Skip Navigation
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)LE
Posts
6
Comments
44
Joined
2 yr. ago
  • Donwside to 2: Your VM becomes harder to move between hardware, you lose snapshotting capabilities from a copy-on-write image.

    5 is flexible, but has limitations. For example you wouldn't want to run databases on NFS volumes.

    If initialization time is the only problem with 4, you could create several smaller images on the disk. Create the first one, initialize the VM and set up an LVM volume on it, then start creating more volumes and extend the LVM volume.

  • Music @lemmy.ml
    lemmyng @beehaw.org

    Dead Feathers - Full Circle (2023)

  • I've had acquaintances waste away trying to delay cancer death. Hospice is not fun, so I'd rather go out on my own terms.

    Plus, any kind of money making scheme I'd think of is likely going to end up like the "aim for the bushes" scene in The Other Guys.

  • DevOps @programming.dev
    lemmyng @beehaw.org

    The OpenTF project has officially opened up their repositories!

    Sysadmin @lemmy.ml
    lemmyng @beehaw.org

    Monitoring is a Pain - And we're all doing it wrong (including me)

    matduggan.com Monitoring is a Pain

    And we're all doing it wrong (including me) I have a confession. Despite having been hired multiple times in part due to my experience with monitoring platforms, I have come to hate monitoring. Monitoring and observability tools commit the cardinal sin of tricking people into thinking this is an ea...

    Monitoring and observability tools commit the cardinal sin of tricking people into thinking monitoring is an easy problem. It is very simple to monitor a small application or service. Almost none of those approaches scale.

    Kubernetes @programming.dev
    lemmyng @beehaw.org

    Stronger Supply Chain Security Coming to Argo

    In March 2023, Argo CD completed a refactor of the release process in order to provide a SLSA Level 3 provenance for container images and CLI binaries. The CNCF also commissioned a security audit of Argo CD which was conducted by ChainGuard. The audit found that Argo CD achieved SLSA Level 3 v0.1 across the source, build, and provenance sections.

    The Argo Project will next rollout attestations to Argo Rollouts, then follow with the remaining projects. SLSA has recently announced the SLSA Version 1.0 specifications, which Argo plans to embrace.

    Kubernetes @lemmy.ml
    lemmyng @beehaw.org

    The KBOM project provides an initial specification in JSON and has been constructed for extensibilty across various cloud service providers (CSPs) as well as DIY Kubernetes.

    Sysadmin @lemmy.world
    lemmyng @beehaw.org

    This release brings two significant new features: a config-driven import workflow and check blocks. Config-driven import is a new declarative workflow to add existing resources into Terraform state and solves the limitations of the existing import command. Checks are a new way to perform functional validation of provisioned infrastructure to ensure the real world matches expectations.