Add a keypair to yubikey slot 82
step kms create yubikey:slot-id=82
Verify you can create an attestation certificate
step kms attest yubikey:slot-id=82
Add a keypair to yubikey slot 82
step kms create yubikey:slot-id=82
Verify you can create an attestation certificate
step kms attest yubikey:slot-id=82
Create a team on smallstep.com https://smallstep.com/docs/certificate-manager/getting-started
Create two authorities under your team. The first authority will be used to issue certificates for etcd. The second authority will issue certificates for all other components in the cluster.
Add a JWK provisioner to both of them with the same name and password
Get an Ubuntu 22.04 vm and get a shell
Add the password for your provisioners to /home/ubuntu/password.txt
sudo hostnamectl set-hostname kotsbox && sudo reboot
spec:
docker:
version: latest
kurl:
privateAddress: 172.17.0.1
apiVersion: apiextensions.k8s.io/v1beta1 | |
kind: CustomResourceDefinition | |
metadata: | |
annotations: | |
controller-gen.kubebuilder.io/version: (unknown) | |
creationTimestamp: null | |
name: backups.velero.io | |
spec: | |
group: velero.io | |
names: |
I hereby claim:
To claim this, I am signing this object:
Check the application's processor service and the statsd service are both in the same overlay network. | |
``` | |
docker service inspect processor | |
``` | |
Then look under the `Networks` section to see all the networks each service is attached to. | |
If both services are in the same network, check for DNS or network issues. | |
``` | |
docker exec -it processor bash | |
apt-get update |
func mulOverflows(a, b uint64) bool { | |
if a <= 1 || b <= 1 { | |
return false | |
} | |
c := a * b | |
return c/b != a | |
} | |
const mostNegative = -(mostPositive + 1) | |
const mostPositive = 1<<63 - 1 |