I hereby claim:
- I am nicusX on github.
- I am nicus (https://keybase.io/nicus) on keybase.
- I have a public key whose fingerprint is DDAE E90D B270 D52C 7D70 CBD6 01D7 58A7 D46D 6B5B
To claim this, I am signing this object:
'use strict'; | |
const sourceCoookie = 'X-Source'; | |
const sourceMain = 'main'; | |
const sourceExperiment = 'experiment'; | |
const cookiePath = '/'; | |
// Origin Response handler | |
exports.handler = (event, context, callback) => { | |
const request = event.Records[0].cf.request; |
'use strict'; | |
const sourceCoookie = 'X-Source'; | |
const sourceMain = 'main'; | |
const sourceExperiment = 'experiment'; | |
const experimentBucketName = 'my-experiment.s3.amazonaws.com'; | |
const experimentBucketRegion = 'eu-west-1'; | |
// Origin Request handler | |
exports.handler = (event, context, callback) => { |
# {{ ansible_managed }} | |
[Unit] | |
Description=etcd | |
Documentation=https://github.com/coreos | |
[Service] | |
ExecStart=/usr/bin/etcd --name {{ inventory_hostname }} \ | |
--cert-file=/etc/etcd/kubernetes.pem \ | |
--key-file=/etc/etcd/kubernetes-key.pem \ | |
--peer-cert-file=/etc/etcd/kubernetes.pem \ |
resource "aws_security_group" "kubernetes" { | |
vpc_id = "${aws_vpc.kubernetes.id}" | |
name = "kubernetes" | |
# Allow all outbound | |
egress { | |
from_port = 0 | |
to_port = 0 | |
protocol = "-1" | |
cidr_blocks = ["0.0.0.0/0"] |
'use strict'; | |
const sourceCoookie = 'X-Source'; | |
const sourceMain = 'main'; | |
const sourceExperiment = 'experiment'; | |
const experimentTraffic = 0.5; | |
const experimentBucketEndpoint = 'my-experiment.s3.amazonaws.com'; | |
const experimentBucketRegion = 'eu-west-1'; |
'use strict'; | |
const sourceCoookie = 'X-Source'; | |
const sourceMain = 'main'; | |
const sourceExperiment = 'experiment'; | |
const experimentTraffic = 0.5; | |
// Viewer request handler | |
exports.handler = (event, context, callback) => { | |
const request = event.Records[0].cf.request; |
resource "aws_iam_role" "kubernetes" { | |
name = "kubernetes" | |
assume_role_policy = <<EOF | |
{ | |
"Version": "2012-10-17", | |
"Statement": [ { "Effect": "Allow", "Principal": { "Service": "ec2.amazonaws.com" }, "Action": "sts:AssumeRole" } ] | |
} | |
EOF | |
} |
I hereby claim:
To claim this, I am signing this object:
resource "aws_key_pair" "default_keypair" { | |
key_name = "my-keypair" | |
public_key = "ssh-rsa AA....zzz" | |
} |
# Generate Certificates | |
data "template_file" "certificates" { | |
template = "${file("${path.module}/template/kubernetes-csr.json")}" | |
depends_on = ["aws_elb.kubernetes_api","aws_instance.etcd","aws_instance.controller","aws_instance.worker"] | |
vars { | |
kubernetes_api_elb_dns_name = "${aws_elb.kubernetes_api.dns_name}" | |
kubernetes_cluster_dns = "${var.kubernetes_cluster_dns}" | |
etcd0_ip = "${aws_instance.etcd.0.private_ip}" | |
... | |
controller0_ip = "${aws_instance.controller.0.private_ip}" |