- Create cluster ARM template with acs-engine
acs-engine generate ...
- Configure template to use custom hyperkube. Edit to match
"kubernetesHyperkubeSpec": {
server: | |
port: 8080 | |
shutdown: graceful | |
undertow: | |
threads: | |
worker: 24 | |
io: 3 | |
error: | |
whitelabel: | |
enabled: false |
# For recent versions of Ubuntu: | |
- https://www.pugetsystems.com/labs/hpc/ubuntu-22-04-server-autoinstall-iso/ | |
# Docs: | |
- https://wiki.ubuntu.com/FoundationsTeam/AutomatedServerInstalls | |
- https://wiki.ubuntu.com/FoundationsTeam/AutomatedServerInstalls/ConfigReference | |
- https://cloudinit.readthedocs.io/en/latest/topics/datasources/nocloud.html | |
- https://discourse.ubuntu.com/t/please-test-autoinstalls-for-20-04/15250/53 | |
# Download ISO Installer: |
#cloud-config | |
# Upgrade the instance on first boot | |
# (ie run apt-get upgrade) | |
# | |
# Default: false | |
# Aliases: apt_upgrade | |
package_upgrade: true | |
# Install additional packages on first boot |
Write-Output "Disabling WinRM over HTTP..." | |
Disable-NetFirewallRule -Name "WINRM-HTTP-In-TCP" | |
Disable-NetFirewallRule -Name "WINRM-HTTP-In-TCP-PUBLIC" | |
Get-ChildItem WSMan:\Localhost\listener | Remove-Item -Recurse | |
Write-Output "Configuring WinRM for HTTPS..." | |
Set-Item -Path WSMan:\LocalHost\MaxTimeoutms -Value '1800000' | |
Set-Item -Path WSMan:\LocalHost\Shell\MaxMemoryPerShellMB -Value '1024' | |
Set-Item -Path WSMan:\LocalHost\Service\AllowUnencrypted -Value 'false' | |
Set-Item -Path WSMan:\LocalHost\Service\Auth\Basic -Value 'true' |
#!/bin/bash | |
docker ps --filter "label=com.docker.compose.project" -q | xargs docker inspect --format='{{index .Config.Labels "com.docker.compose.project"}}'| sort | uniq |
The below instructions describe the process for MITM'ing a target device over HTTPS using nginx. It tries to go over every aspect of intercepting traffic, including hosting a Wifi access point.
The goal is to get a target device (such as an iPhone, Wii U, or another computer) to trust our local nginx server instead of the remote trusted server. This is going to be done by importing a custom CA root certificate on the target that corresponds with the nginx server's certificate.
Client (Trusted Device) <--> MITM Server (nginx) <--> Remote (Trusted) Server
These instructions are being performed on a PureOS machine, which is Debian based. They should also work in other environments with slight modifications
People
:bowtie: |
😄 :smile: |
😆 :laughing: |
---|---|---|
😊 :blush: |
😃 :smiley: |
:relaxed: |
😏 :smirk: |
😍 :heart_eyes: |
😘 :kissing_heart: |
😚 :kissing_closed_eyes: |
😳 :flushed: |
😌 :relieved: |
😆 :satisfied: |
😁 :grin: |
😉 :wink: |
😜 :stuck_out_tongue_winking_eye: |
😝 :stuck_out_tongue_closed_eyes: |
😀 :grinning: |
😗 :kissing: |
😙 :kissing_smiling_eyes: |
😛 :stuck_out_tongue: |