• 0 Posts
  • 45 Comments
Joined 1 year ago
cake
Cake day: June 28th, 2023

help-circle





  • Nachvollziehbar. Ich hab mich vor etwas mehr als nem Jahr in ner Kurve mit nem Roller (45ccm) hingelegt. Schön übern Lenker abgestiegen. Schulter gebrochen, Daumen ausgekugelt, Sehnenriss am Daumen, mehrere Schürfwunden. Der Helm war innen blutverschmiert.

    Ich wollte aufstehen und weiter ins Büro laufen. Die Ersthelfer haben das dann verhindert. Aber wenn man derbe unter Schock steht setzen Automatismen ein, die völlig irrational sein können.




  • There are some.

    The Death Planet ih the new trilogy destroyed the exact same way as Luke destroyed the Death Star.

    The fact that they realized that “parsec” is a length unit, and they came up with a total bullshit explanation for “doing the Kessel run in 12 parsec”.

    Nearly every maintenance infrastructure built like a giant death trap. The reactor room where Maul killed Qui-Gon, the scene where Luke realizes that Vader is his father, and so on.



  • I mostly know what they do for a living. I am not really sure how old they are or what are their birthdays. But it simply isnt relevant.

    I had my bachelor’s party weekend last weekend, and my best man rented an airbnb. We were 9 guys and some of them did not know each other before. Doesnt matter, we had beer and a great time. I think, such details really dont matter, if not for small talk.










  • Indeed. Sure, they have these features, but only if used correctly while introducing vast more complexity (especially when being executed in a k8s environment,but also executed in plain docker). But, you know what also has security when used correctly? Plain linux.

    What about 90% of all images on docker hub executing their main payload as root? What about many images bundling unnecessary software like an init system? What about the fact that even if you rm something in a dockerfile, it is still present, if you execute the rm in a different RUN command? What about every user in the docker group being implicit root on the host since they simply can mount the host’s / inside their container? What about the reusing of layers between images like it is even intended?

    Doesnt sound like a security tool, does it? Sure, it feels a bit like one, but it was never intended to be one, but a dependency and environment bundling tool which happens to use certain linux APIs which can be used for security. But it wraps lots of abstraction around it.

    If you want to use these features for security, access them manually. But, OP said they are kind of a noob. Telling them to just use containers is dangerous and leads to false assumptions.

    Source: i work as a cloud/container/devops/k8s expert for over 5 years.