#Podman Container Services
Explore tagged Tumblr posts
dieterziegler159 · 1 year ago
Text
Stay ahead of the curve with Podman's advantages and drawbacks. Unlock the true potential of containers and optimize your development and deployment workflows.
1 note · View note
public-cloud-computing · 1 year ago
Text
Discover the pros and cons of Podman, the container management tool, and unleash the true power of containerization. Get insights now!
1 note · View note
Text
Gain insights into Podman's pros and cons and unlock the true potential of containerization. Make informed decisions for your infrastructure.
1 note · View note
rubylogan15 · 1 year ago
Text
Discover the pros and cons of Podman, the container management tool, and unleash the true power of containerization. Get insights now!
1 note · View note
chillywillycd-blog · 1 year ago
Text
Azure CLI via Podman (Docker)
#TIL when you're running the azure cli (az) via podman (like docker, but not run via root owned service), that the -t switch is your enemy.
-t joins the output of STDOUT and STDERR, and thus can result in the output of your command containing extra control characters, in particular this means it can contain the \r control character. this makes processing the results in a bash script EXTREMELY difficult.
the -t switch DOES clearly document this, but who reads documentation
NOTE: The --tty flag prevents redirection of standard output. It combines STDOUT and STDERR, it can insert control characters, and it can hang pipes. This option is only used when run interactively in a terminal. When feeding input to Podman, use -i only, not -it.
0 notes
shazforiot · 3 years ago
Text
Spend 15 minutes a day to improve your Docker, DevOps, Kubernetes, Ansible Skills
I am a small YouTuber and have a YouTube channel called Thetips4you(https://www.youtube.com/channel/UCoOq-DtESvayx5yJE5H6-qQ/videos) where I publish tutorial on DevOps, Docker, Kubernetes, Ansible, Git, ELK, Grafana and Prometheus weekly. My goal is to share the knowledge on the new technologies with others. Have you ever searched for a easy to understand DevOps, Docker, Kubernetes, Ansible guide? Here it is 30+ hrs Video tutorial series completely free.
I started recording videos with automated voice as I was not confident and later in the journey started recording with my own voice. I try to be clear and straight forward with practical scenarios , with out un-necessary talks and respecting your time. The content is mostly aimed at beginners and intermediate IT infra administrators and developers, I hope it can help some of you to learn something new.
I had put a lot of effort in creating this video series for beginners. It consist of basics on CICD, Containers, Kubernetes Pods, Deployments, Services, Setting up Jenkins, Docker, Podman, Minikube, Ansible, ELK, Git, most used commands, Pipeline jobs with Sonarqube quality checks, Artifactory for binary management, ansible playbooks, real use cases, deploying docker containers using ansible, how to convert your playbook in to roles, Monitoring docker containers, windows and linux servers, and more & more! .
As I'm not a professional youtuber, I'd love to hear your feedback and support
1 note · View note
screwdriver-cd · 4 years ago
Text
Latest Updates - March 2021
Jithin Emmanuel, Engineering Manager, Verizon Media Screwdriver team is pleased to announce our newest release which brings in new features and bug fixes across various components.
New Features
sd-local cli enhancements
Compatibility with podman
Make ssh agent it work with non-root user containers.
added User-Agent info on request from sd-local to API to track usage.
Template owners can lock template steps to prevent step override.
UI can be prevented from restarting specific jobs using “manualStartEnabled” annotation.
Added health check endpoint for “buildcluster-queue-worker”.
Bug Fixes
Fix for trusted templates not showing up in UI.
Launcher was not terminating the current running step on timeout or abort.
API can now start with default configuration.
Store not starting with memory strategy.
Local development setup was broken.
Compatibility List
In order to have these improvements, you will need these minimum versions:
API - v4.1.66
Queue-Service - v2.0.5
UI - v1.0.604
Store - v4.1.1
Launcher - v6.0.122
Build Cluster Worker - v2.9.0
Contributors
Thanks to the following contributors for making this feature possible:
Alan
Jithin
Ibuki
Kazuyuki
Kenta
Keisuke 
Kevin
Lakshminarasimhan
Naoaki
Pritam
Tiffany
Yoshiyuki 
Questions and Suggestions
We’d love to hear from you. If you have any questions, please feel free to reach out here. You can also visit us on Github and Slack.
