Introduction

Using containers has become a major part of a lot of companies infrastructure. Docker is the most common and pretty much the de facto standard. The Docker hub has over 100,000 images available for download. It is frequently a part of a CI/CD pipeline. While there are lots of good business reasons for implementing containers, I’ve found that it’s a great way to test stuff on my home network as well. Run a couple of commands and a new software package is up and running. It doesn’t meet my needs? No problem. Shut it down, delete the image and it’s gone. No leftover config files, no garbage left in a temp folder, no unused libraries strewn across my system. What about if I want to test that beta software but don’t want to touch the current version I’m using. No problem.

One of the other awesome things about containers is that they run almost anywhere. Windows Server/Desktop, MacOS, Linux and many more OS flavors. They can run on all kinds of hardware…even single board computers like the Raspberry Pi.

I haven’t used containers with SQL Server yet, but I’m sure I will soon. This month’s T-SQL Tuesday asks what we’re doing with containers, whether it’s with SQL or not. Here’s some “not SQL” images that I’ve used, planning on using or just find interesting.

My Favorite Docker Images

Gogs

Gogs is a self hosted, open source Git service. If your company doesn’t allow use of public services like Github, no problem. Set up your own git service in house, on your own servers. It’s lightweight enough to run on a Raspberry Pi.

If you just want a second, local copy of your repository, that works too.

Image available here

Jellyfin

Jellyfin enables you to collect, manage, and stream your media. Run the Jellyfin server on your system and gain access to the leading free-software entertainment system, bells and whistles included. Jellyfin lets you watch your media from a web browser on your computer, apps on your Roku, Android, iOS (including AirPlay), Android TV, or Fire TV device, or via your Chromecast or existing Kodi installation.

Image available here

Monica

Can you remember the names of the children of all your friends? Can you remember the wedding anniversary of your brother? Can you tell the last time you called your grand mother and what you talked about?

Monica lets you quickly and easily log all those bits of information so you can be a better friend, family member or spouse. A personal CRM to manage all the information that revolves around the people in your life.

If you don’t want to host it yourself, Monica offers an unlimited contact hosted plan. Check out their site for details.

Image available here

pi-hole

Pi-hole is an open source project that sits on your network and blocks ads. Install it and tell your systems to use it as your DNS server and you’re in business. It is an actively supported community project. White/Black lists maintained by the community are available. Lots of documentation. Lots of add on projects to extend functionality.

If you combine it with a vpn you can point your mobile devices to it as well and block ads on the go.

Image available here

Shiori

If you would like to keep your bookmarks to yourself and not share them with the creator of your browser, then this is a tool worth taking a look at. A simple, elegant way to manage your bookmarks regardless of which browser you’re using. Easy to navigate. Easy to manage. It

Image available here

Owncloud

The name pretty much sums this one up. It is a self-hosted cloud. Your “own” cloud. With a container, it’s a snap to get your personal cloud up and running. Easily add or remove files, users and permissions. It has a plug-in for Outlook. There are iOS and Android apps as well as web and desktop versions.

Even if you use commercial cloud options, Owncloud can make a great in-house collaboration product or intranet.

Image available here

Tor

If you are concerned with privacy on the web, Tor is worth taking a look at. Tor is primarily known for it’s anonymous browser. Sometimes it gets mentioned alongside the darker side of the internet. While there are those that use it to hide nefarious purposes, the majority of people just don’t want their privacy. Tor Browser isolates each website you visit so third-party trackers and ads can’t follow you. Your traffic is relayed and encrypted three times as it passes over the Tor network.

The other part of Tor that isn’t mentioned as much, is the network run by volunteers. The anonymity is possible due people hosting Tor relays on their network and donating bandwidth.

If you want to use Tor, go download the browser and you can be on your way. To run a relay and contribute to the Tor network, you can easily get started with the docker image available here

Conclusion

Thanks to Anthony Nocentino for hosting this months invitation. Thanks to T-SQL Tuesday.

Be sure to follow the #tsql2sday hashtag on twitter.

Learn. Grow. Improve.

Thanks for reading.