I think I'll go with having my developer review the extension. They'll be able to dig into the code and really assess the security implications. It's worth the extra time to make sure we don't introduce any vulnerabilities.
Okay, I've got this. The key is to create the deployment with the two containers, mount the shared volume, and then configure the logger and adapter containers correctly. As long as I follow the instructions closely, I should be able to get this working.
In
4 months agoLemuel
4 months agoSamira
4 months agoMozell
4 months agoBok
5 months agoEllsworth
5 months agoAnnita
5 months agoAnnett
5 months agoAliza
5 months agoLuisa
5 months agoShoshana
5 months agoWhitley
5 months agoHershel
5 months ago