1 note · View note
neetable · 2 years ago
Text
ADVANTAGES OF CONTAINERIZATION IN IT BUSINESS
What is containerization? 
Tumblr media
Containerization has emerged as a significant trend in software development in replacement of virtualization. The software code been designed in a way that is encapsulated or packaged up so that it can run uniformly and consistently on any platform. Software infrastructure, as well as developers and operations teams, benefit from this rapidly maturing technology. Software can be successfully run using the containerization technique regardless of the computing environment. Software can be more successfully ported between hardware infrastructures and operating systems by being encapsulated within isolated environments known as containers. 
The concept of process isolation has been around for a while, but in 2013, when Docker introduced Docker Engine, it set a standard for container use with tools that were simple for developers to use and a standardized approach for packaging, which then accelerated the adoption of container technology. Today, developers can choose from a variety of containerization platforms and technologies that embrace the Open Container Initiative standards popularized by Docker, including Podman, Buildah, and Skopeo. 
How does containerization work? 
Containerization enables faster and more secure application development and deployment. Using   conventional techniques, code is created in a particular computing environment, and when it is transferred to another location, it frequently has faults and errors. For instance, when a programmer moves code from a desktop computer to a virtual machine (VM) or from the Linux operating system to the windows operating system. This problem is resolved by containerization, which combines the application code with the required configuration files, libraries, and dependencies. The host operating system is completely disconnected from this single software package, or "container," making it stand alone and portable able to operate faultlessly across any platform or cloud. 
Advantages of Containers 
The capacity to execute uniformly and consistently across any platform or cloud is enabled by a container, which provides a collection of application programs that are separated from the host operating system. 
 The open-source Docker Engine, which runs containers, established the industry standard for containers with its easy-to-use development tools and cross-platform packaging strategy. The Open Container Initiative is now in charge of managing the engines in the container ecosystem (OCI). For the quick development and improvement of applications, software engineers might keep employing agile or DevOps technologies and techniques. 
 A container orchestration platform makes it easier to set up, scale, and manage containerized workloads and services. Container orchestration platforms make it simpler to scale containerized programmers, release new versions of apps, provide monitoring, logging, and debugging, among other administrative tasks 
Every application that is containerized is isolated from the others and runs on its own. No other containers' ability to operate are impacted by the failure of one. Technical problems can be found and fixed by development teams in one container without affecting other containers. 
Higher speed in the delivery of enhancements. Microservices-based containerization of monolithic applications enables development teams to build functionality with independent scaling and life cycle rules. 
Programs are segregated within the containers; malicious code cannot affect one container or the host system. Additionally, security permissions can be set up to limit contacts with useless resources or to automatically stop unwanted components from entering containers. 
Containers provide the following three significant scenarios that demonstrate what organizations require to run their applications in the cloud:  
Update your current applications. 
Develop innovative enterprise cloud-native applications. 
To use cloud services, open your data center. 
0 notes
computingpostcom · 2 years ago
Text
