Linux Commands Cheat Sheet

Do you want to learn the Linux commands? If yes, then you are in the right place. There are uncountable commands in Linux. Generally, we use some of the Linux commands from the Linux commands cheat sheet regularly to perform the common tasks. Basic Linux Commands File Permission Commands Environment Variables Command User Management Commands … Read more

How to get the docker container ip ?

The metadata information from the docker containers can be extracted using the docker inspect command. We see the demonstration as follows: The docker engine api is based around the golang templates and the commands use extensive formatting around the json function definitions. [vamshi@node01 ~]$ docker inspect <container-name | container-id> -f ‘{{ .NetworkSettings.IPAddress }}’ [vamshi@node01 … Read more

RBACs in kubernetes

The kubernetes provides a Role based Access controls as a immediate mechanism as a security measure. The roles are the grouping of PolicyRules and the capabilities and limitations within a namespace. The Identities (or) Subjects are the users/ServiceAccounts which are assigned Roles which constitute a RBACs. This process is acheived by referencing a role from … Read more

Generate SSL certificates using openssl

Generate SSL certificates using openssl with a Certificate Signing Request and signing it by a Certificate Authority. The file and are the Certificate Authority We will be genrating the and (Certificate Signing Request) files from the below command. [root@node01 ssl]# openssl req -new -sha256 -newkey rsa:2048 -nodes -keyout -days 365 -out -sha256 -subj … Read more

Mounting the external volumes to jenkins docker container

Creating a docker volume To use the external volume for our future container, we need to format a filesystem on the volume. We use the ext4 filesystem to format our block device, we will demonstrate that as follows: vamshi@node03:~$ sudo mkfs.ext4 /dev/sdb mke2fs 1.43.4 (31-Jan-2017) Discarding device blocks: done Creating filesystem with 524288 4k blocks … Read more

Create a user and Grant privileges in mysql database

mysql database user creation The user creation process in mysql is one of the most important steps in Database administration. Below we will list some of the Important terms of Authentication, Authorization with practical demonstration. The process of gaining access to the database engine with an active login credentials and a login request from a … Read more

Initiating a docker swarm and getting the current docker swarm token

Creating a docker swarm cluster: The docker swarm can be created by using the following command: The syntax is defined as follows: docker swarm init –advertise-addr [available interface IP adress] The –advertise-addr is used to explicitly define the docker swarm advertise ip. If you have a single interface this option will not be needed but … Read more

Docker Networking basics and the types of networks

The docker networking comprises of a overlay network and enabled communication with the outside resources using it. There are following main types of built in connectivity networking drivers namely the , , , and the with no network. The docker container networking Model CNM architecture manages the networking for Docker container. IPAM which stands for … Read more