• 0 Posts
  • 11 Comments
Joined 1 year ago
cake
Cake day: June 18th, 2023

help-circle


  • I think the issue is that, while a country is certainly allowed to write it’s own laws, the idea that it is deeply fundamentally immoral for the government to prevent someone from saying something (or compel them to say something) is very deeply baked into the American zeitgeist (of which I am a part.)

    So in the same way that a country is perfectly within its sovereign rights to pass a law that women are property or minorities don’t have the right to vote, I can still say that it feels wrong of them to do so.

    And I would also decry a country that kicks out a company that chooses to employ women or minorities in violation of such a law, even if that is technically their sovereign right to do so.







  • I wouldn’t let every VM have an interface into your management network, regardless of how you implement this. Your management network should be segregated with the ability to route to all the other VLANs with an appropriate firewall setup that only allows “related/established” connections back into it.

    As for your services, having them on separate VLANs is fine, but it seems like you would benefit from having a reverse proxy to forward things to the appropriate VLAN, to reduce your management overhead.

    But in general, having multiple interfaces per VM is fine. There shouldn’t be any performance hit or anything. But remember that if you have a compromised VM, it’ll be on any networks you give it an interface in, so minimizing that is key for security purposes. Ideally it would live in a VLAN that only has Internet access and/or direct access to your reverse proxy.