Moto, Python based S3 mocking: https://github.com/spulec/moto
( S3 Content: https://github.com/spulec/moto/tree/master/moto/s3 )
52% implemented
- abort_multipart_upload
ssh_authorized_keys: | |
- "ssh-rsa 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 michael.j.russell.email@gmail.com" | |
- "github:irishgordo" | |
hostname: k3os-gordobox | |
init_cmd: | |
- "echo gordobox k3os init" | |
boot_cmd: | |
- "echo gordobox k3os boot" | |
run_cmd: | |
- "echo gordobox k3os run" |
Recently I had an adventure configuring NetworkManager's CLI and minimal UI, through the app: "nmtui". | |
Pre-reqs I leveraged: | |
- A Pacman Wrapper, I used "yay" x-ref: https://wiki.archlinux.org/index.php/AUR_helpers#Pacman_wrappers | |
- "networkmanager-l2tp", x-ref: https://aur.archlinux.org/packages/networkmanager-l2tp/ | |
- I acquired by ```yay -S networkmanager-l2tp``` | |
The order of actions I took: | |
1. Creating a the vpn as a system based connection: |
$ ffmpeg -i input.mp4 -vcodec h264 -acodec mp2 output.mp4 |
token: testing_1884 | |
os: | |
ssh_authorized_keys: | |
- github:irishgordo | |
hostname: testing-1884-feature | |
modules: | |
- kvm | |
- nvme | |
dns_nameservers: | |
- 8.8.8.8 |
#cloud-config | |
write_files: | |
- path: /tmp/run-script.sh | |
content: | | |
#!/usr/bin/bash | |
# set up chunks of data to write out | |
REGISTRIES=$(cat <<-END | |
mirrors: | |
docker.io: |
This is kinda a pain, the SSL part was hard to get down / understand. | |
(it took forever troubleshooting | |
The Binary of both Minio & Certgen is probably the easiest to work with. | |
x86-64, from minio | |
- certgen: https://github.com/minio/certgen | |
The loadout will have: | |
- single drive leveraged as a folder for storage since that's common place | |
- SSL outta the box, since that's ABSOLUTELY NEEDED when building custom RKE2 clusters that have backups created... plainly, we can't have minio without SSL if we're planning to use MinIO for RKE2 Backups... |
![Screenshot from 2024-03-11 21-39-57](https://gist.github.com/assets/5370752/233d7a50-d9c6-4fc5
This is a very concise quickstart guide to setup an OpenStack DevStack limited to Keystone in a VirtualBox VM using Ubuntu Server LTS as the guest operating system. By limiting the DevStack to primarily deploy Keystone only, installation is quick and the machine does not take up much resources.
As the time of writing it uses up about 11 GB of disk space and 1 GB of RAM running Keystone.
This is meant for testing authentication and IDM-related things with OpenStack Keystone while disregarding other components.
It can easily be extended by further components by adjusting the local.conf
accordingly.