Preparation for CKA with Kubernetes version 1.17.1 on REDHAT 8
| % | Domain |
|---|---|
| 08% | Application Lifecycle Management |
| 12% | Installation, Configuration & Validation |
| 19% | Core Concepts |
| 11% | Networking |
| sudo mkdir /etc/1password | |
| echo vivaldi-bin | sudo tee /etc/1password/custom_allowed_browsers | |
| sudo chown root:root /etc/1password/custom_allowed_browsers | |
| sudo chmod 755 /etc/1password/custom_allowed_browsers |
| # A script that provides a list of users who have access to each vault in | |
| # a 1Password account, and whether that assignment is a direct assignment or | |
| # granted by group membership | |
| # | |
| # This script must be run by a member of the Owners group of a 1Password Business account | |
| import os | |
| import subprocess | |
| import csv | |
| import json | |
| from dataclasses import dataclass |
| #!/usr/bin/env bash | |
| ######################################################### | |
| # REPLACE HTTP WITH HTTPS | |
| ######################################################### | |
| # This script replaces or adds the value of the website field for all items in a specified vault | |
| # Provide a vault UUID or vault name | |
| vaultUUID="" | |
| # convert http to https for each login item in specified vault |
| ssh-rsa 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 |
| az aks create --resource-group $RESOURCE_GROUP --name $CLUSTER_NAME \ | |
| --node-count 2 \ | |
| --node-vm-size Standard_B2s \ | |
| --location $REGION \ | |
| --vnet-subnet-id "$SUBNET_ID" \ | |
| --generate-ssh-keys |
| apiVersion: apps/v1 | |
| kind: Deployment | |
| metadata: | |
| name: op-connect | |
| spec: | |
| selector: | |
| matchLabels: | |
| app: op-connect | |
| template: | |
| metadata: |
| # Dockerfile to build an image with op installed and token set for Service Accounts | |
| FROM alpine | |
| ENV OP_CLI_VERSION v2.18.0 | |
| ENV ARCH amd64 | |
| ENV OP_SERVICE_ACCOUNT_TOKEN="{YOUR TOKEN HERE}" | |
| RUN apk add curl unzip | |
| RUN curl -sSfo op.zip https://cache.agilebits.com/dist/1P/op2/pkg/${OP_CLI_VERSION}/op_linux_${ARCH}_${OP_CLI_VERSION}.zip \ | |
| && unzip -od /usr/local/bin/ op.zip \ |
| az aks create -n op-scim \ | |
| --node-count 1 \ | |
| --node-vm-size Standard_B2s \ | |
| --load-balancer-sku basic \ | |
| --node-osdisk-size 32 \ | |
| --location <REGION> \ | |
| --subscription <YOUR SUBSCRIPTION> | |
| --resource-group <YOUR RESOURCE GROUP> | |
| --generate-ssh-keys #this may or may not be required. | |
| #!/usr/bin/env zsh | |
| # read bearerToken\?"What is your Calendly bearer token? " | |
| bearerToken=${1} | |
| # Get your OwnerURI | |
| rawData=$(curl -s --request GET \ | |
| --url https://api.calendly.com/users/me \ | |
| --header "Authorization: Bearer $bearerToken" \ | |
| --header 'Content-Type: application/json') |