Henrik's thoughts on life in IT, data and information management, cloud computing, cognitive computing, covering IBM Db2, IBM Cloud, Watson, Amazon Web Services, Microsoft Azure and more.
Tuesday, May 9, 2023
Decode JWTs in bash
Tuesday, June 7, 2022
Use event subscriptions for scheduled scale up and down of your IBM Cloud Code Engine apps
![]() |
Few lines of scripting |
I heard that built-in support is on the roadmap. For now, I am using a Code Engine cron subscription for the job...
Thursday, June 2, 2022
Create a REST API with OpenAPI spec for your database objects
![]() |
Swagger UI for my events API |
Monday, May 16, 2022
Containerize your Db2 Python app
![]() |
De-containerizing my stuff |
Tuesday, May 10, 2022
Some fun with traefik routing on the edge of a reverse proxy
![]() |
Path-based routing with Traefik |
In a recent blog post, I mentioned that I use the traefik edge router / reverse proxy to put a custom domain in front of my IBM Cloud Code Engine apps. Today, I want to share details on how I configured path-based routing, i.e., depending on the path in the URI a different Code Engine app serves the request. The use case is to implement a microservices-based solution architecture with multiple backend services reachable over a single host name (on a custom domain).
Thursday, May 5, 2022
Custom domain for your serverless Code Engine app
![]() |
Output of a IBM Cloud Code Engine app |
Thursday, March 24, 2022
Blue-green deployment with IBM Cloud Code Engine and Knative
![]() |
Code Engine app with green revision |
Thursday, August 1, 2019
Use a Delivery Pipeline to rotate credentials
![]() |
Job in Delivery Pipeline to rotate keys |
Monday, March 25, 2019
Running Db2 Developer-C as Docker container
![]() |
Container: Db2 the easy way |
Db2 Developer-C Edition as Docker Image
IBM provides a free Db2 edition, Db2 Developer-C Edition. It can be installed and used as Docker container, see here the Db2 Developer-C Edition in the Docker store. Once you have added it to your basket and checked out, you can download it and get information about how to configure it. Basically, only few values need to be set in an environment file (see db2_env_list below).After adapting the environment file, I invoke the script (with a single command) to run Db2 on docker. If not downloaded yet, it obtains the container image, starts it, sets it up:
docker run -h db2server_ --name db2server --detach \
--privileged=true \
-p 50000:50000 -p 55000:55000 \
--env-file db2_env_list \
-v /home/hloeser/progs/db2:/database \
store/ibmcorp/db2_developer_c:11.1.4.4-x86_64
Thereafter, I can connect to Db2 using the usual tools and SDKs.
If you have feedback, suggestions, or questions about this post, please reach out to me on Twitter (@data_henrik) or LinkedIn.
Thursday, October 11, 2018
Use a custom domain, manage TLS certificates and apply e2e security to cloud app
![]() |
End to end security for a cloud app on IBM Cloud |
Wednesday, October 10, 2018
BYOK to encrypt Kubernetes secrets on IBM Cloud
![]() |
Add Key Protect |
Friday, September 14, 2018
Tutorial on how to apply end to end security to a cloud application
Did you ever wonder how different security services work together to secure a cloud application? In the new tutorial we use
- IBM Cloud Activity Tracker to log all security-related events. This includes logging in to the account, provisioning or deleting services, working with encryption keys and more.
- IBM Cloud Key Protect to manage encryption keys. For the tutorial, we generate a root key for envelope encryption of stored files. You could also import your own root key (bring your own key, BYOK). We use the root key to create encrypted buckets in the IBM Cloud Object Storage service.
- IBM Cloud Object Storage (COS) service to produce expiring links to individual files. The links can be shared with others and expire after the set amount of time, so that the file cannot be accessed thereafter.
- IBM Cloud App ID as a wrapper around (enterprise and social) Identity Providers to manage authentication and authorization through a single interface. The App ID service can be directly integrated with Kubernetes Ingress.
- IBM Cloud Container Registry as a private image registry from which we deploy the application as container into a Kubernetes cluster (IBM Cloud Kubernetes Service). The container registry includes a Vulnerability Advisors that scans for and assesses container vulnerability and then recommends fixes.
If you have feedback, suggestions, or questions about this post, please reach out to me on Twitter (@data_henrik) or LinkedIn.