#airship (2018-12)

airship

Home of Airship ECS Modules ( https://github.com/blinkist/terraform-aws-airship-ecs-service / https://github.com/blinkist/terraform-aws-airship-ecs-cluster )

Archive: https://archive.sweetops.com/airship/

2018-12-29

github140 avatar
github140
11:53:10 AM

@github140 has joined the channel

maarten avatar
maarten

Welcome aboard @jbye and @github140! I’m off for new years partying in Belgrade until the 2nd of January, most likely afk. If there’s anything I can help you with, let me know and I’ll get back to you when I can.

2018-12-28

maarten avatar
maarten

Next stop, Traefik

1
jbye avatar
jbye
10:16:59 PM

@jbye has joined the channel

2018-12-27

Release notes from terraform-aws-airship-ecs-service avatar
Release notes from terraform-aws-airship-ecs-service
09:13:15 AM

0.8.6: Service discovery (#28) Added service discovery.. service_discovery_enabled = true service_discovery_properties { namespace_id = “${aws_service_discovery_private_dns_namespace.test.id}” dns_ttl = “60” dns_type = “A” routing_policy = “MULTIVALUE” healthcheck_custom_failure_threshold = “1” }

blinkist/terraform-aws-airship-ecs-service

Terraform module which creates an ECS Service, IAM roles, Scaling, ALB listener rules.. Fargate & AWSVPC compatible - blinkist/terraform-aws-airship-ecs-service

2

2018-12-26

maarten avatar
maarten

Close to finishing service discovery, @jamie do you have time to take a look ? branch:service_discovery

  service_discovery_enabled = true

  service_discovery_properties {
    namespace_id                         = "${aws_service_discovery_private_dns_namespace.test.id}"
    dns_ttl                              = "60"
    dns_type                             = "A"
    routing_policy                       = "MULTIVALUE"
    healthcheck_custom_failure_threshold = "1"
  }
jamie avatar
jamie

Hi merry Xmas - did you manage to fix the weird issue with it?

maarten avatar
maarten

merry xmas!

maarten avatar
maarten

yes, i don’t have it anymore, also I found a way to disable container_port now for A type records but setting it to false ..

jamie avatar
jamie
02:20:30 PM
maarten avatar
maarten
blinkist/terraform-aws-airship-ecs-service

Terraform module which creates an ECS Service, IAM roles, Scaling, ALB listener rules.. Fargate & AWSVPC compatible - blinkist/terraform-aws-airship-ecs-service

jamie avatar
jamie

That is such a weird fix.

blinkist/terraform-aws-airship-ecs-service

Terraform module which creates an ECS Service, IAM roles, Scaling, ALB listener rules.. Fargate & AWSVPC compatible - blinkist/terraform-aws-airship-ecs-service

maarten avatar
maarten

I lolled when it worked out. If this ist the real fix of me problem earlier I don’t know. Lost track at one moment.

jamie avatar
jamie

Ah good. I can’t do the pr right now as I’m out of my hotel. But I can within 24 hours!

1
maarten avatar
maarten

I’m at schiphol this video is loading very slowly

maarten avatar
maarten

haha

maarten avatar
maarten

nice one

jamie avatar
jamie

Reviewed the changes. There is one instance of var.tags when it should be local.tags

jamie avatar
jamie

Apart from that, approved!

2018-12-25

2018-12-23

joshmyers avatar
joshmyers

@maarten Airship in DevOps weekly, nice!

3
maarten avatar
maarten

Oh cool, I’m not even subscribed, do you want to fwd that to me ?

maarten avatar
maarten

let’s see if I can get it if I subscribe now

joshmyers avatar
joshmyers
Devops Weekly List

Devops Weekly List Email Forms

maarten avatar
maarten

I subscribed but not getting the old one I think, can’t find any active archives.

