Install kubectl crossplane plugin
curl -sL https://raw.githubusercontent.com/crossplane/crossplane/master/install.sh | sh
sudo mv kubectl-crossplane /usr/local/bin
kubectl crossplane --help
Install Crossplane
# This behaviour comes in Kubernetes 1.21 with a change of Serviceaccount token format. Bound tokens become default, legacy | |
# token still alive. In prometheus-auth, a middleware | |
# for bearer token auth in front of prometheus, a SubjectAccessReview will looking for a token, provided by the federated | |
# prometheus instance via http endpoint. This token is searched in a list of secrets cluster-wide and if there is a match, | |
# comparing process started for ServiceAccount and Namespace. After success, a hijack federate will provide access to the | |
# related cluster metrics. Normaly, the token in the federate call and the content of the related secret of the | |
# ServiceAccount is equal. In newer Kubernetes version this format is rewritten and internally the new format of bound token | |
# is stored. | |
รค With this difference, the SubjectAccessReview is denied and no metrics are accessable. Unfortunatelly the related | |
# ServiceMonitor for federate is UP, no errors are visiable. |
apiVersion: v1 | |
kind: ConfigMap | |
metadata: | |
name: fix-project-monitoring | |
data: | |
fix-project-monitoring.sh: | | |
#!/usr/bin/env bash | |
set -e |
--- | |
apiVersion: v1 | |
kind: PersistentVolumeClaim | |
metadata: | |
name: grafana-project-monitoring-backup | |
spec: | |
accessModes: | |
- ReadWriteOnce | |
resources: | |
requests: |
global: | |
cattle: | |
clusterId: "" | |
clusterName: "" | |
rkePathPrefix: "" | |
rkeWindowsPathPrefix: "" | |
systemDefaultRegistry: mtr.devops.telekom.de | |
systemProjectId: "" | |
url: "" | |
image: |
Install kubectl crossplane plugin
curl -sL https://raw.githubusercontent.com/crossplane/crossplane/master/install.sh | sh
sudo mv kubectl-crossplane /usr/local/bin
kubectl crossplane --help
Install Crossplane
{} |
{} |
# Setup Raspberry PI to monitor CybperPower USV and send alarm SMS | |
# Connect CyberPower USV and Raspberry with USB cable | |
# Install Software on Raspberry (Ubuntu): | |
# apt-get update && apt-get install nut nut-client nut-server | |
# Adjust config: | |
``` | |
/etc/nut/nut.conf | |
MODE=netserver |
// show the next available rds flavor on OTC | |
package main | |
import ( | |
"fmt" | |
"sort" | |
"strconv" | |
"strings" | |
"net/http" |
package main | |
import ( | |
"fmt" | |
"net/http" | |
"os" | |
"github.com/gophercloud/utils/client" | |
golangsdk "github.com/opentelekomcloud/gophertelekomcloud" | |
"github.com/opentelekomcloud/gophertelekomcloud/openstack" |