article thumbnail

Ansible Roles Explained | Cheat Sheet

Linux Academy

It can also be handy as you are constructing your role but use of it is not mandatory. Most of the hard work was completed when we constructed the role itself. Deployment of the role, by comparison, is easy. The post Ansible Roles Explained | Cheat Sheet appeared first on Linux Academy. Deploying the role.

article thumbnail

Technology Short Take 138

Scott Lowe

Here’s Chip Zoller’s comparison of Gatekeper and Kyverno. Via TecMint, James Kiarie explains how to use VirtualBox VMs on KVM in Linux. As always, I welcome all constructive feedback and I love hearing from readers, so feel free to reach out to me on Twitter. William Lam shares a few Kubernetes tips and tricks.

IPv6 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 131

Scott Lowe

Here’s a review of targeted attacks and APTs (advanced persistent threats) on Linux. The article doesn’t go deep on any of them, but does provide some useful information and comparison of the various mechanisms. More details are found in this article. Cloud Computing/Cloud Management. Hint: no technology is perfect.).

Linux 60
article thumbnail

Ansible Roles Explained | Cheat Sheet

Linux Academy

It can also be handy as you are constructing your role but use of it is not mandatory. Most of the hard work was completed when we constructed the role itself. Deployment of the role, by comparison, is easy. The post Ansible Roles Explained | Cheat Sheet appeared first on Linux Academy Blog. Deploying the role.

article thumbnail

Ansible Roles Explained | Cheat Sheet

Linux Academy

It can also be handy as you are constructing your role but use of it is not mandatory. Most of the hard work was completed when we constructed the role itself. Deployment of the role, by comparison, is easy. The post Ansible Roles Explained | Cheat Sheet appeared first on Linux Academy. Deploying the role.

article thumbnail

Technology Short Take #50

Scott Lowe

Kevin Houston’s March 2015 blade server comparisons might be a useful place to start. It’s important to note that these security enhancements don’t really represent “net new” functionality but rather reflect existing Linux security constructs now being exposed and usable by Docker.

Vmware 60
article thumbnail

Thinking Out Loud: The Future of Kubernetes

Scott Lowe

Are there use cases where these constructs are useful? Or are these constructs simply a refining of what Kubernetes was always intended to do? One could make some OpenStack comparisons here (I have a separate post brewing on the future of OpenStack), but I’m not sure such a comparison would be valid. Yes, certainly.