2018-12-21

timo avatar
timo
10:11:51 PM

@timo has joined the channel

timo avatar

Hi everyone. First, thanks for your ECS terraform modules! I was following the instructions https://airship.tf/getting_started/ to set up a fargate cluster but i am getting 6 value of 'count' cannot be computed errors as soon as I add the ecs_service module:

* module.ecs_service_nginx.module.alb_handling.aws_lb_listener_rule.host_based_routing_ssl_custom_listen_host: aws_lb_listener_rule.host_based_routing_ssl_custom_listen_host: value of 'count' cannot be computed
* module.ecs_service_nginx.module.alb_handling.aws_lb_listener_rule.host_based_routing_custom_listen_host: aws_lb_listener_rule.host_based_routing_custom_listen_host: value of 'count' cannot be computed
* module.ecs_service_nginx.module.alb_handling.aws_lb_listener_rule.host_based_routing_ssl_custom_listen_host_cognito_auth: aws_lb_listener_rule.host_based_routing_ssl_custom_listen_host_cognito_auth: value of 'count' cannot be computed
* module.ecs_service_nginx.module.alb_handling.aws_route53_record.record_alias_a: aws_route53_record.record_alias_a: value of 'count' cannot be computed
* module.ecs_service_nginx.module.alb_handling.aws_lb_listener_rule.host_based_routing_custom_listen_host_redirect_to_https: aws_lb_listener_rule.host_based_routing_custom_listen_host_redirect_to_https: value of 'count' cannot be computed
* module.ecs_service_nginx.module.alb_handling.aws_route53_record.record: aws_route53_record.record: value of 'count' cannot be computed

I am using terraform 0.11.11 and I was able to provision all resources, once I add the ecs_service module it fails

Start | Airship Modules

Flexible Terraform templates help setting up your Docker Orchestration platform, 100% supported by Amazon

maarten avatar
maarten

Hi @timo thnks, That’s a lot of errors, and they don’t make much sense to me. Could you post a GIST of your sample code & terraform plan. Tomorrow I have some time, but I’m traveling as well.

timo avatar

Hey, sorry, busy christmas days I created a gist: https://gist.github.com/ulich/3ec5ee0d25df3a5451b7350a932ba8ac

maarten avatar
maarten

@timo

  1. You’re not really using the getting started code 1:1 so always best to just start of there and make changes after :pray:
  2. vpc_id is not an attribute of the aws_vpc datasource. if you change vpc_id to id it will most likely work.

https://gist.github.com/ulich/3ec5ee0d25df3a5451b7350a932ba8ac#file-ecs-service-nginx-tf-L29

    lb_vpc_id = "${data.aws_vpc.vpc.id}"
timo avatar

ah damn, that was it, thanks a lot. Now it works!

maarten avatar
maarten

Alright! If you feel documentation is lacking somewhere let me know!

2018-12-18

niek avatar
niek
09:39:55 AM

@niek has joined the channel

maarten avatar
maarten

@niek is also an author of ECS modules, happy to have you here

niek avatar

@maarten thx

Release notes from terraform-aws-airship-ecs-service avatar
Release notes from terraform-aws-airship-ecs-service
03:58:09 PM
blinkist/terraform-aws-airship-ecs-service

Terraform module which creates an ECS Service, IAM roles, Scaling, ALB listener rules.. Fargate & AWSVPC compatible - blinkist/terraform-aws-airship-ecs-service

lambda lookup policy dependency fix by maartenvanderhoef · Pull Request #30 · blinkist/terraform-aws-airship-ecs-service

What A dependency for the lambda iam role policy adding.. the This to make sure that the datasource lookup is not crashing at invoke because the policy was not there yet.. Never happened to me befo…

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

welcome @niek!

2018-12-17

jamie avatar
jamie

Do you have an example set up using it currently?

jamie avatar
jamie

that you can make a change to and test?

maarten avatar
maarten
  resource "aws_service_discovery_private_dns_namespace" "example" {
    name        = "example.terraform.local"
    description = "example"
    vpc         = "${module.vpc.vpc_id}"
  }

module {
 enable_service_discovery = true

    service_discovery_namespace_id = "${aws_service_discovery_private_dns_namespace.example.id}"
}
maarten avatar
maarten
10:18:57 AM
jamie avatar
jamie
blinkist/terraform-aws-airship-ecs-service

