Background This blog series is focused on programmers, systems administrators, and application administrators that want to run Docker in production. The subject matter ranges from workflow and practical guidelines to security and best practices in manageability. A Practical Introduction to Docker Containers A Practical Introduction to the Docker Registry Server Core Builds in the
Tag: Tutorials
A Practical Introduction to the Docker Registry Server
Background One of the key advantages of using Docker is it’s centralized image management server, called a Registry Server. The Docker project, as well as Red Hat, maintain public registry servers which host supported images. The Docker project also provides an Open Source version of the Registry server which can be deployed on premise in
Continue Reading “A Practical Introduction to the Docker Registry Server”
A Practical Introduction to Docker Containers
Background Why Docker has quite an amount of buzz around it today because it makes so many things easy that were difficult with virtual machines. Docker containers makes it easy for Developers, Systems Administrators, Architects, Consultants and others to quickly test a piece of software in a container; much quicker than a virtual machine, and
Continue Reading “A Practical Introduction to Docker Containers”
Learning Django with OpenShift
Background The goal of this article is use the OpenShift Platform as a Service (PaaS) as a learning platform for Django. Most of the technical articles out there about running Django on OpenShift assume the user already understands how to administer Django environments and projects. This article is written from the perspective of someone who
Red Hat Enterprise Virtualization (RHEV) & Identity, Policy, Audit (IPA)
Background In my ever evolving lab, it came time to integrate Red Hat Enterprise Linux (RHEV) with Identity, Policy, Audit (IPA).There were a few caveats and searching Google didn’t help, so hopefully this article can save you some time. Integrating the two was fairly straitforward. The biggest challenge was finding a quick and easy way
Continue Reading “Red Hat Enterprise Virtualization (RHEV) & Identity, Policy, Audit (IPA)”
KVM Virtualization 201
Background In my original post KVM Virtualization 101 and my second post KVM Virtualization 102, I explained some basic commands that are necessary to get on using KVM and some features for tuning KVM. In this article I move on to some of the more advanced problems when converting existing Linux machines from a
KVM Virtualization 102
Background In my original post KVM Virtualization 101 I explained some basic commands that are necessary to get on using KVM. In this article I move on to some slightly more obscure topics in using KVM. Routine Operations CPU Type When you are operating in a KVM virtual machine the processor will report
Bootstrapping and Rooting Documentation: Part3
Background In Part 1, I described a method of documentation where the introduction of the system is made using the documentation. This builds consensus, enculturates an operations group, and provides a platform unto which more automation can be built. In Part 2, I elaborated on the ideas of Bootstrapping & Rooting, Self Service Culture, and
Continue Reading “Bootstrapping and Rooting Documentation: Part3”
KVM Virtualization 101
Background For those of you who are familiar with virtualization, KVM is a hypervisor which is built into the Linux Kernel. This allows a Linux desktop or server to simulate multiple pieces of hardware, which can then have different operating systems installed. KVM uses the QEMU virtual machine format. QEMU may be familiar to those
Bootstrapping and Rooting Documentation: Part 2
Background In Bootstrapping and Rooting Documentation: Part 1, I laid out a blueprint for using documentation as the bootstrap for entry into an operations environment. In this article I will dig into the three main concepts mentioned in Part 1. In Part 3, I will demonstrate our use case for a data center of about
Continue Reading “Bootstrapping and Rooting Documentation: Part 2”
Continue Reading “Bootstrapping and Rooting Documentation: Part 2”