start new:
tmux
start new with session name:
tmux new -s myname
| --- | |
| apiVersion: v1 | |
| kind: Service | |
| metadata: | |
| name: {{service.name}} | |
| annotations: | |
| getambassador.io/config: | | |
| --- | |
| apiVersion: ambassador/v1 | |
| kind: Mapping |
| # | |
| # ---- Base Node ---- | |
| FROM alpine:3.5 AS base | |
| # install node | |
| RUN apk add --no-cache nodejs-npm tini | |
| # set working directory | |
| WORKDIR /root/chat | |
| # Set tini as entrypoint | |
| ENTRYPOINT ["/sbin/tini", "--"] | |
| # copy project file |
service.beta.kubernetes.io/aws-load-balancer-access-log-emit-interval (in minutes)service.beta.kubernetes.io/aws-load-balancer-access-log-enabled (true|false)service.beta.kubernetes.io/aws-load-balancer-access-log-s3-bucket-nameservice.beta.kubernetes.io/aws-load-balancer-access-log-s3-bucket-prefixservice.beta.kubernetes.io/aws-load-balancer-backend-protocol (http|https|ssl|tcp)service.beta.kubernetes.io/aws-load-balancer-connection-draining-enabled (true|false)service.beta.kubernetes.io/aws-load-balancer-connection-draining-timeout (in seconds)| apiVersion: rbac.authorization.k8s.io/v1beta1 | |
| kind: ClusterRoleBinding | |
| metadata: | |
| name: kubernetes-dashboard | |
| labels: | |
| k8s-app: kubernetes-dashboard | |
| roleRef: | |
| apiGroup: rbac.authorization.k8s.io | |
| kind: ClusterRole | |
| name: cluster-admin |
| apiVersion: kops/v1alpha2 | |
| kind: Cluster | |
| metadata: | |
| creationTimestamp: 2018-01-25T00:55:52Z | |
| name: k1.k8s.local | |
| spec: | |
| api: | |
| loadBalancer: | |
| type: Public | |
| authorization: |
| --- | |
| # PV_create4_jenkins_home.yml | |
| kind: PersistentVolume | |
| apiVersion: v1 | |
| metadata: | |
| name: jenkins-home-pv | |
| labels: | |
| type: amazonEBS | |
| purpose: jenkins-home | |
| spec: |
| kubectl create serviceaccount --namespace kube-system tiller | |
| kubectl create clusterrolebinding tiller-cluster-rule --clusterrole=cluster-admin --serviceaccount=kube-system:tiller | |
| kubectl patch deploy --namespace kube-system tiller-deploy -p '{"spec":{"template":{"spec":{"serviceAccount":"tiller"}}}}' |
# helm
kubectl -n kube-system create sa tiller
kubectl create clusterrolebinding tiller --clusterrole cluster-admin --serviceaccount=kube-system:tiller
helm init --service-account tiller
# draftd
kubectl patch -n kube-system deployment draftd -p '{"spec":{"template":{"spec":{"serviceAccount":"tiller"}}}}}'