$ minikube start --profile audit
$ minikube ssh --profile audit
$ curl -sLO https://raw.githubusercontent.com/kubernetes/website/master/content/en/examples/audit/audit-policy.yaml
$ sudo mkdir -p /var/lib/k8s_audit
apiVersion: audit.k8s.io/v1 | |
kind: Policy | |
rules: | |
# do not log requests to the following | |
- level: None | |
nonResourceURLs: | |
- "/healthz*" | |
- "/logs" | |
- "/metrics" | |
- "/swagger*" |
apiVersion: v1 | |
kind: ConfigMap | |
metadata: | |
name: fluent-bit-config | |
namespace: tanzu-system-logging | |
labels: | |
k8s-app: fluent-bit | |
data: | |
# Configuration files: server, input, filters and output | |
# ====================================================== |
echo "Creating self-signed CA certificates for TLS and installing them in the local trust stores" | |
CA_CERTS_FOLDER=$(pwd)/.certs | |
# This requires mkcert to be installed/available | |
echo ${CA_CERTS_FOLDER} | |
rm -rf ${CA_CERTS_FOLDER} | |
mkdir -p ${CA_CERTS_FOLDER} | |
mkdir -p ${CA_CERTS_FOLDER}/${ENVIRONMENT_DEV} | |
# The CAROOT env variable is used by mkcert to determine where to read/write files | |
# Reference: https://github.com/FiloSottile/mkcert | |
CAROOT=${CA_CERTS_FOLDER}/${ENVIRONMENT_DEV} mkcert -install |
package main | |
import ( | |
"bytes" | |
"context" | |
"encoding/json" | |
"errors" | |
"fmt" | |
"io" | |
"log" |
############################################################################## | |
# History Configuration | |
############################################################################## | |
HISTSIZE=5000 #How many lines of history to keep in memory | |
HISTFILE=~/.zsh_history #Where to save history to disk | |
SAVEHIST=5000 #Number of history entries to save to disk | |
#HISTDUP=erase #Erase duplicates in the history file | |
setopt appendhistory #Append history to the history file (no overwriting) | |
setopt sharehistory #Share history across terminals | |
setopt incappendhistory #Immediately append to the history file, not just when a term is killed |
Put this in your `local-configure.yml` file, add as many users as you need: | |
users: | |
- name: fulvio | |
sudoer: yes | |
auth_key: ssh-rsa blahblahblahsomekey this is actually the public key in cleartext | |
- name: plone_buildout | |
group: plone_group | |
sudoer: no | |
auth_key: ssh-rsa blahblahblah ansible-generated on default |