Terraform module which creates an ECS Service, IAM roles, Scaling, ALB listener rules.. Fargate & AWSVPC compatible - blinkist/terraform-aws-airship-ecs-service

jamie avatar
jamie

can you comment out the port line

maarten avatar
maarten

Isn’t the port needed for SRV ?

jamie avatar
jamie

# port = "${var.container_port}"

jamie avatar
jamie

No. I’ve just read through my code and my collegues code where we ahve used srv records.

jamie avatar
jamie

and never actually added the port value tehre

jamie avatar
jamie

I just want to see if that is doing anything funny

jamie avatar
jamie

even though it is mentioned in the tf documentation

maarten avatar
maarten

The Service Discovery instance could not be registered.

maarten avatar
maarten

Task comes up, is healthy

jamie avatar
jamie

But is it working with A records?

maarten avatar
maarten

then gets killed

maarten avatar
maarten

yes

maarten avatar
maarten

can try again

maarten avatar
maarten

maybe MULTIVALUE routing with SRV is the problem ?

jamie avatar
jamie

no, it can do it

jamie avatar
jamie

But try toggling that… andthen also try commenting out

  # Needed for private namespaces
  health_check_custom_config {
    failure_threshold = "${var.service_discovery_healthcheck_custom_failure_threshold}"
  }
jamie avatar
jamie

Since it may also be the helth check modifiers that do it

maarten avatar
maarten

ok, now also have the same with A records, not sure what changed then.

jamie avatar
jamie

ok good. At least we know its not srv now

jamie avatar
jamie

You didn’t accedentally create a terraform.local route53 zone did you?

jamie avatar
jamie

as well as the example.terraform.local zone

maarten avatar
maarten

no, they make it

maarten avatar
maarten

‘they’

jamie avatar
jamie

the borg

maarten avatar
maarten

hehe

maarten avatar
maarten

no change

jamie avatar
jamie

Can you do a destroy and apply?

maarten avatar
maarten

just the service or also the namespace ?

jamie avatar
jamie

namespace too

jamie avatar
jamie

if you can easily do it

jamie avatar
jamie

Also, what network mode are you using?

jamie avatar
jamie

awsvpc? or host/bridge

maarten avatar
maarten

awsvpc

maarten avatar
maarten

same shit, i give up for now

maarten avatar
maarten

@jamie @jonboulle If you want to have another avatar or introduction next to your name, let me know

Also, if you can write better than me, let me know

https://airship.tf/introduction/

Introduction | .. ECS made easy

Home of Terraform Airship

2018-12-16

maarten avatar
maarten

@jamie https://github.com/blinkist/terraform-aws-airship-ecs-service/blob/service_discovery/modules/ecs_service/main.tf With SRV record as DNS type the Service doesn’t get registered, do you have any idea ?

blinkist/terraform-aws-airship-ecs-service

Terraform module which creates an ECS Service, IAM roles, Scaling, ALB listener rules.. Fargate & AWSVPC compatible - blinkist/terraform-aws-airship-ecs-service

2018-12-15

maarten avatar
maarten

How to spend a weekend. My start on the ECS service documentation.. https://airship.tf/guide/ecs_service/ Would love to have input on anything guys!

ECS Service | .. ECS made easy

Home of Terraform Airship

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)
07:44:19 PM
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

love these diagrams

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)
07:45:20 PM
maarten avatar
maarten

Love them too If you have time please tell me what you don’t like!

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

this is the most documented terraform module on the internet

maarten avatar
maarten

I’ll have to wear sunglasses outside now.

jamie avatar
jamie

because your future is so bright?

maarten avatar
maarten

haha

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

hahah

Steven avatar
Steven
07:47:57 PM

@Steven has joined the channel

2018-12-12

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

have you taken a look at the new blue/green deployment feature?

maarten avatar
maarten

Hi Erik, I don’t think so, do you have more info’s for me ?

