Vagrant development environment

Vagrant 1.8 has been released. Comes with support for linked clones and snapshots.

Vagrant is a very popular open source application for building and managing development environments. It is developed by HashiCorp, the same company behind several other applications, like Otto, Atlas, Consul, Nomad, Terraform and Packer.

Vagrant is cross-platform (any Linux distribution, Mac OS X and Windows) and makes setting up, configuring and working with lightweight, reproducible, and portable development environments a breeze.

Two major features that shipped in Vagrant 1.8 are linked clones and snapshots. From the release announcement, linked cloning is used to:

import boxes for VirtualBox and VMware. Linked cloning is a feature supported by many hypervisors that dramatically speeds up imports by only creating a differential disk versus copying the entire disk image of the virtual machine.

Linked cloning will happen automatically if your system supports it. Providers other than VirtualBox and VMware can be updated outside of Vagrant to support linked cloning automatically.

While the vagrant snapshot command makes it possible to:

take and restore point-in-time snapshots of development environments. VirtualBox and VMware are both supported at release time, and other providers can begin supporting snapshots through their own updates.

Snapshots are a feature of hypervisors that allow the point-in-time state of a virtual machine to be saved and restored. This is useful when experimenting with the virtual machine: you can take a snapshot before the experiment, and rollback (restore) at any point if something goes wrong.

Other minor features that made it into Vagrant 1.8 are:

  • On a Windows machine with WinRM enabled, the vagrant powershell command will drop you into a PowerShell prompt
  • The port command will display a list of forwarded ports to a guest machine
  • ansible_local, a new provisioner, will execute Ansible on the guest machine
Related Post:  SlateBook x2: Tegra 4-powered Android hybrid

The complete Changelog is available at the project’s GitHub page. The official release announcement, which includes future plans for Vagrant, is available here.

Related Post:  Mark Shuttleworth on Western media, Iraq, IS and Ukraine

Vagrant development environment

Share:

Share on facebook
Facebook
Share on twitter
Twitter
Share on pinterest
Pinterest
Share on linkedin
LinkedIn

Hola! Did you notice that LinuxBSDos.com no longer runs network ads?  Yep, no more ads from the usual suspects that track you across the Internet.  But since  I still need to pay to keep the site running, feel free to make a small donation by PayPal.

Subscribe for updates. Trust me, no spam!

Mailchimp Signup Form

Sponsored links

1. Attend Algorithm Conference, a top AI and ML event for 2020.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.

5 Responses

  1. Stupid question. Two questions you should be asking are:

    1. Should you use unaudited security software?
    NO.
    2. Is auditing Truecrypt work $25k?
    Probably. Support of $16k before word got out seems to indicate that people are coughing up for it.

  2. Got a problem with TrueCrypt? Well, if you’re using Microsoft or Apple software, then you’re already “pwn3d” by “We Know Whom” in the first place. Therefore, first thing to do is switch to a F/OSS platform like GNU/Linux or *BSD. Second thing to do is do an encrypted-partition installation. On GNU/Linux systems, I encrypt everything but the /boot partition. I consider that a reasonable mitigation of risk for my purposes. If “We Know Who” breaks into my house and installs a backdoor on /boot without my knowledge, then I’ve got a much bigger problem anyway. But if you know your computer’s been touched or tampered with (e. g. your computer got confiscated and then eventually returned to you), well, that’s what booting from a Knoppix or other Live-CD is for. 🙂 Same applies to backup media, BTW. Use the native GNU/Linux or *BSD tools to do the encrypting, and you should be good to go.

    –SYG

  3. I use and trust truecrypt

    but I believe it should be audited. all open-source (even closed source) should be looked at in details

    1. But you can’t audit the source code of closed source tools. As such we can only trust that they are clean, that is, free of intentionally placed malware, also known as backdoors.

Leave a Reply

Your email address will not be published. Required fields are marked *

Get the latest

On social media
Via my newsletter
Mailchimp Signup Form

Partner links

1. Attend Algorithm Conference, a top AI and ML event for 2021.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.
Hacking, pentesting distributions

Linux Distributions for Hacking

Experts use these Linux distributions for hacking, digital forensics, and pentesting.

Categories
Archives

The authors of these books are confirmed to speak during

Algorithm Conference

T-minus AI

Author was the first chairperson of AI for the U.S. Air Force.

The case for killer robots

Author is the Director of the Center for Natural and Artificial Intelligence.

Why greatness cannot be planned

Author works on AI safety as a Senior Research Scientist at Uber AI Labs.

Anastasia Marchenkova

An invitation from Anastasia Marchenkova

Hya, after stints as a quantum researcher at Georgia Tech Quantum Optics & Quantum Telecom Lab, and the University of Maryland Joint Quantum Institute, I’m now working on superconducting qubit quantum processors at Bleximo. I’ll be speaking during Algorithm Conference in Austin, Texas, July 16 – 18, 2020. Meet me there and let’s chat about progress and hype in quantum computing.