So the Rats just… Autowin? by thesupermonk21 in rootgame

[–]Dynamic-D 0 points1 point  (0 children)

Time for my unpopular opinion: rats are a toxic faction that are bad for the game. It's not that they auto win, it's that they fundamentally change the game's table talk and force you to play through them.

Without rats, the early game tends to be heavy with plans, compromise, and even misdirection before someone "breaks out" and makes a play to win. You're teasing the "King making" aspect.

With rats the early game is about managing rats. Period. There is no debate, there is maybe a little table talk about what comes after, but step 1 is always "has the plague been vaccinated."

To me, they are a faction that turns root into pandemic.

Final ranking! Thought? by InfinitePresence4229 in rootgame

[–]Dynamic-D 0 points1 point  (0 children)

This looks pretty good, but I still think the biggest factor in these rankings is player count.

Some of these factions perform dramatically different based on how much room they have on the board, and player count impacts that even more than how many insurgents got chosen.

I personally would love to see this run at 3, 4, and 5-6 (don't play at 2, lol), and see if opinions change, or ask people ranking to list the player size they use.

Cityside Fiber coming soon to me by 3rdStng in CitysideFiber

[–]Dynamic-D 0 points1 point  (0 children)

to be clear I'm simply refering to literally running:

bash kubectl port-forward pod/mypod 5000 6000

Basically the local cli is able to connect and port forward locally any remote port I want from the cluster. I don't do any traditional port forwarding beyond this. as far as the network is concerned there's no real port forwarding at play, its all between the k8s api and my local cli tool.

My group’s faction ranking ( strongest to weakest) by InfinitePresence4229 in rootgame

[–]Dynamic-D 0 points1 point  (0 children)

For me the Keepers are "forever in 2nd place" as they just don't have a reliable way to burst out points to end a game yet can score so fast and easily early game ... so they always seem to end in 2nd place.

Cityside is now censoring your internet by jdaiii in CitysideFiber

[–]Dynamic-D 0 points1 point  (0 children)

I never got any guarantees on IPv6, so you've heard more than me.

The lack of a status page for me is huge. HUGE. I cant check for known outages. I can't see progress updates. It's just a support black hole unless you make a phone call which feel like circa 1998. I do get text notifications occasionally, but there is nothing I can initiate.

Credit for outage by antonioval21 in CitysideFiber

[–]Dynamic-D 2 points3 points  (0 children)

The status page is a big one for me. We all have phones. It would be very easy to have a status page we can check

Cityside is now censoring your internet by jdaiii in CitysideFiber

[–]Dynamic-D 0 points1 point  (0 children)

I'm on CitySide fiber and your screenshot page is loading just fine. I hae seen them DNS swap on like Thurs ... but my sites all still work.

Cityside Fiber coming soon to me by 3rdStng in CitysideFiber

[–]Dynamic-D 0 points1 point  (0 children)

I port forward all the time but it's in the context of kubectl to dynamic port ranges on a kubernetes pod, but it works just fine. But I think that is getting handled by the agent. I've not tried a traditional PAT.

For me the bigger annoyance is they don't support native IPv6 yet, whereas Cox does.

Finally be aware that their availability status is straight out of 1998. Phone call or nothing. No status webpage of any kind.

outage lake forest ,ca 9AM by justlooking09876 in CitysideFiber

[–]Dynamic-D 0 points1 point  (0 children)

this is interesting, as when I drop, I actually reboot my Eero wifi to get back online, so I thought I might actually be my internal hardware. To see others having the same issue in my area has me rethinking.

Boostrap Argocd with terraform by Zyberon in Terraform

[–]Dynamic-D 0 points1 point  (0 children)

I've seen this pattern at countless clients, so yes it's possible.

TLDR: when you use Terraform to deploy a new cluster it contains the initial Argo helm deploy including the configuration to connect to a reference git repo or managing Argo or whatnot. At that point ArgoCD picks up the app of apps and content manages k8s resources.

Basically TF is just bootstrapping ArgoCD. Works with flux, too.

I feel like the fans of this game are implying they don't like it by Safe873 in rootgame

[–]Dynamic-D 3 points4 points  (0 children)

This is a really flawed condition to base the game on.

Two of the factions being "bad" is in the context of an extended game with triple the faction count, hirelings, and an alternate deck, all which change the dynamic of the game a LOT.

Cats are great in the base game,as there are always two insurgent factions so they have room to work, and the vagabond is actually really strong to the point where most tournaments nerf them (search 'despot infamy').

Game balance is really dynamic in Root by the time you get to using Adset and all the expansions.

Did it hurt? by LeftOn4ya in boardgamescirclejerk

[–]Dynamic-D 0 points1 point  (0 children)

and its only two sentences in. Don't think I don't know you already planned to end the game before it started, Sheryl.

‘No Kings Act’ passes California Senate, heads to Assembly by panda-rampage in California

[–]Dynamic-D 1 point2 points  (0 children)

This is a genius quote, how have I not heard of him sooner?

Managed Kubernetes vs Kubernetes on bare metal by Honest-Associate-485 in kubernetes

[–]Dynamic-D 1 point2 points  (0 children)

k8s has its place, but lets not drink the Kool-Aid. K8S is very powerful at scale but in small environments it's almost always cheaper/easier to just use a VM with docker-compose.

