Remote sandbox environments for learning and experimenting without worrying about setup and cleanup. Run anything on vanilla Linux VMs, get a fresh Docker host or Kubernetes cluster in seconds, publish ports, collaborate via sharing terminal sessions, SSH from the command line, and more.
This playground presents a k3s cluster that has randomized security vulnerabilities injected based on the OWASP top 10 kubernetes list. Run a scan to find what's wrong, then fix it and get another random vulnerability automatically injected. Play as long as you like!
A multi-node K3s cluster to demo connecting and troubleshooting a homelab remotely via tailscale. All username/passwords are admin/admin123
Follow along with an exciting ggplot2 tutorial to map out some cool linguistic stuff!