Due to the increasing complexity of applications in infrastructure, many system admins and developers find it hard to manage the environments which may require a lot of resources and hence expensive. One solution to this challenge was the introduction of a virtualization technique known as containerization. This technology has been highly adopted in the past decade with tools such as Kubernetes, Podman, and Docker playing a significant part. Containerization is the packaging of a portable computing environment that contains everything an application needs to run, from binaries to dependencies. With this technology, virtualization occurs at the host level. This requires no virtual hardware, operating system, or virtual kernel. Podman is a containerization tool developed by RedHat to act as a drop-in replacement for Docker. This daemon-less container engine can be used to develop, manage and run OCI(Open Container Initiative) containers. It can also be used to pull container images and configure containers to run automatically on boot just like Docker. Podman is highly preferred due to the following: No daemon required: this allows for a faster startup and fewer resource requirements Compatibility with Docker, it is possible to pull images from Docker Hub or Quay.io Native systemd integration: you can create systemd unit files and run containers as system services Run containers in rootless mode: this makes it easy to run containers securely without any additional privileges Podman closely works with other tools in container management. These tools include: Skopeo: for sharing/finding container images on Docker registries, the Atomic registry, private registries, local directories, and local OCI-layout directories. Buildah: is used to facilitate the building of OCI images either from scratch or using an image as a starting point. In this guide, we will install Podman 4 on Debian 11 / Debian 10 and also use it to pull images and run containers. Step 1. Install the Required Tools Podman can be installed from the Podman repositories but the available version is Podman 3. To install Podman 4, we need to build it from a source code. Before we begin, ensure your system and the available packages are updated to the latest versions. sudo apt update && sudo apt upgrade -y You also need to install the required tools to build Podman from the source code: sudo apt install btrfs-progs git iptables libassuan-dev libbtrfs-dev libc6-dev libdevmapper-dev libglib2.0-dev libgpgme-dev libgpg-error-dev libprotobuf-dev libprotobuf-c-dev libseccomp-dev libselinux1-dev libsystemd-dev pkg-config runc uidmap make curl vim gcc -y Step 2. Install Golang To build Podman from the source code, you need Golang 1.16 and higher. This version can be installed by downloading the latest binary from the Golang release page. Alternatively, pull the file with the command: sudo -i wget https://storage.googleapis.com/golang/getgo/installer_linux Make the script executabled chmod +x ./installer_linux Now run the installer to download the latest release of Golang: ./installer_linux Persist the new environment variables to your current session: source ~/.bash_profile Verify the installation. # go version go version go1.19.1 linux/amd64 Step 3. Install runc and Conmon The Conmon module is used to monitor OCI Runtimes. It can be installed with the commands: cd ~ git clone https://github.com/containers/conmon cd conmon export GOCACHE="$(mktemp -d)" make sudo make podman cd .. Once installed, proceed and install runc which is picked as the default runtime by Podman. git clone https://github.com/opencontainers/runc.git $GOPATH/src/github.com/opencontainers/runc cd $GOPATH/src/github.com/opencontainers/runc make BUILDTAGS="selinux seccomp" cp runc /usr/bin/runc cd ~/ Verify your installation: # runc --version runc version 1.1.0+dev commit: v1.1.0-272-g4a51b047 spec: 1.0.2-dev go: go1.19 libseccomp: 2.5.1
Step 4 – Configure CNI networking plugins Create a directory to store the CNI networking plugins at /etc/containers sudo mkdir -p /etc/containers Download the config file into the directory. sudo curl -L -o /etc/containers/registries.conf https://src.fedoraproject.org/rpms/containers-common/raw/main/f/registries.conf sudo curl -L -o /etc/containers/policy.json https://src.fedoraproject.org/rpms/containers-common/raw/main/f/default-policy.json Install additional packages on Debian 11 / Debian 10 sudo apt install -y libapparmor-dev libsystemd-dev Step 5 – Install Podman 4 on Debian 11 / Debian 10 Once all the above configurations have been made, download the latest Podman source code. This can be accomplished by visiting the GitHub release page It is also possible to download the file with the commands: sudo apt install curl wget -y TAG=$(curl -s https://api.github.com/repos/containers/podman/releases/latest|grep tag_name|cut -d '"' -f 4) rm -rf podman* wget https://github.com/containers/podman/archive/refs/tags/$TAG.tar.gz Extract the downloaded file: tar xvf $TAG.tar.gz Now build and install Podman 4 from the source code using the commands: cd podman*/ make BUILDTAGS="selinux seccomp" make install PREFIX=/usr Once complete, verify the installation: $ podman version Client: Podman Engine Version: 4.2.1 API Version: 4.2.1 Go Version: go1.19.1 Built: Fri Sep 23 13:38:07 2022 OS/Arch: linux/amd64 To be able to configure network namespaces, you need to install the slirp4netns package. Download the latest release file from the GitHub Release. Alternatively, use cURL as shown cd ~/ TAG=$( curl -s https://api.github.com/repos/rootless-containers/slirp4netns/releases/latest|grep tag_name|cut -d '"' -f 4) curl -o slirp4netns --fail -L https://github.com/rootless-containers/slirp4netns/releases/download/$TAG/slirp4netns-$(uname -m) Make the file executable: chmod +x slirp4netns Copy the binary file to your $PATH: sudo cp slirp4netns /usr/local/bin Step 6 – Use Podman 4 on Debian 11 / Debian 10 Now you can use Podman to build and pull images, spin containers and manage them easily. Manage Container Images To pull an image, use the command with the syntax: podman pull For example, to pull an Nginx image from docker hub, the command will be: $ podman pull docker.io/library/nginx:latest Trying to pull docker.io/library/nginx:latest... Getting image source signatures Copying blob 7247f6e5c182 done Copying blob 7247f6e5c182 done Copying blob 7a6db449b51b done Copying blob ca1981974b58 done Copying blob d4019c921e20 done Copying blob 7cb804d746d4 done Copying blob e7a561826262 done Copying config 2b7d6430f7 done Writing manifest to image destination Storing signatures 2b7d6430f78d432f89109b29d88d4c36c868cdbf15dc31d2132ceaa02b993763 Once pulled, you can view the images with the command: $ podman images REPOSITORY TAG IMAGE ID CREATED SIZE docker.io/library/nginx latest 2b7d6430f78d 8 days ago 146 MB docker.io/library/alpine latest 9c6f07244728 3 weeks ago 5.83 MB docker.io/library/ubuntu latest df5de72bdb3b 4 weeks ago 80.4 MB You can delete a container image, say ubuntu:latest from docker hub with the command: $ podman rmi docker.io/library/ubuntu:latest Untagged: docker.io/library/ubuntu:latest Deleted: df5de72bdb3b711aba4eca685b1f42c722cc8a1837ed3fbd548a9282af2d836d Before you delete an image, you need to ensure the container using it is stopped and deleted. Build Container Images It is also possible to build your win container images. The images can be used locally or uploaded to a registry. To create a container image on Podman, you need to create a Dockerfile. vim Dockerfile In the file, you need to add the commands to be executed. For example: FROM ubuntu:20.04 RUN apt-get up date -y ENV DEBIAN_FRONTEND=noninteractive RUN apt-get install -y gnupg apt-transport-https apt-utils wget
RUN echo "deb https://notesalexp.org/tesseract-ocr5/focal/ focal main" \ |tee /etc/apt/sources.list.d/notesalexp.list > /dev/null RUN wget -O - https://notesalexp.org/debian/alexp_key.asc | apt-key add - RUN apt-get update -y RUN apt-get install tesseract-ocr -y RUN apt install imagemagick -y ENTRYPOINT ["tesseract"] RUN tesseract -v Now build a container image with the command: podman build . -t tesseract:latest The build image will have the name tesseract and tagged as latest. Once complete, check if the image is available: $ podman images REPOSITORY TAG IMAGE ID CREATED SIZE localhost/tesseract latest a98239ee7925 About a minute ago 313 MB docker.io/library/nginx latest 2b7d6430f78d 8 days ago 146 MB docker.io/library/alpine latest 9c6f07244728 3 weeks ago 5.83 MB docker.io/library/ubuntu 20.04 3bc6e9f30f51 4 weeks ago 75.2 MB Manage Containers Containers can be run from existing images or by downloading images from the preferred registry. For example, to run a container from the created Tesseract images, issue the command: $ podman run tesseract:latest -v tesseract 5.2.0 leptonica-1.79.0 libgif 5.1.4 : libjpeg 8d (libjpeg-turbo 2.0.3) : libpng 1.6.37 : libtiff 4.1.0 : zlib 1.2.11 : libwebp 0.6.1 : libopenjp2 2.3.1 Found OpenMP 201511 Found libarchive 3.4.0 zlib/1.2.11 liblzma/5.2.4 bz2lib/1.0.8 liblz4/1.9.2 libzstd/1.4.4 Found libcurl/7.68.0 OpenSSL/1.1.1f zlib/1.2.11 brotli/1.0.7 libidn2/2.2.0 libpsl/0.21.0 (+libidn2/2.2.0) libssh/0.9.3/openssl/zlib nghttp2/1.40.0 librtmp/2.3 You can also run a container using an image available in the registry. podman run docker.io/library/hello-world Sample output: To check if the container is running, use the command: podman ps To list all the containers including the ones not running, issue the command: $ podman ps -a CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES bff200dbe9b8 localhost/tesseract:latest -v 5 minutes ago Exited (0) 5 minutes ago gallant_mahavira 34c490d56716 docker.io/library/nginx:latest nginx -g daemon o... 5 minutes ago Created 0.0.0.0:80->80/tcp mynginx1 26f64c70d1df docker.io/library/nginx:latest nginx -g daemon o... 3 minutes ago Exited (0) About a minute ago mynginx a51d55a7d880 docker.io/library/hello-world:latest /hello 52 seconds ago Exited (0) 52 seconds ago romantic_jang To stop a container, run the command: podman stop container_name/container_ID To remove a container, first, stop it, then execute the command: podman rm container_name/container_ID That marks the end of this guide on how to install Podman 4 on Debian 11 / Debian 10. Now you are set to pull images and run containers as desired.
0 notes
pinerstamp · 2 years ago
Text
Luxcorerender reality 4.3
Tumblr media
#LUXCORERENDER REALITY 4.3 FULL#
The reality is more nuanced, and the community had to work to get proper docker-compose support in Microcks for Podman. Advocates gave the impression that you could issue alias docker=podman and you would be good to go. Podman was advertised as a drop-in replacement for Docker. Although Docker is still the most popular container option for software packaging and installation, Podman is gaining traction. Developers who do not have corporate access to a cloud-native platform have used Docker Compose. You can deploy Microcks in a wide variety of cloud-native platforms, such as Kubernetes and Red Hat OpenShift. It can also assert that your API implementation conforms to your OpenAPI specifications.
#LUXCORERENDER REALITY 4.3 FULL#
It helps you cover your API’s full lifecycle by taking your OpenAPI specifications and generating live mocks from them. Microcks is a cloud-native API mocking and testing tool. Using Podman Compose with Microcks: A cloud-native API mocking and testing tool.Equinix open sourced the platform last May, and it was accepted as a CNCF sandbox project in November 2020. The platform's cloud-native and workflow-driven approach has been tested in production with the Equinix Metal automated bare metal service. Originally developed by Equinix, the Tinkerbell platform is a collection of microservices designed to help organizations transform static physical hardware into programmable digital infrastructure, regardless of manufacturer, processor architecture, internal components, or networking environment. The latest release comes with a new, next-gen, in-memory operating system installation environment the ability to share common workflow actions using the CNCF Artifact Hub support for Cluster API and out-of-the-box support from a long list of operating systems. The open-source bare metal provisioning platform known as Tinkerbell has been growing its feature set since it joined the Cloud Native Computing Foundation (CNCF) sandbox program a year ago, belying its diminutive name with sizeable new capabilities. Open-Source Bare Metal Provisioning Platform, Tinkerbell, Spreads Its Wings in the CNCF Sandbox.
Tumblr media
0 notes
buysgreys · 2 years ago
Text
Zipsplit windows
Tumblr media
#Zipsplit windows how to#
#Zipsplit windows zip file#
#Zipsplit windows archive#
#Zipsplit windows zip#
Java: build OCI compatible image for Spring Boot web app using jib.Prometheus: sending a test alert through AlertManager.Prometheus: adding a Grafana dashboard using a ConfigMap.Prometheus: monitoring a custom Service using ServiceMonitor and PrometheusRule.Prometheus: monitoring services using additional scrape config for Prometheus Operator.Prometheus: installing kube-prometheus-stack on a kubeadm cluster.Kubernetes: independent nf for CoreDNS with kubeadm.Kubernetes: independent nf for CoreDNS with K3s.Kubernetes: custom upstream for domain with CoreDNS.Buildah: Installing buildah and podman on Ubuntu 20.04.Java: creating OCI-compatible image for Spring Boot web using buildah.Kubernetes: accessing the Kubernetes Dashboard with least privilege.KVM: configuring a base Window2019 instance with Sysprep.KVM: creating a Windows2019 Domain Controller using Powershell.KVM: Creating a Windows2019 ADFS server using Powershell.Gradle: fixing the gradle wrapper for a Java project.GoLang: Installing the Go Programming language on Ubuntu 20.04.Microsoft: configuring an Application Group for OAuth2/OIDC on ADFS 2019.Java: Spring Security OAuth2/OIDC protecting Client App and Resource Server.Gradle: interactive JDWP debugging of bootRun gradle task in Eclipse IDE.Python: Flask-OIDC protecting Client App and Resource Server using Windows 2019 ADFS.Kubernetes: Keycloak IAM deployed into Kubernetes cluster for OAuth2/OIDC.Kubernetes: copying files into and out of containers without ‘kubectl cp’.OAuth2: Configuring okta for OAuth2/OIDC.OAuth2: Configuring Google for OAuth2/OIDC.KVM: Creating a bridged network with NetPlan on Ubuntu 22.04.Linux: Mounting a loopback ext4/xfs filesystem to isolate or enforce storage limits.
