Title: The Melody of Dissent
Background: The kingdom of Voxterra is renowned for its vibrant arts and culture, largely driven by the illustrious Bard's Guild, known as "The Harmonic Order". For years, The Harmonic Order's performances have been the lifeblood of Voxterra, their storytelling, acting, and music filling the coffers of King Thespius, who controls the city's theatres, inns, and performance venues.
Recently, the King has come into possession of a powerful magical artifact - "The Loom of Echoes". This device can weave intricate illusions and reproduce any performance it has witnessed, complete with the emotional essence and artistic skill of the original performers. Enchanted by the device's potential, King Thespius sees it as an opportunity to increase his profit margins by reducing the payments to his loyal bards and actors.
Rumblings of Discontent: Bards, writers, and performers from The Harmonic Order have begun to notice the shift in their fortunes and are discontented by their re
| package main | |
| import input | |
| resource_whitelist = { | |
| "kafka_topic" | |
| } | |
| resource_changes[r] { | |
| input.resource_changes[_].change.actions[_] != "no-op" | |
| r := input.resource_changes[_].type |
| package main | |
| deny[msg] { | |
| input.kind = "Deployment" | |
| not input.spec.template.spec.securityContext.runAsNonRoot = true | |
| msg = "Containers must not run as root" | |
| } |
| Helm 3 Deep Dive - Taylor Thomas, Microsoft Azure & Martin Hickey, IBM | |
| https://www.youtube.com/watch?v=afCRt5Gd6Rk | |
| The Elephant in the Kubernetes Room: Team Interactions at Scale - Manuel Pais, Independent | |
| https://www.youtube.com/watch?v=vWzqNzGxamA | |
| Tutorial: Everything You Need To Become a GitOps Ninja - Alex Collins & Alexander Matyushentsev | |
| https://www.youtube.com/watch?v=r50tRQjisxw | |
| Walk-through: Debugging an RBAC Problem in Istio (But Without the Swearing) - Matt Turner |
| --- | |
| # Source: cost-analyzer/charts/grafana/templates/podsecuritypolicy.yaml | |
| apiVersion: extensions/v1beta1 | |
| kind: PodSecurityPolicy | |
| metadata: | |
| name: kubecost-grafana | |
| labels: | |
| app: grafana | |
| chart: grafana-1.17.2 |
| #!/usr/bin/env bash | |
| scratch=$(mktemp -d -t tmp.XXXXXXXXXX) | |
| function finish { | |
| rm -rf "$scratch" | |
| } | |
| trap finish EXIT | |
| STAGE=1 |
| #!/usr/bin/env bash | |
| # | |
| # Script to remove GPG key from git-crypt | |
| # | |
| # It will re-initialize git-crypt for the repository and re-add all keys except | |
| # the one requested for removal. | |
| # | |
| # Note: You still need to change all your secrets to fully protect yourself. | |
| # Removing a user will prevent them from reading future changes but they will | |
| # still have a copy of the data up to the point of their removal. |
| ### Keybase proof | |
| I hereby claim: | |
| * I am liskl on github. | |
| * I am liskl (https://keybase.io/liskl) on keybase. | |
| * I have a public key ASCFnFpQ-eX63NOzNtICvv_nWkMJ3yVLtc8Mt5Jmjsa5Mgo | |
| To claim this, I am signing this object: |
| { | |
| "systems": [ | |
| { | |
| "ldc0000": { | |
| "dracVersion": { | |
| "drac_type": "16", | |
| "host": "ldc0000.lom.example.com" | |
| }, | |
| "sysInfo": { | |
| "autoconfig": "1", |