Technology Short Take #86
Scott Lowe
AUGUST 26, 2017
RedLock shares some guidelines around AWS access key deletion (in the event that an access key gets compromised). Operating Systems/Applications. Jeff Geerling—author of Ansible for DevOps —has a post on how various Ansible configuration files may conflict with one another. Servers/Hardware. Virtualization.
Let's personalize your content