kubectl -n kube-system create sa tiller
kubectl create clusterrolebinding tiller --clusterrole cluster-admin --serviceaccount=kube-system:tiller
helm init --service-account tiller
| kind: Ingress | |
| apiVersion: extensions/v1beta1 | |
| metadata: | |
| name: redirect-ingress | |
| annotations: | |
| ingress.kubernetes.io/configuration-snippet: | | |
| if ($host ~ ^(.+)\.somedomain\.io$) { | |
| return 301 https://$1.domain.io$request_uri; | |
| } | |
| spec: |
This list has moved to a GitHub repo for easier tracking: https://github.com/coreos/awesome-kubernetes-extensions
Please comment below if you are using Kubernetes Third-Party Resources and I will add you to the list.
Known Users:
service.beta.kubernetes.io/aws-load-balancer-access-log-emit-interval(in minutes)service.beta.kubernetes.io/aws-load-balancer-access-log-enabled(true|false)service.beta.kubernetes.io/aws-load-balancer-access-log-s3-bucket-nameservice.beta.kubernetes.io/aws-load-balancer-access-log-s3-bucket-prefixservice.beta.kubernetes.io/aws-load-balancer-additional-resource-tags(comma-separated list of key=value)service.beta.kubernetes.io/aws-load-balancer-backend-protocol(http|https|ssl|tcp)service.beta.kubernetes.io/aws-load-balancer-connection-draining-enabled(true|false)
A curated list of AWS resources to prepare for the AWS Certifications
A curated list of awesome AWS resources you need to prepare for the all 5 AWS Certifications. This gist will include: open source repos, blogs & blogposts, ebooks, PDF, whitepapers, video courses, free lecture, slides, sample test and many other resources.
| #!py | |
| # The following statefile uses Python to set a grain ('sample-token') to | |
| # a value pulled from a HTTP call. The call will not be repeated if the | |
| # grain is already set. | |
| from salt.utils.http import query | |
| import json | |
| def run(): |
This brief overview assumes that Openstack Havana has been installed and setup with Neutron Networking. If you have not already done this, you could use "https://github.com/cloudnull/rcbops_allinone_inone" or devstack to setup a dev box and then perform the following actions.
install "openswan":
# (apt-get install openswan neutron-plugin-vpn-agent) || (yum install openswan openstack-neutron-vpn-agent && chkconfig neutron-vpn-agent on)
| #!/usr/bin/env bash | |
| # HubCrypt | |
| # ======== | |
| # | |
| # Decrypt a file encrypted using hubencrypt (ok, it's just openssl + rsautl + | |
| # your SSH keys). It needs the private key that matches your last public key | |
| # listed at github.com/<user>.keys | |
| # |
Usage:
ruby aws.rb launch [--region region --aws-key aws_key --aws-secret aws_secret --security-group security_group --key-pair key_pair --key-path key_path --ami-id ami_id--flavor-id flavor_id ]
ruby aws.rb terminate [--region region --aws-key aws_key --aws-secret aws_secret] --instance-id instance_id
ruby aws.rb attach [--region region --aws-key aws_key --aws-secret aws_secret] --instance-id instance_id --volume-id volume_id
No arguments provided

