I hereby claim:
- I am durch on github.
- I am durch (https://keybase.io/durch) on keybase.
- I have a public key ASAkB3DeWhXeDvcYge4HWIoEgLTlAW4oOGM2ikdyLJHhgAo
To claim this, I am signing this object:
| #!abs | |
| is = f(x) { | |
| return x != "" | |
| } | |
| onedrive = flag("o") || flag("onedrive") | |
| dryrun = flag("d") | |
| source_dir = pwd() | |
| wsl_pattern = "<wsl home dir like /home/user>" |
I hereby claim:
To claim this, I am signing this object:
| [certificates] Valid certificates and keys now exist in "/etc/kubernetes/pki" | |
| [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/admin.conf" | |
| [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/kubelet.conf" | |
| [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/controller-manager.conf" | |
| [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/scheduler.conf" |
| --- | |
| kind: Deployment | |
| apiVersion: extensions/v1beta1 | |
| metadata: | |
| name: redis | |
| spec: | |
| replicas: 1 | |
| template: | |
| metadata: | |
| labels: |
| --- | |
| kind: ClusterRole | |
| apiVersion: rbac.authorization.k8s.io/v1beta1 | |
| metadata: | |
| name: admin-role | |
| rules: | |
| - apiGroups: ["*"] | |
| resources: ["*"] | |
| verbs: ["*"] | |
| --- |
| git clone https://github.com/coreos/flannel.git | |
| kubectl apply -f flannel/Documentation/kube-flannel-rbac.yml | |
| kubectl apply -f flannel/Documentation/kube-flannel.yml |
| [certificates] Valid certificates and keys now exist in "/etc/kubernetes/pki" | |
| [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/admin.conf" | |
| [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/kubelet.conf" | |
| [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/controller-manager.conf" | |
| [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/scheduler.conf" |
| [kubeadm] WARNING: kubeadm is in beta, please do not use it for production clusters. | |
| [init] Using Kubernetes version: v1.6.0 | |
| [init] Using Authorization mode: RBAC | |
| [preflight] Running pre-flight checks | |
| [preflight] Starting the kubelet service | |
| [certificates] Generated CA certificate and key. | |
| [certificates] Generated API server certificate and key. | |
| [certificates] API Server serving cert is signed for DNS names [kubeadm-master kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local] and IPs [10.96.0.1 10.138.0.4] | |
| [certificates] Generated API server kubelet client certificate and key. | |
| [certificates] Generated service account token signing key and public key. |
| cp /etc/kubernetes/admin.conf $HOME/ | |
| chown $(id -u):$(id -g) $HOME/admin.conf | |
| export KUBECONFIG=$HOME/admin.conf |
| # Yes on Jessie as well | |
| apt-get update && apt-get install -y apt-transport-https | |
| curl -s https://packages.cloud.google.com/apt/doc/apt-key.gpg | apt-key add - | |
| cat <<EOF >/etc/apt/sources.list.d/kubernetes.list | |
| deb http://apt.kubernetes.io/ kubernetes-xenial main | |
| EOF | |
| apt-get update | |
| apt-get install -y kubelet kubeadm kubectl kubernetes-cni |