- I use it on Arch Linux (systemd 257.3-1)
- Install dependency:
yay tpm2-tools
(5.7-1)
kmille@linbox:~ journalctl --boot --dmesg --grep=tpm_tis
journalctl --boot --unit wpa_supplicant.service --follow
wpa_supplicant[888]: SSL: SSL3 alert: write (local SSL3 detected an error):fatal:protocol version
wpa_supplicant[888]: OpenSSL: openssl_handshake - SSL_connect error:0A000102:SSL routines::unsupported protocol
That may indicate that the network you're trying to connect to, requires some very old protocols.
Why?
ARG MICRODIR=/microdir | |
ARG PACKAGES_TO_INSTALL="java-17-openjdk-devel" | |
FROM registry.access.redhat.com/ubi8-micro@sha256:eb4245271537034f69ee336a4a2b31d3fbae4048ec1db53ff89de749c35cf537 AS BASE | |
FROM registry.access.redhat.com/ubi8@sha256:83c0e63f5efb64cba26be647e93bf036b8d88b774f0726936c1b956424b1abf6 AS BUILD | |
ARG MICRODIR | |
ARG PACKAGES_TO_INSTALL | |
RUN mkdir ${MICRODIR} | |
COPY --from=BASE / ${MICRODIR} |
#!/usr/bin/bash -xe | |
cat <<EOF > "${HOME}/.config/systemd/user/zoom.slice" | |
[Slice] | |
AllowedCPUs=0-4 | |
MemoryHigh=6G | |
EOF | |
cat /usr/share/applications/Zoom.desktop | sed -E 's#^(Exec=).*$#Exec=/usr/bin/systemd-run --user --slice=zoom.slice /opt/zoom/ZoomLauncher#' > "${HOME}/.local/share/applications/Zoom.desktop" |
This is an example setup with NetBox using AzureAD for authentication. It uses the Python Social Auth library.
Most of this was taken from this gist: https://gist.github.com/leoluk/16d91ec22d833945c7ac7ed2b3b05a27
This is written to support NetBox v2.10 to v3.0. I'll try to note differences for 2.9 or earlier.
NOTE: NetBox v3.1 added basic support for using social_auth so most of this is no longer required and can be placed in the configuration.py
file.
release.txt
for the corresponding release.
For example here: https://mirror.openshift.com/pub/openshift-v4/clients/ocp/latest-4.4/release.txtIn this example, the latest 4.4.x it is 4.4.3 and it has this entry:
Pull From: quay.io/openshift-release-dev/ocp-release@sha256:039a4ef7c128a049ccf916a1d68ce93e8f5494b44d5a75df60c85e9e7191dacc
Validate your current version is in the list of upgrade path for the desired release. For 4.4.3 these are the possible upgrade paths:
Edit the config for the network Custom Resource (CR) instance spec.externalIP.policy.allowedCIDRs
with the CIDRs to use.
oc edit network.config.openshift.io cluster
spec.externalIP.policy.allowedCIDRs
. The following enable 192.168.18.64/26
as an externalIP
CIDR:This exemplary initial setup uses two devices /dev/sdb
and /dev/sdc
but can be applied to any amount of devices by following the steps with additional devices.
Create keyfile:
dd bs=64 count=1 if=/dev/urandom of=/etc/cryptkey iflag=fullblock
chmod 600 /etc/cryptkey