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)
aws/containers-roadmap

This is the public roadmap for AWS container services (ECS, ECR, Fargate, and EKS). - aws/containers-roadmap

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Not much

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

see the “Just Shipped” column

maarten avatar
maarten

Ahh! CodeDeploy I’m less interested in, but the roadmap stuff is great

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

yea, I was really surprised they made this public

2018-12-11

Release notes from terraform-aws-airship-ecs-service avatar
Release notes from terraform-aws-airship-ecs-service
10:53:19 AM

0.8.4: Task scheduler fix (#27) What

Rewrite of the javascript Task scheduler, it wasn’t working properly with AWSVPC networking. Limited the name of the jobs to 32 chars. Fixed a bug which effected ecs services without a load balancer as the condition was still set to match NONE instead of none

blinkist/terraform-aws-airship-ecs-service

Terraform module which creates an ECS Service, IAM roles, Scaling, ALB listener rules.. Fargate & AWSVPC compatible - blinkist/terraform-aws-airship-ecs-service

1
i5okie avatar
i5okie

I fell off the earth.. looks like my project has been scrapped for the foreseeable future ;(. But now I’ll be playing with Airship the way it was designed haha

i5okie avatar
i5okie

The question I had was… vpc_security_group_ids = ["${module.ecs_instance_sg.this_security_group_id}","${module.admin_sg.this_security_group_id}"] What is the intent with these SGs? Or what are the suggested rules?

maarten avatar
maarten

The Autoscaling Group of instances needs to allow incoming traffic from the Load Balancer. I’m describing it here //airship.tf/guide/ecs_cluster/#security-groups>

ECS Cluster | .. ECS made easy

Home of Terraform Airship

2018-12-07

jamie avatar
jamie

I use airship and cloudposse combined. I like to add the null_label into airship, so i can cascade the conststant labeling and tagging down through all the modules via context.

jamie avatar
jamie

I have used Traefik, and it is easy to add into the mix

jamie avatar
jamie

IF I get a moment, i’ll build up an example

2
Ryan Ryke avatar
Ryan Ryke
05:52:58 AM

@Ryan Ryke has joined the channel

2018-12-05

maarten avatar
maarten

@i5okie I’d love to know how you see your setup working. In my documentation I will have to work-out a few common use-cases. So I’d love to hear yours.

i5okie avatar
i5okie

Im thinking to just use terraform to document the infrastructure for the ecs. So I’d like to have a small ecs cluster, and some docker images in ecr. like our usual ruby image, then a postgresql / redis service.. I’m still a bit new to this, so im not sure if ruby would be a task or not?

right now we’re primarily on heroku, and have review apps that can get spun up from github PRs. So in my case, I’d want to write some code that devs would run in their command line to spin up a ‘review app’ (ruby + postgresql + redis images) responding to <app>-<hash>.mydomain.com as per traefik.. then when QA is done verifying or whatever, we can kill the review app afterwords.

maarten avatar
maarten

Hi @i5okie I’ve done something similar with Airship, but less dynamic than your idea. For a QA environment I’ve created multiple services of the same application, let’s call it app running on the same ECS cluster. The 5 different services were preconfigured by terraform and had planet names, earth, mars, uranus etc. At PR, or however the deployment was configured, the developer creates a branch named app-mars-[JIRA-TICKET] and the application was then deployed to the app-mars ECS Service. Route53 and a single Application Load Balancer takes care of routing the traffic to the Planet QA ECS Service. A who-is-blocking-what-service-app on Slack takes care of not having developers deploying at the same planet at the time, what never was a problem really.

1
davidvasandani avatar
davidvasandani

@maarten do you have any config you can share regarding this setup? I’m debating between what you’ve described and the Kubernetes namespace per PR that CloudPosse uses.

maarten avatar
maarten

Hi David, I will add more stuff to the documentation this week!

maarten avatar
maarten

The setup I just described are nothing more than multiple ECS Services configured by terraform together with the resources they are configured to. It’s less dynamic than kubernetes, but you can configure a services from top to bottom, redis, db, access to IAM, other AWS resources, kinesis etc.

maarten avatar
maarten

How multiple services then connect to each other is then configured by the environment variables configured within SSM which are turned into ENV variables by the chamber application.

