Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I wasn't seminal. All the things in the list were already being done, someone just wrote down what they thought were best practices. Some of the things in the list are widely viewed as bad advice (e.g. using environment variables).


It might not be the most secure method to propagate secrets but the alternatives have significant complexities.

In $DAY_JOB we only ever use single-machine docker-compose for deployments and there they work decently.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: