{ ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) }
pipeline { | |
environment { | |
imagename = "ismailtest" | |
ecrurl = "https://828556645578.dkr.ecr.us-east-2.amazonaws.com" | |
ecrcredentials = "ecr:us-east-2:ecr-ismail" | |
dockerImage = '' | |
} | |
agent any | |
stages { | |
stage('Cloning Git') { |
pipeline { | |
environment { | |
imagename = "yenigul/hacicenkins" | |
registryCredential = 'yenigul-dockerhub' | |
dockerImage = '' | |
} | |
agent any | |
stages { | |
stage('Cloning Git') { | |
steps { |
I hereby claim:
To claim this, I am signing this object:
traefik2 label for the container running service different than port 80 (ie 8080) | |
container_name: webserver | |
restart: always | |
labels: | |
- traefik.http.routers.websrv.rule=Host(`cloud.mydomain.com`) | |
- traefik.http.services.websrv.loadbalancer.server.port=8080 |
apt install -y swaks
swaks --from [email protected] --to [email protected] --auth-user myuser --auth-password "mypass" --server email-smtp.eu-west-1.amazonaws.com --tlsc
on Bash
$ brew install bash-completion
$ kubectl completion ~/.kubectl-bash
$ echo ". /usr/local/etc/profile.d/bash_completion.sh" >> ~/.bash_profile
$ echo ". ~/.kubectl-bash" >> ~/.bash_profile
$ source ~/.bash_profile
Configure AlphaSSL on nginx web server
1- Create CA bundle file
# cat yourdomain.crt intermadiate-cert.crt root.pem > /etc/ssl/ca-bundle.pem
yourdomain.crt is the crt you got from SSL provider via email
intermadiate-cert.crt is SHA-256 - Orders March 31, 2014 and After
at https://www.alphassl.com/support/install-root-certificate.html
root.pem from https://www.alphassl.com/support/roots/root.pem
## Trafik Multi Network Deployment | |
1. Create Traefik network | |
` # docker network create --driver=bridge --attachable --internal=false traefik ` | |
2. Edit `traefik2/docker-compose.yml` | |
- Change ACME email | |
- Change --providers.docker.network=traefik value if you created different network then `traefik` |
# docker network create nextcloud | |
NOTES: | |
1. [email protected] | |
2. TRUSTED_PROXIES values based on your 'nexcloud network' | |
3. remove traefik.http.middlewares.nextcloud.headers.contentSecurityPolicy and | |
traefik.http.middlewares.nextcloud.headers.customFrameOptionsValue if you don't want to allow iframe your domain | |
3 | |
# cat docker-compose.yml |