You'll need:
- A paid ngrok account
- A reserved domain on ngrok, e.g. the FQDN you're generating certs for
- A registed domain and access to change DNS records
- Install certbot and ngrok
brew cask install certbot ngrok
| AllCops: | |
| Include: | |
| - '**/Rakefile' | |
| - '**/config.ru' | |
| - 'lib/tasks/**/*' | |
| Exclude: | |
| - bin/* | |
| - db/schema.rb | |
| - vendor/bundle/**/* | |
| TargetRubyVersion: 2.3 |
| AllCops: | |
| Include: | |
| - '**/Rakefile' | |
| - '**/config.ru' | |
| - 'lib/tasks/**/*' | |
| Exclude: | |
| - bin/* | |
| - db/schema.rb | |
| - vendor/bundle/**/* | |
| TargetRubyVersion: 2.3 |
| require 'rails_helper' | |
| RSpec.describe 'rake db:seed' do | |
| it 'loads without error' do | |
| load Rails.root.join('db', 'seeds.rb') | |
| end | |
| end |
| apiVersion: v1 | |
| kind: Service | |
| metadata: | |
| labels: | |
| kubernetes.io/cluster-service: 'true' | |
| kubernetes.io/name: monitoring-grafana | |
| name: monitoring-grafana | |
| namespace: kube-system | |
| spec: | |
| # In a production setup, we recommend accessing Grafana through an external Loadbalancer |
| core@ip-10-250-12-130 ~ $ docker images | |
| REPOSITORY TAG IMAGE ID CREATED SIZE | |
| quay.io/ablehealth/able_rails bb78e29 350c2b0fd19e 22 hours ago 1.032 GB | |
| quay.io/ablehealth/able_rails 9067c3192174375aab84a48aa658bd1bc1854662 4f95a4381a19 29 hours ago 1.025 GB | |
| quay.io/ablehealth/able_rails d97bc1ad8abe4adaa1911b0c27f04d3820fb95ab 284f09ca6f77 32 hours ago 1.028 GB | |
| datadog/docker-dd-agent latest 6cba91c93381 2 days ago 334.3 MB | |
| quay.io/aptible/nginx latest c4a042ea3d82 10 days ago 45.52 MB | |
| gcr.io/kubernetes-helm/tiller v2.0.0 5b5848956bb7 2 weeks ago 71.6 MB | |
| bitnami/redis 3.2.5-r0 |
| if [[ $COLORTERM = gnome-* && $TERM = xterm ]] && infocmp gnome-256color >/dev/null 2>&1; then | |
| export TERM='gnome-256color'; | |
| elif infocmp xterm-256color >/dev/null 2>&1; then | |
| export TERM='xterm-256color'; | |
| fi; | |
| prompt_kubectl() { | |
| local contextName=''; | |
| if [ $(kubectl config current-context &>/dev/null; echo "${?}") == '0' ]; then |
Your Azure account needs to be a Global Administrator so you can create service principal access.
| #!/bin/bash | |
| set -ex | |
| daz() { | |
| docker run -v $GOPATH/src/github.com/Azure/acs-engine:/acs-engine -v $HOME/.azure:/root/.azure -it --rm azuresdk/azure-cli-python:latest az $* | |
| } | |
| export CLUSTER_NAME=$1 | |
| export CLUSTER_LOCATION=$2 |
| ========================================================== | |
| ETH0 / Azure0 | |
| ========================================================== | |
| root@k8s-agentpool1-37094310-0:~# tcpdump -i eth0 -c 20 -e -p -n host 64.40.107.85 | |
| tcpdump: verbose output suppressed, use -v or -vv for full protocol decode | |
| listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes | |
| 23:20:33.403547 00:0d:3a:37:6f:ad > 12:34:56:78:9a:bc, ethertype IPv4 (0x0800), length 74: 10.240.0.4.40292 > 64.40.107.85.80: Flags [S], seq 2639424712, win 29200, options [mss 1460,sackOK,TS val 489756 ecr 0,nop,wscale 7], length 0 | |
| 23:20:33.425429 12:34:56:78:9a:bc > 00:0d:3a:37:6f:ad, ethertype IPv4 (0x0800), length 74: 64.40.107.85.80 > 10.240.0.4.40292: Flags [S.], seq 3911420238, ack 2639424713, win 14480, options [mss 1460,sackOK,TS val 49502799 ecr 489756,nop,wscale 7], length 0 | |
| 23:20:33.425443 00:0d:3a:37:6f:ad > 12:34:56:78:9a:bc, ethertype IPv4 (0x0800), length 74: 64.40.107.85.80 > 10.240.0.52.40292: Flags [S.], seq 3911420238, ack 2639424 |