maarten avatar
maarten

Internally applications can talk to each other through an internal application load balancer, and soon, the service registry, which is something I’m building in at the moment.

maarten avatar
maarten

So the moment I have the service registry setup, only then namespaces can become a reality.

i5okie avatar
i5okie

yeah that kind of sounds similar. So i guess in my case, the LB would point to traefik. then traefik would point to one of the deployed apps..

maarten avatar
maarten

What is the need for traefik here, if the ALB already does the routing ?

i5okie avatar
i5okie

auto discovery i guess

i5okie avatar
i5okie

rather uhm reverse proxy

i5okie avatar
i5okie
i have wildcard *.[apps.mydomain.com> pointing to traefik. so anything i type in <http://myapp-v3344.apps.mydomain.com myapp-v3344.apps.mydomain.com](http://apps.mydomain.com) traefik would then say ah okay this goes here..
i5okie avatar
i5okie
NETBEARS - Blog | Traefik Load Balancer for ECS services

This is a tutorial on how to deploy a Traefik Load Balancer in AWS to create hosts (FQDN) for development applications launched in ECS based on application name and tags.

i5okie avatar
i5okie

except someone who wrote this has incomplete documentation and i can’t get that to work.

i5okie avatar
i5okie

so im trying to do basically the same, but starting with terraform, the airship module, and going from there.

maarten avatar
maarten

I’m seeing where you’re getting at now. It’s a little different idea from what I’m used to and that makes it interesting. The question is how you want to deploy your others services then. Running terraform at PR ? Or are you ok with pre-configuring a set of services to which you can deploy after.

i5okie avatar
i5okie

so lets forget about PRs for now

i5okie avatar
i5okie

i want to have this in terraform so its documented, in case we need to tear down the stack and bring it up in the future. or on another aws account.. etc.

i5okie avatar
i5okie

so for other services.. I was thinking if it’d be possible to do something like how CircleCi config file has the main -image ruby:2.5 for example, and then below you specify -image postgresql:9.6-alpine for example..

so i think that when ‘deploy command’ is triggered, i’l have to spin up the ruby image, and the postgresql/ redis images and then associate those three together. (this probably has nothing to do with terraform at this point)

maarten avatar
maarten

I’ve used RDS in a shared tenancy model for that as production is also using RDS and I like to have production more or less in sync with everything else

i5okie avatar
i5okie

what i’ve described above would be insane for production. its for ephemeral apps with like short life-spans of a couple minutes to a couple days tops.

i5okie avatar
i5okie

it’s quite a challenge lol. i’ve never done anything like this before

maarten avatar
maarten

Let me know if if you struggle with something on the way! The mindset behind the airship modules is slightly different from your use-case but we’re engineers, so we can make everything work

i5okie avatar
i5okie

yep, i have to run out for a bit. but i have a question about your config example

i5okie avatar
i5okie

tty soon

maarten avatar
maarten

sure, just post!

2018-12-04

maarten avatar
maarten

Hi Everyone, I’ve started documenting the ecs cluster module here: https://airship.tf/guide/ecs_cluster/. For ‘better’ English I’ll find someone to take a look, but would love to have input from you guys on the structure itself.

ECS Cluster | .. ECS made easy

Home of Terraform Airship

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

wow maarten! looks great

1
maarten avatar
maarten

Vuerocks

maarten avatar
maarten

The codeblocks are currently json, very soon hcl https://github.com/PrismJS/prism/pull/1594

Add support for HCL by outsideris · Pull Request #1594 · PrismJS/prism

Supporting HCL(HashiCorp Configuration Language). Close #1252

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

i think you definitely made the right choice for this project

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

going to take a closer look at some of the UI/UX elements and have our guy incorporate that into our docs

maarten avatar
maarten

nice ::: warning

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

how does this handle multi-line?

maarten avatar
maarten

you mean, within the ::: warning block

maarten avatar
maarten

let me see

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

yea

maarten avatar
maarten

not really

maarten avatar
maarten

with <br/> it works

maarten avatar
maarten

this is not br/ just 2 enters by markdown

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

“2 enters”?

