How to Use Your Own Registry

One of the things that makes the Docker Platform so powerful is how easy it is to use images from a central location. Docker Hub is the premier Image Repository with thousands of Official Images ready for use. It’s also just as easy to push your own images to the Docker Hub registry so that everyone can benefit from your Dockerized applications.

But in certain scenarios, you might not want to push your images outside of your firewall. In this case you can set up a local registry using the open source software project Distribution. In this article we’ll take a look at setting up and configuring a local instance of the Distribution project where your teams can share images with docker commands they already know: docker push and docker pull.

Prerequisites

To complete this tutorial, you will need the following:

Running the Distribution service

The Distribution project has been packaged as an Official Image on Docker Hub. To run a version locally, execute the following command:

$ docker run -d -p 5000:5000 --name Continue reading

Network Break 322: Juniper Mist-ifes 128 Technology; US Telcos Spend Big For 5G Spectrum

On today's Network Break we discuss a slate of Juniper announcements around new integrations with its Mist platform, plus new switches. HPE acquires a SaaS company for controlling cloud and infrastructure costs, US telcos spend $81 billion on spectrum for 5G, and we dive into the latest round of financial results from SolarWinds, VMware, and Nutanix.

The post Network Break 322: Juniper Mist-ifes 128 Technology; US Telcos Spend Big For 5G Spectrum appeared first on Packet Pushers.

DDoS Mitigation with Juniper, sFlow, and BGP Flowspec

Real-time DDoS mitigation using BGP RTBH and FlowSpec, DDoS protection of local address space, Pushing BGP Flowspec rules to multiple routersMonitoring DDoS mitigation, and Docker DDoS testbed demonstrate how sFlow and BGP Flowspec are combined by the DDoS Protect application running on the sFlow-RT real-time analytics engine to automatically detect and block DDoS attacks.

This article discusses how to deploy the DDoS Protect application in a Juniper Networks environment. Juniper has a long history of supporting BGP Flowspec on their routing platforms and Juniper has added support for sFlow to their entire product range, see sFlow available on Juniper MX series routers.

First, Junos doesn't provide a way to connect to the non-standard BGP port (1179) that sFlow-RT uses by default. Allowing sFlow-RT to open the standard BGP port (179) requires that the service be given additional Linux capabilities. 

docker run --rm --net=host --sysctl net.ipv4.ip_unprivileged_port_start=0 \
sflow/ddos-protect -Dbgp.port=179

The above command launches the prebuilt sflow/ddos-protect Docker image. Alternatively, if sFlow-RT has been installed as a deb / rpm package, then the required permissions can be added to the service.

sudo systemctl edit sflow-rt.service
Type the above command to edit the Continue reading

Tech Bytes: Law Firm Relies On Aruba EdgeConnect To Support Work-From-Anywhere (Sponsored)

On today's Tech Bytes podcast, sponsored by Aruba, we talk with Scott Shaw, Chief Technology Officer at law firm FordHarrison about his SD-WAN deployment. Shaw was able to retire legacy routers, boost performance of critical applications, and enable the law firm's work-from-anywhere strategy.

The post Tech Bytes: Law Firm Relies On Aruba EdgeConnect To Support Work-From-Anywhere (Sponsored) appeared first on Packet Pushers.

The Week in Internet News: Cambodia Creates Its Own Great Firewall

Traffic cops: The government of Cambodia has moved to establish a national Internet gateway with a single point of entry for traffic into the country, regulated by a government-appointed operator, The Diplomat reports. The Washington Post’s editorial board said the move “strikes at one of the nation’s last vestiges of democratic life.” The move also points to a larger threat to “the entire globe,” led by censorship efforts in China, the editorial board wrote. “China wishes to establish a freedom-crushing model of cyber-sovereignty by which every country sets its own rules for a Web that serves those in power, rather than the people, without any regard for civil liberties or due process of law.”

A deal on the news: Facebook had prohibited Australian users from sharing news on the social media site because of a proposal that would require it and other online services to pay news outlets, but the company has reached a deal with the government there that again allows users to post news articles, the New York Times reports. The deal allows more time for negotiations, but the Australian Senate passed the law anyway, CNet reports.

Help with the bills: The U.S. Federal Communications Continue reading

The Teams Dashboard: Behind the Scenes

The Teams Dashboard: Behind the Scenes
The Teams Dashboard: Behind the Scenes

Back in 2010, Cloudflare was introduced at TechCrunch Disrupt as a security and performance solution that took the tools of the biggest service providers and made them available to anyone online. But simply replicating these tools wasn’t enough — we needed to make them ridiculously easy to use.

