Skip to content

Instantly share code, notes, and snippets.

View saschagrunert's full-sized avatar

Sascha Grunert saschagrunert

View GitHub Profile
@saschagrunert
saschagrunert / Vagrantfile
Last active March 2, 2022 09:37
Rocky Linux 8 - Kubernetes
# -*- mode: ruby -*-
# vi: set ft=ruby :
Vagrant.configure("2") do |config|
config.vm.box = "generic/rocky8"
memory = 6144
cpus = 4
config.vm.provider :virtualbox do |v|
v.memory = memory
#!/usr/bin/env bash
set -euo pipefail
OUTPUT=deploy.yaml
# Deploy cert-manager (not requried in final version because certificates
# should be bootstrapped by the installer)
kubectl apply -f https://github.com/jetstack/cert-manager/releases/download/v1.3.1/cert-manager.yaml
kubectl wait --for condition=ready \
-n cert-manager pod -l app.kubernetes.io/instance=cert-manager
# Before deploying this, run:
# oc adm policy add-scc-to-user hostnetwork -z crio-metrics -n crio-metrics
---
# Only required for demoing purposes because the ServiceMonitor is part of the
# user monitoring and should move to the system level later on.
apiVersion: v1
kind: ConfigMap
metadata:
name: cluster-monitoring-config
namespace: openshift-monitoring
package main
// BEFORE RUNNING:
// ---------------
// 1. If not already done, enable the Cloud Resource Manager API
// and check the quota for your project at
// https://console.developers.google.com/apis/api/cloudresourcemanager
// 2. This sample uses Application Default Credentials for authentication.
// If not already done, install the gcloud CLI from
// https://cloud.google.com/sdk/ and run
FROM debian:10
RUN apt-get update && apt-get install -y wget gnupg
RUN echo 'deb http://download.opensuse.org/repositories/devel:/kubic:/libcontainers:/stable/Debian_10/ /' \
> /etc/apt/sources.list.d/devel:kubic:libcontainers:stable.list
RUN wget -nv https://download.opensuse.org/repositories/devel:kubic:libcontainers:stable/Debian_10/Release.key -O- |\
apt-key add -
RUN apt-get update && apt-get install -y podman
RUN sed -i 's/driver = ""/driver = "vfs"/' /etc/containers/storage.conf

What this PR does / why we need it: My explanation

Which issue(s) this PR fixes:

Fixes #

#!/usr/bin/env python3
import json
from kfp.compiler import Compiler
from kfp.dsl import ContainerOp, ExitHandler, pipeline
from kubernetes import client as k8s
@pipeline(name='My pipeline', description='')
@saschagrunert
saschagrunert / sign-tutorial.md
Created March 4, 2020 10:24
How to sign and distribute container images using Podman and GPG

How to sign and distribute container images using Podman and GPG

First of all, we have to create a GPG key pair or select a locally available one:

> gpg --list-keys [email protected]
pub   rsa2048 2018-11-26 [SC] [expires: 2020-11-25]
      92836C5387398A449AF794CF8CE029DD1A866E52
uid           [ultimate] Sascha Grunert <[email protected]>

Urgent Upgrade Notes

(No, really, you MUST read this before you upgrade)

  • Renamed FeatureGate RequestManagement to APIPriorityAndFairness. This feature gate is an alpha and has not yet been associated with any actual functionality. change references to feature gate RequestManagement into references to APIPriorityAndFairness (#85260, @MikeSpreitzer) [SIG API Machinery]

  • kubeadm: add a new "kubelet-finalize" phase as part of the "init" workflow and an experimental sub-phase to enable automatic kubelet client certificate rotation on primary control-plane nodes.

Prior to 1.17 and for existing nodes created by "kubeadm init" where kubelet client certificate rotation is desired, you must modify "/etc/kubernetes/kubelet.conf" to point to the PEM symlink for rotation: