*.domain.com
For SSL, could SAN or NOT :
*.domain.com
*.apps.domain.com
*.system.domain.com
#!bin/bash | |
export OM_VERSION=0.23.0 | |
export PIVNET_VERSION=0.0.49 | |
cd /home/ubuntu | |
wget https://github.com/pivotal-cf/om/releases/download/${OM_VERSION}/om-linux | |
mv ./om-linux ./om | |
chmod +x ./om |
private-key-github-concourse: | | |
-----BEGIN RSA PRIVATE KEY----- | |
MIIJ.......................... | |
..... | |
..... | |
-----END RSA PRIVATE KEY----- | |
resources: | |
- name: docker-slack-notification | |
type: docker-image | |
source: | |
repository: cfcommunity/slack-notification-resource | |
- name: my-docker-image-s3 | |
type: s3 | |
source: | |
access_key_id: ((s3-access-key-id)) |
sudo su -
monit stop harbor
Check with monit summary to be sure harbor is stop
vi /var/vcap/packages/harbor-app/docker-compose.clair.yml
Then on the clair configuration just add your proxy
--- | |
jobs: | |
- name: stop | |
serial: true | |
plan: | |
- task: stop | |
config: | |
platform: linux | |
image_resource: | |
type: docker-image |
Purpose
This KB will help you to migrate your ERT/PAS blobstore from NFS to Azure blob storage. We use goblob a tool develop by pivotal to help for migration. This tool only support S3 compatible api storage so we add a s3 gateway (minio) in-between nfs and azure blobstorage.
Minio is a stable and simple way to achieve it.
Requirements
# add missing variables | |
- type: replace | |
path: /variables?/name=atc-db-password? | |
value: | |
name: atc-db-password | |
type: password | |
- type: replace | |
path: /variables?/name=credhub-encryption-password? | |
value: | |
name: credhub-encryption-password |
{"ClusterCloudWatch":{"additionalProperties":false,"properties":{"clusterLogging":{"$ref":"#/definitions/ClusterCloudWatchLogging","$schema":"http://json-schema.org/draft-04/schema#"}},"type":"object"},"ClusterCloudWatchLogging":{"additionalProperties":false,"properties":{"enableTypes":{"items":{"type":"string"},"type":"array"}},"type":"object"},"ClusterConfig":{"additionalProperties":false,"properties":{"TypeMeta":{"$ref":"#/definitions/TypeMeta","$schema":"http://json-schema.org/draft-04/schema#"},"availabilityZones":{"items":{"type":"string"},"type":"array"},"cloudWatch":{"$ref":"#/definitions/ClusterCloudWatch","$schema":"http://json-schema.org/draft-04/schema#"},"fargateProfiles":{"items":{"$ref":"#/definitions/FargateProfile","$schema":"http://json-schema.org/draft-04/schema#"},"type":"array"},"iam":{"$ref":"#/definitions/ClusterIAM","$schema":"http://json-schema.org/draft-04/schema#"},"managedNodeGroups":{"items":{"$ref":"#/definitions/ManagedNodeGroup","$schema":"http://json-schema.org/draft-04/schema |
{ | |
"$ref": "#/definitions/ClusterConfig", | |
"type": "object", | |
"$schema": "http://json-schema.org/draft-07/schema#", | |
"definitions": { | |
"AZSubnetMapping": { | |
"additionalProperties": { | |
"$ref": "#/definitions/AZSubnetSpec" | |
}, | |
"type": "object", |