Skip to content

Instantly share code, notes, and snippets.

View DenizParlak's full-sized avatar
🦉

Deniz Parlak DenizParlak

🦉
View GitHub Profile
@DenizParlak
DenizParlak / kops.sh
Created September 11, 2019 18:54
kops sh
#!/bin/bash
aws configure
aws iam create-group --group-name kops
aws iam attach-group-policy --policy-arn arn:aws:iam::aws:policy/AmazonEC2FullAccess --group-name kops
aws iam attach-group-policy --policy-arn arn:aws:iam::aws:policy/AmazonRoute53FullAccess --group-name kops
aws iam attach-group-policy --policy-arn arn:aws:iam::aws:policy/AmazonS3FullAccess --group-name kops
aws iam attach-group-policy --policy-arn arn:aws:iam::aws:policy/IAMFullAccess --group-name kops
@DenizParlak
DenizParlak / kops.yaml
Created September 11, 2019 18:53
kops
---
- name: KOPS & k8s install
hosts: 34.220.51.161
become: yes
gather_facts: False
tasks:
- name: k8s repo
shell: "{{item}}"
@DenizParlak
DenizParlak / helm.sh
Created September 11, 2019 18:52
helm
#!/bin/bash
curl https://raw.githubusercontent.com/kubernetes/helm/master/scripts/get > get_helm.sh
chmod 700 get_helm.sh
./get_helm.sh
kubectl create -f role.yaml
kubectl create serviceaccount -n kube-system tiller
kubectl create clusterrolebinding tiller-cluster-rule --clusterrole=cluster-admin --serviceaccount=kube-system:tiller
@DenizParlak
DenizParlak / playbook.yml
Created September 11, 2019 18:51
ansible
---
- name: EC2
hosts: localhost
gather_facts: False
vars:
region: us-west-2
instance_type: t2.medium
ami: ami-06f2f779464715dc5
keypair: kks
@DenizParlak
DenizParlak / .sh
Created September 11, 2019 18:15
helm
#!/bin/bash
curl https://raw.githubusercontent.com/kubernetes/helm/master/scripts/get > get_helm.sh
chmod 700 get_helm.sh
./get_helm.sh
kubectl create -f role.yaml
kubectl create serviceaccount -n kube-system tiller
kubectl create clusterrolebinding tiller-cluster-rule --clusterrole=cluster-admin --serviceaccount=kube-system:tiller
@DenizParlak
DenizParlak / sh
Created September 11, 2019 18:09
bash
#!/bin/bash
aws configure
aws iam create-group --group-name kops
aws iam attach-group-policy --policy-arn arn:aws:iam::aws:policy/AmazonEC2FullAccess --group-name kops
aws iam attach-group-policy --policy-arn arn:aws:iam::aws:policy/AmazonRoute53FullAccess --group-name kops
aws iam attach-group-policy --policy-arn arn:aws:iam::aws:policy/AmazonS3FullAccess --group-name kops
aws iam attach-group-policy --policy-arn arn:aws:iam::aws:policy/IAMFullAccess --group-name kops
@DenizParlak
DenizParlak / .yml
Created September 11, 2019 18:06
kops
---
- name: KOPS & k8s install
hosts: 34.220.51.161
become: yes
gather_facts: False
tasks:
- name: k8s repo
shell: "{{item}}"
@DenizParlak
DenizParlak / .yml
Last active September 11, 2019 17:49
ansible
---
- name: EC2
hosts: localhost
gather_facts: False
vars:
region: us-west-2
instance_type: t2.medium
ami: ami-06f2f779464715dc5
keypair: kks
---
- name: EC2 instance
hosts: localhost
gather_facts: False
vars:
region: us-west-2
instance_type: t2.medium
ami: ami-06f2f779464715dc5
keypair: kks

Keybase proof

I hereby claim:

  • I am denizparlak on github.
  • I am deniz_parlak (https://keybase.io/deniz_parlak) on keybase.
  • I have a public key ASBqCTNyIjtLurDY96exM_WKW9vDGmZ8PHuz7sDvVawtPgo

To claim this, I am signing this object: