Skip to content

Instantly share code, notes, and snippets.

View seanknox's full-sized avatar
🙋‍♂️

Sean Knox seanknox

🙋‍♂️
  • San Francisco, CA
View GitHub Profile
AllCops:
Include:
- '**/Rakefile'
- '**/config.ru'
- 'lib/tasks/**/*'
Exclude:
- bin/*
- db/schema.rb
- vendor/bundle/**/*
TargetRubyVersion: 2.3
@seanknox
seanknox / .rubocop.yml
Created March 16, 2016 05:25
Rubocop example
AllCops:
Include:
- '**/Rakefile'
- '**/config.ru'
- 'lib/tasks/**/*'
Exclude:
- bin/*
- db/schema.rb
- vendor/bundle/**/*
TargetRubyVersion: 2.3
require 'rails_helper'
RSpec.describe 'rake db:seed' do
it 'loads without error' do
load Rails.root.join('db', 'seeds.rb')
end
end

Prerequisites:

You'll need:

  1. A paid ngrok account
  2. A reserved domain on ngrok, e.g. the FQDN you're generating certs for
  3. A registed domain and access to change DNS records

How to

  1. Install certbot and ngrok
  • brew cask install certbot ngrok
apiVersion: v1
kind: Service
metadata:
labels:
kubernetes.io/cluster-service: 'true'
kubernetes.io/name: monitoring-grafana
name: monitoring-grafana
namespace: kube-system
spec:
# In a production setup, we recommend accessing Grafana through an external Loadbalancer
core@ip-10-250-12-130 ~ $ docker images
REPOSITORY TAG IMAGE ID CREATED SIZE
quay.io/ablehealth/able_rails bb78e29 350c2b0fd19e 22 hours ago 1.032 GB
quay.io/ablehealth/able_rails 9067c3192174375aab84a48aa658bd1bc1854662 4f95a4381a19 29 hours ago 1.025 GB
quay.io/ablehealth/able_rails d97bc1ad8abe4adaa1911b0c27f04d3820fb95ab 284f09ca6f77 32 hours ago 1.028 GB
datadog/docker-dd-agent latest 6cba91c93381 2 days ago 334.3 MB
quay.io/aptible/nginx latest c4a042ea3d82 10 days ago 45.52 MB
gcr.io/kubernetes-helm/tiller v2.0.0 5b5848956bb7 2 weeks ago 71.6 MB
bitnami/redis 3.2.5-r0
@seanknox
seanknox / .bash_profile
Last active November 3, 2017 14:28
Adds current kubernetes cluster to bash prompt
if [[ $COLORTERM = gnome-* && $TERM = xterm ]] && infocmp gnome-256color >/dev/null 2>&1; then
export TERM='gnome-256color';
elif infocmp xterm-256color >/dev/null 2>&1; then
export TERM='xterm-256color';
fi;
prompt_kubectl() {
local contextName='';
if [ $(kubectl config current-context &>/dev/null; echo "${?}") == '0' ]; then

prereqs

  • need to be a global admin to create service principal accounts when actually spinning up a cluster
  • create an SSH key and add to your OS keychain (e.g. ssh-add ...)

Issues you may run into!

  • "Insufficient privileges to complete the operation" during cluster creation

Your Azure account needs to be a Global Administrator so you can create service principal access.

#!/bin/bash
set -ex
daz() {
docker run -v $GOPATH/src/github.com/Azure/acs-engine:/acs-engine -v $HOME/.azure:/root/.azure -it --rm azuresdk/azure-cli-python:latest az $*
}
export CLUSTER_NAME=$1
export CLUSTER_LOCATION=$2
==========================================================
ETH0 / Azure0
==========================================================
root@k8s-agentpool1-37094310-0:~# tcpdump -i eth0 -c 20 -e -p -n host 64.40.107.85
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
23:20:33.403547 00:0d:3a:37:6f:ad > 12:34:56:78:9a:bc, ethertype IPv4 (0x0800), length 74: 10.240.0.4.40292 > 64.40.107.85.80: Flags [S], seq 2639424712, win 29200, options [mss 1460,sackOK,TS val 489756 ecr 0,nop,wscale 7], length 0
23:20:33.425429 12:34:56:78:9a:bc > 00:0d:3a:37:6f:ad, ethertype IPv4 (0x0800), length 74: 64.40.107.85.80 > 10.240.0.4.40292: Flags [S.], seq 3911420238, ack 2639424713, win 14480, options [mss 1460,sackOK,TS val 49502799 ecr 489756,nop,wscale 7], length 0
23:20:33.425443 00:0d:3a:37:6f:ad > 12:34:56:78:9a:bc, ethertype IPv4 (0x0800), length 74: 64.40.107.85.80 > 10.240.0.52.40292: Flags [S.], seq 3911420238, ack 2639424