maarten avatar
maarten

2 returns

maarten avatar
maarten

that’s not really multiline..

maarten avatar
maarten

ah got it

maarten avatar
maarten

so you do it by putting two spaces at the end of the line

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

oh, that’s cool

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)
07:05:04 PM
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

the writing on this page is exceptional

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

@john294 you might want to talk with @maarten about airship for what you guys are doing. It’s a great turnkey solution for ECS used by Blinkist, among others.

john294 avatar
john294
07:11:02 PM

@john294 has joined the channel

maarten avatar
maarten

Hi @john294! I’m afk very soon, but happy to talk any time.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Basically they’ve built a very easy turnkey solution for using ECS with Terraform. Cloud Posse has our own modules, but @maarten is going above and beyond with airship.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

He’s specifically trying to make it easier for smaller startups to get up and running quickly

i5okie avatar
i5okie
07:31:23 PM

@i5okie has joined the channel

i5okie avatar
i5okie

hi

i5okie avatar
i5okie

moved here from general. im trying to implement and automagical experience for our devs to create review apps, after we move from heroku to aws.

i5okie avatar
i5okie

I’m imagining it being almost like circle-ci. by that i mean have “service images” like postgresdb, and other normal images, like ruby-2.3-8-node-browsers kind. most likely only have a single ecs instance, or cluster of 1, and devs would launch review apps from command line (i’m working on a gem, have a bunch of heroku cli - like features already implemented, this would be next). to either deploy from PR, or from local staged files.

i5okie avatar
i5okie

came here for some inspiration / suggestions / opinions

i5okie avatar
i5okie

looks like traefik will be pretty important

joshmyers avatar
joshmyers
09:00:11 PM

@joshmyers has joined the channel

joshmyers avatar
joshmyers

@i5okie Is this an unsolved problems that needs code written or is there something you could take off the shelf?

joshmyers avatar
joshmyers

Traefik is

joshmyers avatar
joshmyers

Airship looks nice!

i5okie avatar
i5okie

yeah i was looking at airship too.

i5okie avatar
i5okie

i still don’t really understand how airship can help

maarten avatar
maarten

Hu @i5okie I’m not really online now, but tomorrow I’ll have plenty of time to show you around what airship is about. I just started documenting ( work in progress ) https://airship.tf . Its guide is only covering the cluster at the moment, the ecs service module which is 99% of the logic isn’t covered yet, just a little bit in the (unfinished) getting started section. You can take a look here: github.com/blinkist/terraform-aws-airship-ecs-service . Maybe you can explain your use-case a bit and let’s discuss tomorrow !

.. ECS made easy

Home of Terraform Airship

i5okie avatar
i5okie

Hmm if i were to use airship, which looks great.. Looking at your guide (great work so far!!!) I think in my use case I’ll need to replace nginx with Traefik

i5okie avatar
i5okie

i think that’d be a killer combo

joshmyers avatar
joshmyers

Cunning use of the data lambda for bootstrap

joshmyers avatar
joshmyers

@i5okie Have done similar with Traefik and the ECS backend. Worked nicely

i5okie avatar
i5okie

josh, the only ecs+traefik tutorials I’ve found out there so far. are somewhat useless / not well documented.

i5okie avatar
i5okie

I’m trying to hack together the airship moduel some of the cloud-posse modules, into a nice ecs stack. then try to figure out how to make a service module to bring-up a traefik service.. one thing at a time i guess

i5okie avatar
i5okie

So is the plan with Airship to bring it into Cloud-Posse family?

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

For the time being , I think this is an independent project. But honestly, we just want people doing cool stuff to be part of the community.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

I totally endorse what @maarten is building with airship + blinkist

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

I know @jamie is contributing to it among others

i5okie avatar
i5okie

i like that

2018-12-03

maarten avatar
maarten

Documenting is close to folding laundry in my happiness index.

2
2
1
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

yea, it’s like pulling teeth

maarten avatar
maarten

haha

maarten avatar
maarten

Pulling teeth is short and intense, documenting is more like a week long back pain.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

lol

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

good point

2018-12-01

    keyboard_arrow_up