I hereby claim:
- I am ned1313 on github.
- I am ned1313 (https://keybase.io/ned1313) on keybase.
- I have a public key ASB1Bn-D7glxYeBiT0p9kS-IiNm6vrfEQwchiXnV5YDghgo
To claim this, I am signing this object:
<# | |
WindowsUpdatePowerShell script | |
Written by Ned Bellavance with functions borrowed from Brian White and the | |
WindowsUpdate module written by Michal Gajda. This script is meant to automate | |
the installation of Windows Updates on a brand new system. This is not a | |
replacement for WSUS or SCCM or anything centrally managed. It installs all | |
available, required Windows Updates until there are none left. It will | |
require an internet connection, of course, and local Administrator credentials. | |
The script is run without parameters. Logs are written out to the |
#!/bin/bash | |
yum update -y | |
yum install ruby wget -y | |
cd /home/ec2-user | |
wget https://aws-codedeploy-us-east-1.s3.amazonaws.com/latest/install | |
chmod +x ./install | |
./install auto |
<# | |
This script is meant to make downloading the latest ASDK a simple affair. The files that | |
make up the ASDK are an executable and several bin files. This script will grab the | |
latest version of the ASDK from the web and then assemble the bin files into the final VHDX. | |
Make sure you have 40GB of free space on your C drive, or change the destination! | |
This does not include the process of installing the ASDK. That's a whole separate thing. | |
#> | |
#Set up the path and source URI |
I hereby claim:
To claim this, I am signing this object:
set -e | |
echo "Starting deploying Kubernetes cluster" | |
date | |
echo "Running as:" | |
whoami | |
sleep 20 |
#First let's set some variables needed by the acs-engine scale command | |
#Values will come from the deployment log, which should be here | |
LOG_FILE=/var/log/azure/acsengine-kubernetes-dvm.log | |
ACS_ENGINE_BIN=/var/lib/waagent/custom-script/download/0/acs-engine/bin | |
RESOURCE_GROUP=$(grep "RESOURCE_GROUP_NAME" $LOG_FILE | awk '{print $2}') | |
SUBSCRIPTION_ID=$(grep "TENANT_SUBSCRIPTION_ID" $LOG_FILE | awk '{print $2}') | |
LOCATION=$(grep "REGION_NAME" $LOG_FILE | awk '{print $2}') | |
DEPLOYMENT_DIR=$(grep "Templates output directory is" $LOG_FILE | awk '{print $NF}') | |
NODE_POOL=$(jq -r .properties.agentPoolProfiles[0].name $DEPLOYMENT_DIR/apimodel.json) |
2019/10/09 20:36:28 [DEBUG] Starting graph walk: walkPlan | |
2019-10-09T20:36:28.059Z [DEBUG] plugin: starting plugin: path=/usr/local/bin/terraform args=[/usr/local/bin/terraform, internal-plugin, provisioner, local-exec] | |
2019-10-09T20:36:28.060Z [DEBUG] plugin: plugin started: path=/usr/local/bin/terraform pid=7907 | |
2019-10-09T20:36:28.060Z [DEBUG] plugin: waiting for RPC address: path=/usr/local/bin/terraform | |
2019/10/09 20:36:28 [TRACE] dag/walk: visiting "var.vnet_cidr_range" | |
2019/10/09 20:36:28 [TRACE] vertex "var.vnet_cidr_range": starting visit (*terraform.NodeRootVariable) | |
2019/10/09 20:36:28 [TRACE] vertex "var.vnet_cidr_range": visit complete | |
2019/10/09 20:36:28 [TRACE] dag/walk: visiting "module.vnet-sec.var.address_space" | |
2019/10/09 20:36:28 [TRACE] vertex "module.vnet-sec.var.address_space": starting visit (*terraform.NodeApplyableModuleVariable) | |
2019/10/09 20:36:28 [TRACE] vertex "module.vnet-sec.var.address_space": evaluating |
data "aws_ami" "ubuntu" { | |
most_recent = true | |
filter { | |
name = "name" | |
values = ["ubuntu/images/hvm-ssd/ubuntu-focal-20.04-amd64-server-*"] | |
} | |
filter { | |
name = "virtualization-type" |