I hereby claim:
- I am cryptophobia on github.
- I am cryptophobia (https://keybase.io/cryptophobia) on keybase.
- I have a public key ASDF-iAOoXwdUk1mR-OKK9CHoOGW-OTBZPZPrM9n7NDWKAo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
| From issue: https://github.com/jupyterhub/zero-to-jupyterhub-k8s/issues/699 | |
| I've investigated using password encryption with weave. If you've followed the instructions for deploying kubernetes with KOps, the default deployment uses weave. Weave has a capability of employing password encryption. Once activated. The encryption in transit is seamless. | |
| Here are the steps so far | |
| Install Kubernetes with KOps per the z2jh documentation steps. | |
| (optional) run kubectl --namespace kube-system get pods and verify there are weave-net pods | |
| Create a password file. I did openssl rand -hex 128 >weave-passwd | |
| Create a Kubernetes Secret in the kube-system namespace |
| kubectl edit deploy deis-router -n deis | |
| ... | |
| readinessProbe: | |
| failureThreshold: 3 | |
| httpGet: | |
| path: /healthz | |
| port: 9090 | |
| scheme: HTTP | |
| initialDelaySeconds: 1 |
| #!/usr/bin/env sh | |
| # Invoking this script: | |
| # | |
| # To install the latest stable version: | |
| # curl https://deis.io/deis-cli/install-v2.sh | sh | |
| # | |
| # To install a specific released version ($VERSION): | |
| # curl https://deis.io/deis-cli/install-v2.sh | sh -s $VERSION | |
| # |
| #!/bin/bash | |
| # This script gracefully stops resque workers by issuing the USR2 | |
| # signal to the resque-pool manager and then waits for the workers | |
| # to be paused before exiting. Resque-pool master process relays | |
| # the USR2 signal to the children. | |
| # | |
| # For reference: | |
| # (1) https://github.com/nevans/resque-pool#signals | |
| # (2) https://github.com/resque/resque/blob/master/lib/resque/worker.rb#L376-L378 |
| #!/bin/sh | |
| # | |
| # git-info - shows information about a Git repository a la `svn info' | |
| # | |
| # How to use: | |
| # $ git info | |
| # $ git info ~/src/somewhere/somefile | |
| # $ git info some/relative/file_or_directory | |
| # $ git info ~/repos/something.git | |
| # |
| # 1) Create your private key (any password will do, we remove it below) | |
| $ cd ~/.ssh | |
| $ openssl genrsa -des3 -out server.orig.key 2048 | |
| # 2) Remove the password | |
| $ openssl rsa -in server.orig.key -out server.key |
cd /Library/Preferences
sudo rm com.sophos.sav.plist
--or--
sudo rm com.sophos.*
cd /Library/Application\ Support/Sophos/cloud/Installer.app/Contents/MacOS/tools/
sudo ./InstallationDeployer --force_remove
Sometimes the Sophos virus can exist in the /Library/Application.../Sophos/saas folder
References:
sudo apt-get update
| #! /bin/sh | |
| # /etc/init.d/teamcity | |
| # Common parameters, do not edit: | |
| PATH=/sbin:/usr/sbin:/bin:/usr/bin | |
| DESC="TeamCity Agent" | |
| NAME=teamcity-agent | |
| SCRIPTNAME=/etc/init.d/$NAME | |
| # | |
| # User specific parameters: | |
| USERNAME=ubuntu |