Linux

A collection of 34 posts

DevOps

Securing the remote Docker instance

Now that we've made our Docker instance accessible from a remote machine [https://www.frakkingsweet.com/remote-docker-instance/], we need to secure it. The way that Docker does authentication is by using certificates. The user is allowed access to the Docker instance if the certificate supplied is issued by the specified certificate authority. The authorizing certificate authority is specified in the docker startup command. In one of my previous posts [https://www.frakkingsweet.com/remote-dock

DevOps

Remote Docker Instance

I'm building a multi node Docker Swarm cluster and want to connect to it from my local desktop. I'd like to use my local development tools to build all of my Docker related files and push them up to the cluster. Note, this is an unauthenticated, full access, http (not https) configuration. It is to show a remote setup. I'm starting simple. The next post will be about securing this config. First my setup: * 3 docker nodes, docker1.example.com, docker2.example.com and docker3.example.com.