(no title)
m0zg
|
4 years ago
How do you develop for it though? Do you install it locally as well? Or do you only do interpreted languages and/or Java? I suppose Go would work across distros also (because it doesn't use libc), but that's all I can think of.
kawsper|4 years ago
Find the AMIs (newest last)
$ aws ec2 describe-images --region eu-west-1 --owners amazon --filters 'Name=name,Values=amzn2-ami-hvm-*-x86_64-gp2' 'Name=state,Values=available' --output json | jq -r '.Images | sort_by(.CreationDate)'
From the information returned you have to stich the version numbers and filenames into this format: And if you did it right, you can now download the file.my123|4 years ago
You'll also find VirtualBox, Hyper-V and VMWare ready images in there.
(and also arm64 ones)
coredog64|4 years ago
https://aws.amazon.com/blogs/compute/query-for-the-latest-am...
ISTR there’s also an SNS topic you can subscribe to if you want to do something automatically on new AMI release.
shaicoleman|4 years ago
Once it's GA, they'll provide VM images and docker containers, so you'll be able to test it offline
throwaway984393|4 years ago
dharmab|4 years ago
Yes there are services like Fargate but they're not cost efficient for many cases.
fl0ki|4 years ago
This is like updating the direct dependencies of your service itself (e.g. cargo audit -> cargo update) but anecdotally I'm seeing many people neglect the image and sometimes even pin specific versions and miss potential updates even when they do later rebuild it.
We take unattended upgrades for granted on Debian-based servers, and that will likely help the Docker host system, but I'm not aware of anything nearly as automated for rebuilding and redeploying the images themselves.
It could be part of your CI/CD pipeline but that in itself is a lot of extra setup and must not be neglected, and it must make sense, e.g. pin in a way that will still pick up security patches and have a dependency audit as part of CI/CD to report when the patching hasn't been enough (e.g. due to semver constraints).
FpUser|4 years ago
xyzzy_plugh|4 years ago
This is literally one of the only things that is not included in a container image. The Linux kernel is the Operating System and you are subject to differences in its configuration depending on where the container is running. You are referring to the distribution.
takeda|4 years ago
This is a false sense of reproducibility. I encountered cases where container worked well on one machine and crashed or had weird bugs on another one.
unknown|4 years ago
[deleted]
dilyevsky|4 years ago
wbl|4 years ago
m0zg|4 years ago
[deleted]
pjmlp|4 years ago
AviationAtom|4 years ago