Docker compose pokes holes in Firewalls
Docker port forwarding uses iptables which can override your firewall rules, specify a host ip to limit access.
more ...Docker port forwarding uses iptables which can override your firewall rules, specify a host ip to limit access.
more ...I use gpg to sign my git tags and recently I had an issue where signing failed. Something like:
$ git tag -m "1.5.0" v1.5.0 error: gpg failed to sign the data error: unable to sign the tag
And after some debugging I discovered that my subkeys …
more ...I have a small django project that I develop on both linux and mac. I deploy this project using the alpine version of the python docker image.
Originally, I had installed the psycopg2-binary package on my mac for local development, but once started to package up the app, I …
I have a personal project that I have been working on for about a year now. It is a pretty basic project with a Django backend and a SvelteKit based frontend. I deploy it to a VPS using docker images and traefik as reverse proxy.
Recently as feature …
I recently connected to a remote machines and found a disk space warning.
In order to diagnose the cause of the disk space issue, I used a neat tool called ncdu (NCurses Disk Usage).
sudo ncdu /
Using the excellent interface, I was able to trace the issue to …
Follow instructions on the previous post or the step readme
Create required root and SSH signing keys:
$ step ca init --ssh ✔ What would you like to name your new PKI? (e.g. Smallstep): Whatsdoom ✔ What DNS names or IP addresses would you like to add to your new …
Recently, I read a comment on Hacker News about someone who had created their own private mesh network between their Virtual private servers (VPS).
I decided to try and replicate this myself across three of my VPS instances.
All three of my instances are running Ubuntu 18.04 …
Before you begin, it would probably be a good idea to have three flash drives and a Yubikey.
SSH public keys can be added to ~/.ssh/authorized_keys on a typical system to allow the holder of the private key to access the system. Sometimes however you might want to restrict the access a particular key has.
In my case, I wanted my CI system to be able to …
more ...