As you probably discovered, the February 2020 security update had a significant impact on NAV/Business Central Docker Containers. Especially if you were running Process isolation. Most visible problem was the fact that you couldn’t launch 32bit executables in containers after applying the security update.
As you might have figured in quite some sessions, threads and posts, I’m quite fond running docker images on a remote Hyper-V on my laptop. From the moment it was described by Arend Jan, I’m using it. In my opinion, it’s a much better way to run, because Windows Server is so much better in memory management as Windows 10 is (in regards of Docker that is).
As we use Docker containers internally to quickly spin up environments for reproducing bugs, delivering fixes on older releases or quickly test our application, we needed a way to easily grant access to a specific Active Directory user group. When starting a container, we want the following actions to be taken:
Today, I was prepping for my 2-day Masterclass about developing Extensions in Visual Studio Code. And finally, I made some time to make a first version of a function that I have been wanting for quite some time: a function to remove all the custom apps from a docker image.