Create the startup script file in the /etc/systemd/system/ directory.
For example, name it vault.service.
sudo nano /etc/systemd/system/vault.service
Paste the following script into the file:
| kubectl patch psp system-unrestricted-psp -p '{"metadata": {"annotations":{"seccomp.security.alpha.kubernetes.io/allowedProfileNames": "*"}}}' | |
| kubectl patch psp global-unrestricted-psp -p '{"metadata": {"annotations":{"seccomp.security.alpha.kubernetes.io/allowedProfileNames": "*"}}}' | |
| kubectl patch psp global-restricted-psp -p '{"metadata": {"annotations":{"seccomp.security.alpha.kubernetes.io/allowedProfileNames": "*"}}}' |
| #!/bin/bash | |
| # | |
| # Name: get_terraform.sh | |
| # Purpose: Getting specified version of Terraform | |
| # Usage: get_terraform <version> | |
| # | |
| ############################# | |
| #set -x |
| #!/bin/bash | |
| # | |
| # Name: get_varset | |
| # Usage: /usr/local/bin/get_varsets <org> <varset-name> | |
| # | |
| # | |
| #################### | |
| # set -x # Uncomment to Debug | |
| # Variables # |
Create the startup script file in the /etc/systemd/system/ directory.
For example, name it vault.service.
sudo nano /etc/systemd/system/vault.service
Paste the following script into the file:
| #!/bin/bash | |
| # | |
| # Author: Dan Fedick | |
| # Set Lights: | |
| # | |
| # | |
| #################################### | |
| #set -x # Uncomment to Debug | |
| HUSER="xxxxxxxxx" |
| packer { | |
| required_plugins { | |
| amazon = { | |
| version = ">= 1.0.1" | |
| source = "github.com/hashicorp/amazon" | |
| } | |
| } | |
| } | |
| variable "version" { |
| --- | |
| name: Ubuntu 20.04 AMI Build | |
| on: | |
| push: | |
| jobs: | |
| packer: | |
| runs-on: ubuntu-latest |
| title | tags |
|---|---|
Doormat Functions |
doormat function login push terraform aws |
| env: sandbox | |
| domain: xxx | |
| clusterName: xxx | |
| namespace: aes-sandbox | |
| aes-web: | |
| name: aes-web | |
| fullnameOverride: aes-web | |
| env: sandbox | |
| namespace: aes-sandbox |
| Name | Port | TCP/UDP | Description |
|---|---|---|---|
| allow_server_rpc_inbound | 8300 | TCP | The TCP port used by servers to handle incoming requests from other agents |
| allow_serf_lan_tcp_inbound | 8301 | TCP | The TCP port used to handle gossip in the LAN. Required by all agents. |
| allow_serf_lan_udp_inbound | 8301 | UDP | The UDP port used to handle gossip in the LAN. Required by all agents. |
| allow_cli_rpc_inbound | 8400 | TCP | The TCP port used by all agents to handle RPC from the CLI |
| allow_serf_wan_tcp_inbound | 8302 | TCP | The TCP port used by servers to gossip over the WAN to other servers |
| allow_serf_wan_udp_inbound | 8302 | UDP | The UDP port used by servers to gossip over the WAN to other servers |