New: Use Terraform Modules in Pulumi Without Conversion (7 minute read)
Pulumi announced direct support for executing Terraform modules, aiming to simplify migration to Pulumi for users with complex module dependencies. The new feature allows incorporating existing Terraform modules into Pulumi projects, with a three-phase approach: start new projects in Pulumi, incrementally migrate modules, and fully migrate when ready.
|
Google Cloud donates A2A to Linux Foundation (5 minute read)
Google Cloud has donated its Agent2Agent (A2A) protocol to the Linux Foundation, launching a new open-source project to standardize communication between AI agents. Backed by companies like AWS, Microsoft, and Cisco, A2A aims to foster a vendor-neutral, interoperable ecosystem for secure and collaborative AI agent interactions.
|
|
DevOps: Automating Release Tags (4 minute read)
A GitHub Actions workflow can automate semantic version tagging and release creation on pull request merges, including automatic major version bumps triggered by labels or keywords. This system generates release notes from PR metadata and pushes tags and releases without manual intervention.
|
Bazel's Original Sins (3 minute read)
Bazel compromises its promise of hermetic builds by mounting the root filesystem, leading to hidden dependencies and inconsistent behavior. Its added support for Windows and bzlmod introduces complexity and dependency issues, diverging from the tightly controlled, monorepo approach that made it successful at Google.
|
|
WireGuard Easy (GitHub Repo)
WireGuard Easy is the easiest way to install and manage WireGuard on any Linux host. The project provides an easy-to-use Web UI for Wireguard management.
|
Cognee (GitHub Repo)
Cognee is a tool for building dynamic memory for AI agents. It utilizes scalable, modular ECL (Extract, Cognify, and Load) pipelines and can be installed with pip, poetry, or uv.
|
|
How Google Cloud is securing open-source credentials at scale (3 minute read)
Google Cloud has developed a scanning tool that automatically detects leaked credentials in open-source artifacts, such as packages and Docker images, helping prevent misuse and improve security across the software supply chain. The system enables near-instant remediation of credential exposures. It will soon expand to include third-party credentials and broader open-source platform coverage.
|
|
Love TLDR? Tell your friends and get rewards!
|
Share your referral link below with friends to get free TLDR swag!
|
|
Track your referrals here. |
Want to advertise in TLDR? ๐ฐ
If your company is interested in reaching an audience of devops professionals and decision makers, you may want to advertise with us.
Want to work at TLDR? ๐ผ
Apply here or send a friend's resume to jobs@tldr.tech and get $1k if we hire them!
If you have any comments or feedback, just respond to this email!
Thanks for reading,
Kunal Desai & Martin Hauskrecht
|
|
|
|