Guillaume E.
Guillaume E.
In some cases, logs may contain sensitive information (think for example, a username, or an IP address) that would be better not to expose. When things are working nicely, this...
We sure would firewall it :p! But the people who have shell access to Prometheus (to edit its config for example) do not necessarily have access to sensitive logs.
Hello! Looks like the non-conforming json is built in the OpenStack helper of cloud-init: https://github.com/canonical/cloud-init/blob/9bcb3dce9d7abfbb7273e313d5056eda0424108f/cloudinit/sources/helpers/openstack.py#L661-L664 Subnets get the `ipv6` key because the network obtained from metadata has it too in...
Will 120kW leave enough time to setup other power sources before SMES drain? From what I remember, that looks about half what the station uses and would leave something like...