When we launched Cloudflare for Teams almost ten years later, the vision was very much the same — build a secure and powerful Zero Trust solution that is ridiculously easy to use. However, while we talk about what we’re building with a regular cadence, we often gloss over how we are designing Cloudflare for Teams to make it simple and easy to use.

In this blog post we’ll do just that — if that sounds like your jam, keep scrolling.

Building a house

First, let's back up a bit and introduce Cloudflare for Teams.

We launched Cloudflare for Teams in January, 2020. With Teams, we wanted to alleviate the burden Cloudflare customers were feeling when trying to protect themselves and their infrastructure from threats online. We knew that continuing to rely on expensive hardware would be difficult to maintain and impractical to scale.

At its core, Teams joins two products together — Continue reading

IBM brings Red Hat to Power Systems

IBM has introduced Red Hat Linux on its RISC-based Power Systems servers, further expanding IBM's private- and hybrid-cloud offerings on the traditionally Unix-based hardware.IBM already has what it calls Enterprise Linux on Power, but this is bringing Red Hat, which IBM paid $34 billion to acquire, to its big iron. IBM Power Systems now feature Red Hat OpenShift on IBM Power Virtual Server leveraging OpenShift's bare metal installer, Red Hat Runtimes, and newly certified Red Hat Ansible Content Collections.Red Hat OpenShift on IBM Power Virtual Server is a move to bring the OpenShift container platform to IBM Power Virtual Server. The IBM Power Virtual Server is an enterprise infrastructure-as-a-service offering built around IBM POWER9 and offering access to more than 200 IBM Cloud services. In addition, IBM Power Virtual Server clients can now run business applications like SAP HANA in an IBM POWER9-based cloud.To read this article in full, please click here

Creating and merging PDFs on Linux

There are a number of ways that you can create PDFs on a Linux system. You can use an application like LibreOffice or OpenOffice, or you can take advantage of any of a number of commands that can generate PDFs from text files or from a group of other file formats. There are also a number of ways that you can merge a group of PDFs into a single PDF file.Why PDFs? PDF is often the preferred format for files that you need to share with others or archive. This is because PDF is an open file format, which makes sharing these files between diverse systems and devices possible.Using LibreOffice or OpenOffice Both LibreOffice and OpenOffice can export files as PDFs. You can open an existing document or create a new document and export it as a PDF. OpenOffice's Export as PDF… and LibreOffice's Export As => Export as PDF… will do what is required to convert your file.To read this article in full, please click here

Creating and merging PDFs on Linux

There are a number of ways that you can create PDFs on a Linux system. You can use an application like LibreOffice or OpenOffice, or you can take advantage of any of a number of commands that can generate PDFs from text files or from a group of other file formats. There are also a number of ways that you can merge a group of PDFs into a single PDF file.Why PDFs? PDF is often the preferred format for files that you need to share with others or archive. This is because PDF is an open file format, which makes sharing these files between diverse systems and devices possible.Using LibreOffice or OpenOffice Both LibreOffice and OpenOffice can export files as PDFs. You can open an existing document or create a new document and export it as a PDF. OpenOffice's Export as PDF… and LibreOffice's Export As => Export as PDF… will do what is required to convert your file.To read this article in full, please click here

IBM brings Red Hat to Power systems

IBM has introduced Red Hat Linux on its RISC-based Power systems, further expanding IBM's private- and hybrid-cloud offerings on the traditionally Unix-based hardware.IBM already has what it calls Enterprise Linux on Power, but this is bringing Red Hat, which IBM paid $34 billion to acquire, to its big iron. IBM Power systems now feature Red Hat OpenShift on IBM Power Virtual Server leveraging OpenShift's bare metal installer, Red Hat Runtimes, and newly certified Red Hat Ansible Content Collections.Red Hat OpenShift on IBM Power Virtual Server is a move to bring the OpenShift container platform to IBM Power Virtual Server. The IBM Power Virtual Server is an enterprise infrastructure-as-a-service offering built around IBM POWER9 and offering access to more than 200 IBM Cloud services. In addition, IBM Power Virtual Server clients can now run business applications like SAP HANA in an IBM POWER9-based cloud.To read this article in full, please click here

Rant: Cisco ACI Complexity

A while ago Antti Leimio wrote a long twitter thread describing his frustrations with Cisco ACI object model. I asked him for permission to repost the whole thread as those things tend to get lost, and he graciously allowed me to do it, so here we go.


I took a 5 days Cisco DCACI course. This is all new to me. I’m confused. Who is ACI for? Capabilities and completeness of features is fantastic but how to manage this complex system?