#Zipsplit windows zip#
Linux: Excluding directories when using zip.
Linux: Use stat to verify permissions and ownership.
Ubuntu: Creating a Samba/CIFS share to quickly share files with Windows.
Linux: Using zip/unzip to add, update, and remove files from a Java jar/war.
Valid suffixes for size units are (b|k|m|g).
#Zipsplit windows archive#
# OR mend original archive, but do not extract content yetĬreate split archive on Linux, extract on WindowsĬonversely, if you want to create a split archive from Linux with 100k per file: 7z -v100k a fromlinux.7z įrom Window you would right-click on the “fromlinux.7z.001” file, and select “Extract here” to unzip the content. Then you can transfer this to a Linux host and use the following to extract it. I find that using 7zip provides easy interoperability across Linux and Windows.Ĭreating a split archive on Windows is detailed in posts like this (Note that it works using either 7zip or zip format). While there are many ways to do the same thing using utilities like zip, split, etc. Taking this a step further and splitting this archive into manageable chunks allows you to take advantage of parallel transfer. If you’d like to change the location where the files will be extracted, click “Browse,” and then navigate to the desired drive or folder.If you are transferring large files between systems, it can be advantageous to create a compressed archive using a tool like 7zip. In the “Extract Compressed (Zipped) Folders” window that appears, you’ll see the current file path as the default location for the unzipped files. Next, right-click the file and select “Extract All” in the menu.
#Zipsplit windows zip file#
First, locate the ZIP file that you’d like to extract in File Explorer.
#Zipsplit windows how to#
RELATED: Everything You Need to Know About Zip Files How to Extract a Zip File in Windows 11Įxtracting (unzipping) ZIP files in Windows 11 is just as easy as zipping them. Now that you have a ZIP file, you can copy it or share it like any other kind of file. When you’re ready, press Enter.Īnd that’s all there is to it! Pretty simple. Type a new file name or leave the default name in place. The ZIP file name will highlight, allowing you to type in whatever name you’d like. After a moment, your ZIP file will appear in the same folder as the source files that you just compressed.
Tumblr media
0 notes
dieterziegler159 · 1 year ago
Text
Discover the true potential of containers with Podman! Uncover the advantages and drawbacks of this lightweight engine in our insightful guide.
1 note · View note
public-cloud-computing · 1 year ago
Text
Gain insights into Podman's pros and cons and unlock the true potential of containerization. Make informed decisions for your infrastructure.
1 note · View note
Text
Stay ahead of the curve with Podman's advantages and drawbacks. Unlock the true potential of containers and optimize your development and deployment workflows.
1 note · View note
rubylogan15 · 1 year ago
Text
Gain insights into Podman's pros and cons and unlock the true potential of containerization. Make informed decisions for your infrastructure.
1 note · View note
shazforiot · 3 years ago
Photo
Tumblr media
Spend 15 minutes a day to improve your Docker, DevOps, Kubernetes, Ansible Skills
I am a small YouTuber and have a YouTube channel called Thetips4you(https://www.youtube.com/channel/UCoOq-DtESvayx5yJE5H6-qQ/videos) where I publish tutorial on DevOps, Docker, Kubernetes, Ansible, Git, ELK, Grafana and Prometheus weekly. My goal is to share the knowledge on the new technologies with others. Have you ever searched for a easy to understand DevOps, Docker, Kubernetes, Ansible guide? Here it is 30+ hrs Video tutorial series completely free.
I started recording videos with automated voice as I was not confident and later in the journey started recording with my own voice. I try to be clear and straight forward with practical scenarios , with out un-necessary talks and respecting your time. The content is mostly aimed at beginners and intermediate IT infra administrators and developers, I hope it can help some of you to learn something new.
I had put a lot of effort in creating this video series for beginners. It consist of basics on CICD, Containers, Kubernetes Pods, Deployments, Services, Setting up Jenkins, Docker, Podman, Minikube, Ansible, ELK, Git, most used commands, Pipeline jobs with Sonarqube quality checks, Artifactory for binary management, ansible playbooks, real use cases, deploying docker containers using ansible, how to convert your playbook in to roles, Monitoring docker containers, windows and linux servers, and more & more! .
As I'm not a professional youtuber, I'd love to hear your feedback and support
1 note · View note