I hereby claim:
- I am cryptophobia on github.
- I am cryptophobia (https://keybase.io/cryptophobia) on keybase.
- I have a public key ASDF-iAOoXwdUk1mR-OKK9CHoOGW-OTBZPZPrM9n7NDWKAo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
From issue: https://github.com/jupyterhub/zero-to-jupyterhub-k8s/issues/699 | |
I've investigated using password encryption with weave. If you've followed the instructions for deploying kubernetes with KOps, the default deployment uses weave. Weave has a capability of employing password encryption. Once activated. The encryption in transit is seamless. | |
Here are the steps so far | |
Install Kubernetes with KOps per the z2jh documentation steps. | |
(optional) run kubectl --namespace kube-system get pods and verify there are weave-net pods | |
Create a password file. I did openssl rand -hex 128 >weave-passwd | |
Create a Kubernetes Secret in the kube-system namespace |
kubectl edit deploy deis-router -n deis | |
... | |
readinessProbe: | |
failureThreshold: 3 | |
httpGet: | |
path: /healthz | |
port: 9090 | |
scheme: HTTP | |
initialDelaySeconds: 1 |
#!/usr/bin/env sh | |
# Invoking this script: | |
# | |
# To install the latest stable version: | |
# curl https://deis.io/deis-cli/install-v2.sh | sh | |
# | |
# To install a specific released version ($VERSION): | |
# curl https://deis.io/deis-cli/install-v2.sh | sh -s $VERSION | |
# |
#!/bin/bash | |
# This script gracefully stops resque workers by issuing the USR2 | |
# signal to the resque-pool manager and then waits for the workers | |
# to be paused before exiting. Resque-pool master process relays | |
# the USR2 signal to the children. | |
# | |
# For reference: | |
# (1) https://github.com/nevans/resque-pool#signals | |
# (2) https://github.com/resque/resque/blob/master/lib/resque/worker.rb#L376-L378 |
#!/bin/sh | |
# | |
# git-info - shows information about a Git repository a la `svn info' | |
# | |
# How to use: | |
# $ git info | |
# $ git info ~/src/somewhere/somefile | |
# $ git info some/relative/file_or_directory | |
# $ git info ~/repos/something.git | |
# |
# 1) Create your private key (any password will do, we remove it below) | |
$ cd ~/.ssh | |
$ openssl genrsa -des3 -out server.orig.key 2048 | |
# 2) Remove the password | |
$ openssl rsa -in server.orig.key -out server.key |
cd /Library/Preferences
sudo rm com.sophos.sav.plist
--or--
sudo rm com.sophos.*
cd /Library/Application\ Support/Sophos/cloud/Installer.app/Contents/MacOS/tools/
sudo ./InstallationDeployer --force_remove
Sometimes the Sophos virus can exist in the /Library/Application.../Sophos/saas folder
References:
sudo apt-get update
#! /bin/sh | |
# /etc/init.d/teamcity | |
# Common parameters, do not edit: | |
PATH=/sbin:/usr/sbin:/bin:/usr/bin | |
DESC="TeamCity Agent" | |
NAME=teamcity-agent | |
SCRIPTNAME=/etc/init.d/$NAME | |
# | |
# User specific parameters: | |
USERNAME=ubuntu |