:5000/ubuntu … then push it to your registry: docker push localhost:5000/ubuntu …… Read More »