You'll need:
- A paid ngrok account
- A reserved domain on ngrok, e.g. the FQDN you're generating certs for
- A registed domain and access to change DNS records
- Install certbot and ngrok
brew cask install certbot ngrok
AllCops: | |
Include: | |
- '**/Rakefile' | |
- '**/config.ru' | |
- 'lib/tasks/**/*' | |
Exclude: | |
- bin/* | |
- db/schema.rb | |
- vendor/bundle/**/* | |
TargetRubyVersion: 2.3 |
AllCops: | |
Include: | |
- '**/Rakefile' | |
- '**/config.ru' | |
- 'lib/tasks/**/*' | |
Exclude: | |
- bin/* | |
- db/schema.rb | |
- vendor/bundle/**/* | |
TargetRubyVersion: 2.3 |
require 'rails_helper' | |
RSpec.describe 'rake db:seed' do | |
it 'loads without error' do | |
load Rails.root.join('db', 'seeds.rb') | |
end | |
end |
apiVersion: v1 | |
kind: Service | |
metadata: | |
labels: | |
kubernetes.io/cluster-service: 'true' | |
kubernetes.io/name: monitoring-grafana | |
name: monitoring-grafana | |
namespace: kube-system | |
spec: | |
# In a production setup, we recommend accessing Grafana through an external Loadbalancer |
core@ip-10-250-12-130 ~ $ docker images | |
REPOSITORY TAG IMAGE ID CREATED SIZE | |
quay.io/ablehealth/able_rails bb78e29 350c2b0fd19e 22 hours ago 1.032 GB | |
quay.io/ablehealth/able_rails 9067c3192174375aab84a48aa658bd1bc1854662 4f95a4381a19 29 hours ago 1.025 GB | |
quay.io/ablehealth/able_rails d97bc1ad8abe4adaa1911b0c27f04d3820fb95ab 284f09ca6f77 32 hours ago 1.028 GB | |
datadog/docker-dd-agent latest 6cba91c93381 2 days ago 334.3 MB | |
quay.io/aptible/nginx latest c4a042ea3d82 10 days ago 45.52 MB | |
gcr.io/kubernetes-helm/tiller v2.0.0 5b5848956bb7 2 weeks ago 71.6 MB | |
bitnami/redis 3.2.5-r0 |
if [[ $COLORTERM = gnome-* && $TERM = xterm ]] && infocmp gnome-256color >/dev/null 2>&1; then | |
export TERM='gnome-256color'; | |
elif infocmp xterm-256color >/dev/null 2>&1; then | |
export TERM='xterm-256color'; | |
fi; | |
prompt_kubectl() { | |
local contextName=''; | |
if [ $(kubectl config current-context &>/dev/null; echo "${?}") == '0' ]; then |
Your Azure account needs to be a Global Administrator so you can create service principal access.
#!/bin/bash | |
set -ex | |
daz() { | |
docker run -v $GOPATH/src/github.com/Azure/acs-engine:/acs-engine -v $HOME/.azure:/root/.azure -it --rm azuresdk/azure-cli-python:latest az $* | |
} | |
export CLUSTER_NAME=$1 | |
export CLUSTER_LOCATION=$2 |
========================================================== | |
ETH0 / Azure0 | |
========================================================== | |
root@k8s-agentpool1-37094310-0:~# tcpdump -i eth0 -c 20 -e -p -n host 64.40.107.85 | |
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode | |
listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes | |
23:20:33.403547 00:0d:3a:37:6f:ad > 12:34:56:78:9a:bc, ethertype IPv4 (0x0800), length 74: 10.240.0.4.40292 > 64.40.107.85.80: Flags [S], seq 2639424712, win 29200, options [mss 1460,sackOK,TS val 489756 ecr 0,nop,wscale 7], length 0 | |
23:20:33.425429 12:34:56:78:9a:bc > 00:0d:3a:37:6f:ad, ethertype IPv4 (0x0800), length 74: 64.40.107.85.80 > 10.240.0.4.40292: Flags [S.], seq 3911420238, ack 2639424713, win 14480, options [mss 1460,sackOK,TS val 49502799 ecr 489756,nop,wscale 7], length 0 | |
23:20:33.425443 00:0d:3a:37:6f:ad > 12:34:56:78:9a:bc, ethertype IPv4 (0x0800), length 74: 64.40.107.85.80 > 10.240.0.52.40292: Flags [S.], seq 3911420238, ack 2639424 |