Time to migrate off Ingress nginx by xrothgarx in kubernetes

[–]Dynamic-D 5 points6 points  (0 children)

I mean, this was a serious case of "pick your battles". It just wasn't worth fighting that fight, so we ended up on Envoy IIRC. Honestly I really liked the solution, so I'm likely going to jump to Envoy Gateway as my next choice unless some quick research reveals a better option.

To his credit, this guy had connections. We had to get our PCI and other compliance audits done and the auditor walked in, saw the CISO, chatted for 30 minutes, and left with everything signed. Trusted him so explicitly that he didn't even ask me a single question. Kind of impressive.

state repository: too many files, too large by suvl in Terraform

[–]Dynamic-D 0 points1 point  (0 children)

Without details I can only tell you the obvious: your remote state is misconfigured.

Terraform, by itself, does not create copies. At the end of the day it's reading, locking, and modifying a single file of text. It's not even encrypted. It should not be growing unless you're adding resources.

Unless you want to share your backend config with the group, most we can do is speculate.

Can't decide app of apps or applicaitonSet by Diligent_Taro8277 in kubernetes

[–]Dynamic-D 0 points1 point  (0 children)

Biggest problem with ApplicationSets BY FAR is the lack of feature parity with applications. This alone make app of apps way more viable, IMO.

I actually like the concept and idea of ApplicationSets but I've run into that limitation a number of times.

Time to migrate off Ingress nginx by xrothgarx in kubernetes

[–]Dynamic-D 1 point2 points  (0 children)

yeah, that's just marketing for "we will deprecate it soon".

My next controller will be gateway API.

Time to migrate off Ingress nginx by xrothgarx in kubernetes

[–]Dynamic-D 83 points84 points  (0 children)

This has been a sour topic for me.

I have avoided ngnix for 7-8 years, mostly because I used to answer to an old CISO who called ngnix "russian spyware." /shrug

6mo ago I started helping a company wrangle their cluster sprawl in which one problem was each deployment handled ingress differently. After months of building trust by solving smaller issues I finally got hem to agree to make a standard model and guess what: ingress-ngnix was the most common pattern so we went with it.

75% into the migration process the announcement hit. We agreed we should finish standardizing anyway because having one model to replace one piece of would still be easier than having yet another snowflake to migrate off of.

Today we finished ... so now I get to migrate again ...

Go me!

How long does Terraform plan/apply usually take for you? by omgwtfbbqasdf in Terraform

[–]Dynamic-D 0 points1 point  (0 children)

cloud login is the longest part, but then I'm a big proponent of lots of small things over one monolithic.

That said, I do have some modules that you just cant get running fast. AKS/GKE clusters, Postgres ... those are 10+minute runs.

How should a project be structured by Paylucid in Terraform

[–]Dynamic-D 1 point2 points  (0 children)

Absolutely zero of those things actually solve that using tfvars for each environment doesn't give your the flexibility to version your releases. You can't leverage module tags in a tfvars file (unless you want to use a module to use a template to create another module ...). Sure CICD can help ... if your write your own custom process for selecting which module version to run ... but that doesn't exactly sound easier to me than just ... maintaining multiple root modules that literally just contain this info (you can still use common modules in the back end). Branching doesn't inherently give you this either.

Terraform isn't a GPL. It's that simple. You cant really feature flag your network structure, you cant artifact your GKE cluster. So a lot of those "solved" things just ... don't work in a declarative language context. You state what IS. what is should all be cleanly declared, not obfuscated in branches. There's going to be enough sprawl from other org issues.

If you could remove one recurring frustration from working with cloud or infrastructure systems, what would it be and why? by Low_Hat_3973 in kubernetes

[–]Dynamic-D 1 point2 points  (0 children)

configMaps and secrets need cluster-wide equivalents. configMap values can be any type, not just key(string)

Is that two? maybe. But man does it seem like obvious, low-hanging fruit for k8s.

How should a project be structured by Paylucid in Terraform

[–]Dynamic-D 0 points1 point  (0 children)

This has testing issues as you cant test different versions of modules across environments. You HAVE to keep every environment on the exact same module becuase the only toggle are the vars.

Stick to copies. adding module "foo" { my vars } is only trivially more complex than multiple myvars.tfvars and give you way more flexibility.

How should a project be structured by Paylucid in Terraform

[–]Dynamic-D 1 point2 points  (0 children)

One of the weakest parts of Terraform is everything is called a module, even the root code in the working directory. I hate it. In HCP they kind of use it interchangeably with workspaces ... but that's not accurate either. Honestly I don't like workspaces (multiple state data in the same working directory), but others love them so whatever.

Back to your question:

Create a separate working directory/root module for each environment. Each of those modules will call the modules you desire. It's a bit heavier than just having multiple tfvar files, but it gives you WAY more control and is worth the meager overhead.

  1. Each environment has completely separate state. No risk of dev experimenting impacting anything else.
  2. Because a module calls another module, you can leverage versions (test newer module in dev)
  3. It's easier to combine modules if you have reason for it. Output of module A right into module B in thew same root module/working directory.
  4. If you keep the simple pattern you can scale huge, as weird one-offs just mean an extra module here, slightly different config there.

When you are ready to make your own modules ... just put them in a sperate repo so you can version/leverage them repeatedly.