NOTE - An updated and more complete example can be found here.
Here's acl.json
:
{
#cloud-config | |
write-files: | |
- path: /etc/conf.d/nfs | |
permissions: '0644' | |
content: | | |
OPTS_RPC_MOUNTD="" | |
coreos: | |
units: | |
- name: update-engine.service |
import json | |
from policy_sentry.analysis.analyze import analyze_by_access_level, determine_actions_to_expand | |
from policy_sentry.shared.database import connect_db | |
DB_SESSION = connect_db('bundled') # Use the bundled data that comes with Policy Sentry | |
sample_policy = json.loads(""" | |
{ | |
"Statement":[ |
import errno | |
import json | |
import os | |
import os.path | |
tf_state_path = os.path.join(os.path.dirname(__file__), "..", "terraform.tfstate") | |
tf_state_file = open(tf_state_path, 'rb') | |
tf_state = json.load(tf_state_file) | |
tf_state_file.close() |
<!DOCTYPE html> | |
<html lang="en"> | |
<head> | |
<meta charset="utf-8"> | |
<meta http-equiv="X-UA-Compatible" content="IE=edge"> | |
<meta name="viewport" content="width=device-width, initial-scale=1"> | |
<meta name="description" content=""> | |
<meta name="author" content=""> | |
NOTE - An updated and more complete example can be found here.
Here's acl.json
:
{
#!/bin/bash | |
# Delete Default VPCs | |
# Deletes Default VPCs across an entire organization if there are no ENIs in | |
# the default VPC. | |
# | |
# Assumes that ~/.aws/credentials has credentials to the root account for the | |
# AWS Organization. Assumes that the user/role you're logged into in the | |
# root account has permissions to assume the OrganizationAccountAccessRole in | |
# each member account. Requires jq and aws cli be installed on the path. |
# To install: | |
# sudo cat grow-root.service > /etc/systemd/system/grow-root.service | |
# sudo systemctl daemon-reload | |
# sudo systemctl enable -f grow-root.service | |
# | |
# Start (auto disables after first successful expansion): | |
# sudo systemctl start grow-root.service | |
# | |
# Debugging: | |
# sudo systemctl status grow-root.service |
#!/bin/bash -e | |
# Setup a Root CA in vault | |
# Generate and sign an Intermediate cert | |
# | |
# Requires: | |
# * A running vault server already initialzed and unsealed | |
# * Environment variable VAULT_TOKEN is set | |
# * vault cli (https://www.vaultproject.io) | |
# * httpie (https://github.com/jkbrzt/httpie) |
<div> | |
<h1>A Sinatra app to access Google+</h1> | |
<p>I'm sorry but the "The Sinatra app to access Google+" Web Service is not accessible from the folder you typed in.</p> | |
<p>The correct URL is: <a href="http://sinatragplus.heroku.com/">http://sinatragplus.heroku.com/</a></p> | |
<p><a href="/">Back</a></p> | |
</div> | |
<div id="footer"> | |
<p><b>A Fun Sinatra App for Google+ by RubyLearning 20 Sept. 2011</b>.</p> | |
</div> |
Getting rke and Rancher setup to run kubernetes on arm is interesting. There is no official support yet via rancher, although there is interest and some work done towards those efforts. This is my attempt at getting a cluster of 3 Pis (2 3Bs and 1 3B+) provisioned and registered to a rancher 2 server.
I've successfully completed this both with Hypriot OS 1.9.0 and the arm64 builds https://github.com/DieterReuter/image-builder-rpi64 Both times I used the same basic cloud-init setup